{"id":3902,"date":"2019-09-17T03:54:00","date_gmt":"2019-09-17T01:54:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=3902"},"modified":"2024-08-09T03:57:36","modified_gmt":"2024-08-09T01:57:36","slug":"atsec-singapore-cc","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/atsec-singapore-cc\/","title":{"rendered":"atsec\u589e\u52a0\u65b0\u52a0\u5761\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u4f53\u7cfb\u6388\u6743\u8d44\u8d28atsec"},"content":{"rendered":"\n

atsec\u975e\u5e38\u9ad8\u5174\u7684\u5ba3\u5e03\uff0catsec\u83b7\u5f97\u4e86\u65b0\u52a0\u5761\u8ba4\u8bc1\u673a\u6784CSA\uff08The Cyber Security Agency of Singapore\uff09\u7684\u6388\u6743\u6210\u4e3a\u65b0\u52a0\u5761\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u4f53\u7cfb\uff08SCCS\uff1aSingapore Common Criteria Scheme\uff09\u4e0b\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u6d4b\u8bd5\u5b9e\u9a8c\u5ba4\uff08CCTL\uff1aCommon Criteria Testing lab\uff09\u3002<\/p>\n\n\n\n

\u8bf7\u67e5\u770b\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u5b98\u65b9\u9875\u9762\uff1a
https:\/\/www.commoncriteriaportal.org\/labs\/<\/a>
\u65b0\u52a0\u5761\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u4f53\u7cfb\u9875\u9762\uff1a
https:\/\/www.csa.gov.sg\/programmes\/csa-common-criteria\/cc-atl<\/a><\/p>\n\n\n\n

atsec\u5df2\u7ecf\u662f\u5728\u5fb7\u56fdBSI\uff08Bundesamt fur Sicherheit in der Informationstechnik\uff09\u3001\u7f8e\u56fdNIAP\uff08National Information Assurance Partnership\uff09\u3001\u745e\u5178CSEC\uff08Sveriges Certifieringsorgan for IT-sakerhet\uff09\u3001\u610f\u5927\u5229OCSI\uff08Organismo di Certificazione della Sicurezza Informatica\uff09\u4f53\u7cfb\u4e0b\u8fd0\u8425\u7684\u901a\u7528\u8bc4\u4f30\u51c6\u5219\u5b9e\u9a8c\u5ba4\u3002<\/p>\n\n\n\n

\u672c\u6b21\u589e\u52a0\u65b0\u52a0\u5761\u901a\u7528\u8bc4\u4f30\u5b9e\u9a8c\u5ba4\u7684\u6388\u6743\u8d44\u8d28\uff0c\u5c06\u4e3a\u6211\u4eec\u7684\u5ba2\u6237\u63d0\u4f9b\u66f4\u591a\u7684\u673a\u4f1a\u4ece\u800c\u66f4\u597d\u5730\u8bc6\u522b\u548c\u6ee1\u8db3\u6765\u81ea\u4e0d\u540c\u5730\u533a\u7684\u8981\u6c42\uff0c\u5e76\u4e14\u80fd\u591f\u4e0e\u8be5\u5730\u533a\u5448\u73b0\u548c\u5f00\u5c55\u4e1a\u52a1\u7684\u5ba2\u6237\u66f4\u52a0\u7d27\u5bc6\u7684\u5408\u4f5c\u3002 \u5728\u65b0\u52a0\u5761\u4f53\u7cfb\u4e0b\u7684\u8bc4\u4f30\u5c06\u57fa\u4e8e\u4fdd\u62a4\u8f6e\u5ed3\uff08Protection Profile\uff09\u4e14\u91c7\u7528EAL 1\u5230EAL 5\u8bc4\u4f30\u4fdd\u969c\u7ea7\u522b\u3002<\/p>\n\n\n\n

\u901a\u7528\u8bc4\u4f30\u51c6\u5219\uff08CC\uff1aCommon Criteria\uff09\u548c\u56fd\u9645\u8ba4\u53ef\u7684ISO\u6807\u51c6\uff08 ISO\/IEC 15408 \uff09\uff0c\u88ab\u5404\u56fd\u653f\u5e9c\u548c\u5176\u4ed6\u7ec4\u7ec7\u7528\u4e8e\u8bc4\u4f30\u4fe1\u606f\u6280\u672f\u4ea7\u54c1\u7684\u5b89\u5168\u6027\u548c\u4fdd\u969c\u80fd\u529b\u3002CC\u6807\u51c6\u63d0\u4f9b\u4e86\u7edf\u4e00\u7684\u65b9\u5f0f\u8868\u8fbe\u5b89\u5168\u9700\u6c42\uff0c\u5e76\u5b9a\u4e49\u4e86\u4e00\u6574\u5957\u4e25\u683c\u7684\u51c6\u5219\uff0c\u5176\u4e2d\u4ea7\u54c1\u7684\u5b89\u5168\u5c42\u9762\uff08\u6bd4\u5982\uff1a\u5f00\u53d1\u73af\u5883\uff0c\u5b89\u5168\u529f\u80fd\u548c\u5b89\u5168\u8106\u5f31\u6027\u5904\u7406\uff09\u53ef\u4ee5\u5f97\u5230\u6709\u6548\u7684\u8bc4\u4f30\u3002\u4f7f\u7528\u56fd\u9645\u8ba4\u53ef\u3001\u6807\u51c6\u5316\u7684\u51c6\u5219\u8fdb\u884c\u6280\u672f\u7ec4\u4ef6\u548c\u4ea7\u54c1\u7684\u8bc4\u4f30\uff0c\u4f7f\u5404\u516c\u53f8\u5ba2\u89c2\u5730\u5448\u73b0\u5b89\u5168\u529f\u80fd\u7684\u53ef\u9760\u6027\u3002<\/p>\n\n\n\n

atsec\u5728\u901a\u7528\u8bc4\u4f30\u51c6\u5219\uff08Common Criteria\uff09\u9879\u76ee\u65b9\u9762\u62e5\u6709\u4e30\u5bcc\u7684\u7ecf\u9a8c\u3002\u5f53\u4eca\u4e16\u754c\u53ea\u6709\u4e3a\u6570\u4e0d\u591a\u7684\u5b9e\u9a8c\u5ba4\u88ab\u6b63\u5f0f\u5730\u8ba4\u53ef\u548c\u6388\u6743\u6267\u884c\u57fa\u4e8eCommon Criteria\u7684\u8bc4\u4f30\u3002\u4f5c\u4e3aCC\u6388\u6743\u5b9e\u9a8c\u5ba4\uff0catsec\u80fd\u591f\u63d0\u4f9b\u5e7f\u6cdb\u5b8c\u6574\u7684\u670d\u52a1\uff0c\u4ece\u800c\u6ee1\u8db3\u60a8\u8ba1\u5212\u548c\u5b9e\u65bdCC\u8bc4\u4f30\u7684\u9700\u8981\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

atsec\u975e\u5e38\u9ad8\u5174\u7684\u5ba3\u5e03\uff0catsec\u83b7\u5f97\u4e86\u65b0\u52a0\u5761\u8ba4\u8bc1\u673a\u6784CSA\uff08The Cyber Security Agen […]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1,11],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3902"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=3902"}],"version-history":[{"count":1,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3902\/revisions"}],"predecessor-version":[{"id":3905,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/3902\/revisions\/3905"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=3902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=3902"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=3902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}