Document

Security Characteristics collection

Created:  26 Aug 2016
Updated:  26 Aug 2016
Part of:  CPA scheme library
Security Characteristics (SCs) for use with Commercial Product Assurance (CPA) assessments. Product developers and purchasers can use these to fully understand what security functions have been assessed by the test labs.

This collection comprises the various SCs that are produced for CPA.

For historical purposes, see also Security Characteristics archive.

Security Characteristics

  1. Security Characteristics for data at rest encryption

    Data at rest encryption Security Characteristics (SC) cover products which provide encryption for sensitive date on mass storage media

  2. Security Characteristics for data sanitisation

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  3. Security Characteristics for email encryption

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  4. Software Execution Control: CPA SC

    Software Execution Control products are used to limit which software applications and services can run on an Operating System. They control the attack surface of a platform by reducing the number of potential vulnerabilities exposed by a system. These products are used in conjunction with an administrator-defined set of rules which define which software a non-privileged user is able to execute.

  5. Mobile Device Management (CC Mapping): CPA SC

    Management Solutions capable of remotely administering, configuring, and auditing mobile devices deployed by an enterprise.

  6. Remote Desktop: CPA SC

    Products which conform to this Security Characteristic (SC) allow basic user control of machines running a remote desktop server located within another security domain. The client enables users to view and interact with the desktop environment on a potentially compromised machine, while protecting the client from compromise by the server.

  7. Security Characteristics for firewalls

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  8. Security Characteristics for secure real-time communications

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  9. Security Characteristics for Virtualisation

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  10. Security Characteristics for VPNs

    Security Characteristics (SCs) for use with Commercial Product Assurance assessments. Product developers need these to fully understand which security enforcing functions will be assessed by the test labs. Purchasers can use these to know more about what functionality has and has not been assessed in a product.

  11. Security Characteristics for Smart Meters

    The collection of Security Characteristics for Smart Meters, and the associated Build Standard

Topics

Was this document helpful?

We need your feedback to improve this content.

Yes No