ABSTRACT

This chapter explains how to design a security architecture, in response to a Protection Profile (PP), through the instrument of a Security Target (ST) using the Common Criteria (CC) standardized methodology, syntax, and notation. The required content and format of an ST are discussed section by section. The perspective from which to read and interpret STs is defined. In addition, the purpose, scope, and development of an ST are mapped to both a generic system lifecycle and a generic procurement sequence.