Community Research and Development Information Service - CORDIS


An IT system has its own requirements for maintenance of confidentiality, integrity and availability. In order to meet these requirements it will implement a number of technical security measures such as access control, auditing and error recovery. This document sets out the common harmonised IT security criteria, dealing with security functionality and the appropriate criteria that should be adopted for evaluating assurance.

Additional information

Authors: CEC, CEC Bruxelles (BE)
Bibliographic Reference: Report: EN (1991) 163 pp.
Availability: Available from the Security of Information Programme Office, CEC/DG XIII, 200 rue de la Loi, B-1049 Bruxelles (BE)
ISBN: ISBN 92-826-3004-8
Follow us on: RSS Facebook Twitter YouTube Managed by the EU Publications Office Top