Professional Documents
Culture Documents
Completeness
Availability
IT Processes
Safeguards catalogue
6 categories of security measures
Threats catalogue
5 categories of threats
CC 2.0: 1998
Security policy
Effectiveness
Suitability analysis