Hubbry Logo
search button
Sign in
Controlled Access Protection Profile
Controlled Access Protection Profile
Comunity Hub
History
arrow-down
starMore
arrow-down
bob

Bob

Have a question related to this hub?

bob

Alice

Got something to say related to this hub?
Share it here.

#general is a chat channel to discuss anything related to the hub.
Hubbry Logo
search button
Sign in
Controlled Access Protection Profile
Community hub for the Wikipedia article
logoWikipedian hub
Welcome to the community hub built on top of the Controlled Access Protection Profile Wikipedia article. Here, you can discuss, collect, and organize anything related to Controlled Access Protection Profile. The ...
Add your contribution
Controlled Access Protection Profile

The Controlled Access Protection Profile, also known as CAPP, is a Common Criteria security profile by the Information Systems Security Organization (ISSO) that specifies a set of functional and assurance requirements for information technology products. Software and systems that conform to CAPP standards provide access controls that are capable of enforcing access limitations on individual users and data objects. CAPP-conformant products also provide an audit capability which records the security-relevant events which occur within the system.[1]

CAPP is intended for the protection of software and systems where users are assumed to be non-hostile and well-managed, requiring protection primarily against threats of inadvertent or casual attempts to breach the security protections. It is not intended to be applicable to circumstances in which protection is required against determined attempts by hostile and well-funded attackers.[1] It does not fully address the threats posed by malicious system development or administrative personnel, who generally have a higher level of access.[citation needed] The CAPP was derived from the requirements of the C2 class of the U.S. Department of Defense standard of Trusted Computer System Evaluation Criteria and the material upon which those requirements are based.[1]

References

[edit]
  1. ^ a b c "CONTROLLED ACCESS PROTECTION PROFILE Version 1.d" (PDF). National Security Agency. 8 October 1999. p. 9. Retrieved 30 June 2025.