Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
The Center, 1988 - Computers - 36 pages
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
What people are saying - Write a review
We haven't found any reviews in the usual places.
ability able access control lists actions ADP system allow and/or assurance and documentation assurance requirements audit data auditing mechanism auditing subsystem authentication data Code collection comply Computer Security Center computer security subsystems contained in Section D2 class DAC subsystem defined dependent described Design Documentation determine Discretionary Access Control Documentation D2 documentation requirements effective enforce explained feature requirements given groups hardware I&A subsystem identification and authentication implemented individual Integrity interface limited listed mediate meet National Computer Security NCSC necessary Object reuse subsystems pass perform portions protected system protection mechanisms Rationale/Discussion recorded relevant REPORT required supporting functions requirement applies requirements and interpretations resulting satisfied Security Features User's Security Testing security-relevant selective sharing specify storage objects subjects subset subsystems evaluated system administrator System Integrity TCSEC Quote TCSEC requirements Test Documentation Trusted Trusted Facility Manual unauthorized unique user identities