Accession Number:

ADA393184

Title:

A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial

Descriptive Note:

Final rept.

Corporate Author:

NATIONAL COMPUTER SECURITY CENTER FORT GEORGE G MEADE MD

Personal Author(s):

Report Date:

1994-02-28

Pagination or Media Count:

159.0

Abstract:

A Guide to Procurement of Trusted Systems Computer Security Contract Data Requirements List and Data Item Description Tutorial, Volume 3 of 4 in the Procurement Guideline Series, is written to be used by Federal Agencies to help facilitate the definition of computer security deliverables required in the acquisition of trusted products in accordance with DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria. It is designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. The emphasis of this guideline is on the data requirements for products. Volume 3 specifies the data deliverables to meet security assurance needs by providing guidance on Contract Data Requirements Lists CDRLs and their associated Data Item Descriptions DIDs.

Subject Categories:

  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE