A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial
NATIONAL COMPUTER SECURITY CENTER FORT GEORGE G MEADE MD
Pagination or Media Count:
A Guide to Procurement of Trusted Systems Computer Security Contract Data Requirements List and Data Item Description Tutorial, Volume 3 of 4 in the Procurement Guideline Series, is written to be used by Federal Agencies to help facilitate the definition of computer security deliverables required in the acquisition of trusted products in accordance with DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria. It is designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. The emphasis of this guideline is on the data requirements for products. Volume 3 specifies the data deliverables to meet security assurance needs by providing guidance on Contract Data Requirements Lists CDRLs and their associated Data Item Descriptions DIDs.
- Computer Systems Management and Standards