Department of Defense Trusted Computer System Evaluation Criteria

reportActive / Technical Report | Accession Number: ADA207905 | Open PDF

Abstract:

The trusted computer system evaluation criteria defined in this document classify systems into four broad hierarchical divisions of enhanced security protection. The criteria provide a basis for the evaluation of effectiveness of security controls built into automatic data processing system products. The criteria were developed with three objectives in mind a to provide guidance to manufacturers as to what to build into their new, widely- available trusted commercial products in order to satisfy trust requirements for sensitive applications and as a standard for DoD evaluation thereof b to provide users with a yardstick with which to assess the degree of trust that can be placed in computer systems for the secure processing of classified or other sensitive information c to provide a basis for specifying security requirements in acquisitions. Two types of requirements are delineated for secure processing a specific security feature requirements and b assurance requirements. Some of the latter requirements enable evaluation personnel to determine if the required features are present and functioning as intended.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms