A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems

Author: Joan Fowler

Publisher: DIANE Publishing

Published: 1994-06

Total Pages: 163

ISBN-13: 0788110241

DOWNLOAD EBOOK

Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.


Book Synopsis A Guide to Procurement of Trusted Systems by : Joan Fowler

Download or read book A Guide to Procurement of Trusted Systems written by Joan Fowler and published by DIANE Publishing. This book was released on 1994-06 with total page 163 pages. Available in PDF, EPUB and Kindle. Book excerpt: Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.


A Guide to Understanding Trusted Distribution in Trusted Systems

A Guide to Understanding Trusted Distribution in Trusted Systems

Author:

Publisher:

Published: 1988

Total Pages: 40

ISBN-13:

DOWNLOAD EBOOK


Book Synopsis A Guide to Understanding Trusted Distribution in Trusted Systems by :

Download or read book A Guide to Understanding Trusted Distribution in Trusted Systems written by and published by . This book was released on 1988 with total page 40 pages. Available in PDF, EPUB and Kindle. Book excerpt:


A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements

A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements

Author:

Publisher:

Published: 1992

Total Pages: 140

ISBN-13:

DOWNLOAD EBOOK

This document, the first of a four volume set on Trusted Systems Procurement, is a guideline designed for those who must identify and satisfy deliverable data requirements associated with security-relevant acquisitions of trusted, stand-alone systems. It identifies what must be complied with, what must be read, what must be written, and what others must be instructed to write. The detailed acquisition process, coupled with the technical complexity of computers, security, and contracting, represents an unsolvable mystery for many. The goal of this document is to help clarify the complex issues. It applies to AIS developers purchasers, or program managers who deliver systems to customers. It specifically supports acquisition of systems from commercial-off-the-shelf (COTS) products on the Evaluated Products List (EPL). It will help those responsible to develop plans and procedures for acquisition of trusted, stand-alone systems. Specifically, it will help identify security-relevant data to be delivered by a contractor.


Book Synopsis A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements by :

Download or read book A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements written by and published by . This book was released on 1992 with total page 140 pages. Available in PDF, EPUB and Kindle. Book excerpt: This document, the first of a four volume set on Trusted Systems Procurement, is a guideline designed for those who must identify and satisfy deliverable data requirements associated with security-relevant acquisitions of trusted, stand-alone systems. It identifies what must be complied with, what must be read, what must be written, and what others must be instructed to write. The detailed acquisition process, coupled with the technical complexity of computers, security, and contracting, represents an unsolvable mystery for many. The goal of this document is to help clarify the complex issues. It applies to AIS developers purchasers, or program managers who deliver systems to customers. It specifically supports acquisition of systems from commercial-off-the-shelf (COTS) products on the Evaluated Products List (EPL). It will help those responsible to develop plans and procedures for acquisition of trusted, stand-alone systems. Specifically, it will help identify security-relevant data to be delivered by a contractor.


A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems

Author: USA. National Computer Security Center

Publisher:

Published: 1992

Total Pages:

ISBN-13:

DOWNLOAD EBOOK


Book Synopsis A Guide to Procurement of Trusted Systems by : USA. National Computer Security Center

Download or read book A Guide to Procurement of Trusted Systems written by USA. National Computer Security Center and published by . This book was released on 1992 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:


A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial

A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial

Author:

Publisher:

Published: 1994

Total Pages: 159

ISBN-13:

DOWNLOAD EBOOK

A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, Volume 3 of 4 in the Procurement Guideline Series, is written to be used by Federal Agencies to help facilitate the definition of computer security deliverables required in the acquisition of trusted products in accordance with DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria. It is designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. The emphasis of this guideline is on the data requirements for products. Volume 3 specifies the data deliverables to meet security assurance needs by providing guidance on Contract Data Requirements Lists (CDRLs) and their associated Data Item Descriptions (DIDs).


Book Synopsis A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial by :

Download or read book A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial written by and published by . This book was released on 1994 with total page 159 pages. Available in PDF, EPUB and Kindle. Book excerpt: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, Volume 3 of 4 in the Procurement Guideline Series, is written to be used by Federal Agencies to help facilitate the definition of computer security deliverables required in the acquisition of trusted products in accordance with DoD 5200.28-STD, Department of Defense Trusted Computer System Evaluation Criteria. It is designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. The emphasis of this guideline is on the data requirements for products. Volume 3 specifies the data deliverables to meet security assurance needs by providing guidance on Contract Data Requirements Lists (CDRLs) and their associated Data Item Descriptions (DIDs).


A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators

A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators

Author:

Publisher:

Published: 1993

Total Pages: 69

ISBN-13:

DOWNLOAD EBOOK

The National Security Agency (NSA) wants to clarify the computer security aspects of the Department of Defense (DoD) automated information system (AIS) acquisition process. Therefore, it is producing a four volume guideline series (referenced in Table 1-1 and more complete titles in the Bibliography). This document is the second volume. These guidelines are intended for Federal agency use in acquiring trusted systems. DoD Directive 5200.28, Security Requirements for Automated Information Systems (AISs), provides security requirements concerning all protection aspects of automated information systems. It specifies DoD 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC), as the requirement source for trusted computer systems. The second page of DoD 5200.28-STD states: 'This document is used to provide a basis for specifying security requirements in acquisition specifications'


Book Synopsis A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators by :

Download or read book A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators written by and published by . This book was released on 1993 with total page 69 pages. Available in PDF, EPUB and Kindle. Book excerpt: The National Security Agency (NSA) wants to clarify the computer security aspects of the Department of Defense (DoD) automated information system (AIS) acquisition process. Therefore, it is producing a four volume guideline series (referenced in Table 1-1 and more complete titles in the Bibliography). This document is the second volume. These guidelines are intended for Federal agency use in acquiring trusted systems. DoD Directive 5200.28, Security Requirements for Automated Information Systems (AISs), provides security requirements concerning all protection aspects of automated information systems. It specifies DoD 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC), as the requirement source for trusted computer systems. The second page of DoD 5200.28-STD states: 'This document is used to provide a basis for specifying security requirements in acquisition specifications'


A Guide to Understanding Security Testing and Test Documentation in Trusted Systems

A Guide to Understanding Security Testing and Test Documentation in Trusted Systems

Author: Virgil D. Gligor

Publisher:

Published: 1994

Total Pages: 136

ISBN-13:

DOWNLOAD EBOOK

"The National Computer Security Center is issuing A Guide to Understanding Security Testing and Test Documentation in Trusted Systems as part of the Rainbow Series of documents our Technical Guidelines Program produces. In the Rainbow Series, we discuss in detail the features of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 5200.28-STD) and provide guidance for meeting each requirement. The National Computer Security Center, through its Trusted Product Evaluation Program, evaluates the security features of commercially produced computer systems. Together, these programs ensure that users are capable of protecting their important data with trusted computer systems. The specific guidelines in this document provide a set of good practices related to security testing and the development of test documentation. This technical guideline has been written to help the vendor and evaluator community understand what deliverables are required for test documentation, as well as the level of detail required of security testing at all classes in the Trusted Computer System Evaluation Criteria."--DTIC.


Book Synopsis A Guide to Understanding Security Testing and Test Documentation in Trusted Systems by : Virgil D. Gligor

Download or read book A Guide to Understanding Security Testing and Test Documentation in Trusted Systems written by Virgil D. Gligor and published by . This book was released on 1994 with total page 136 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The National Computer Security Center is issuing A Guide to Understanding Security Testing and Test Documentation in Trusted Systems as part of the Rainbow Series of documents our Technical Guidelines Program produces. In the Rainbow Series, we discuss in detail the features of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 5200.28-STD) and provide guidance for meeting each requirement. The National Computer Security Center, through its Trusted Product Evaluation Program, evaluates the security features of commercially produced computer systems. Together, these programs ensure that users are capable of protecting their important data with trusted computer systems. The specific guidelines in this document provide a set of good practices related to security testing and the development of test documentation. This technical guideline has been written to help the vendor and evaluator community understand what deliverables are required for test documentation, as well as the level of detail required of security testing at all classes in the Trusted Computer System Evaluation Criteria."--DTIC.


A Guide to Understanding Trusted Recovery in Trusted Systems

A Guide to Understanding Trusted Recovery in Trusted Systems

Author: Virgil D. Gligor

Publisher: DIANE Publishing

Published: 1994-03

Total Pages: 68

ISBN-13: 9780788105517

DOWNLOAD EBOOK

Provides a set of good practices related to trusted recovery. Helps the vendor and evaluator community understand the requirements for trusted recovery at all applicable classes. Includes: failures, discontinuities, and recovery; properties of trusted recovery; design approaches for trusted recovery; impact on trusted recovery; and satisfying requirements. Glossary and bibliography.


Book Synopsis A Guide to Understanding Trusted Recovery in Trusted Systems by : Virgil D. Gligor

Download or read book A Guide to Understanding Trusted Recovery in Trusted Systems written by Virgil D. Gligor and published by DIANE Publishing. This book was released on 1994-03 with total page 68 pages. Available in PDF, EPUB and Kindle. Book excerpt: Provides a set of good practices related to trusted recovery. Helps the vendor and evaluator community understand the requirements for trusted recovery at all applicable classes. Includes: failures, discontinuities, and recovery; properties of trusted recovery; design approaches for trusted recovery; impact on trusted recovery; and satisfying requirements. Glossary and bibliography.


Guide to Understanding Design Documentation in Trusted Systems

Guide to Understanding Design Documentation in Trusted Systems

Author:

Publisher: DIANE Publishing

Published: 1995-10

Total Pages: 44

ISBN-13: 9780788122309

DOWNLOAD EBOOK

A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.


Book Synopsis Guide to Understanding Design Documentation in Trusted Systems by :

Download or read book Guide to Understanding Design Documentation in Trusted Systems written by and published by DIANE Publishing. This book was released on 1995-10 with total page 44 pages. Available in PDF, EPUB and Kindle. Book excerpt: A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.


A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems

Author: Melvin L. DeVilbiss

Publisher:

Published: 1998-12-01

Total Pages: 60

ISBN-13: 9780788174490

DOWNLOAD EBOOK

Will help facilitate the acquisition of trusted computer systems in accordance with DoD Trusted Computer System Evaluation Criteria. Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Topics addressed include the procurement process, request for proposal, evaluation factors for award, nonmandatory requirements and options, evidence availability, documentation cost, interpreting the TCSEC, standard solicitation language, and descriptions, specifications, and statements of work.


Book Synopsis A Guide to Procurement of Trusted Systems by : Melvin L. DeVilbiss

Download or read book A Guide to Procurement of Trusted Systems written by Melvin L. DeVilbiss and published by . This book was released on 1998-12-01 with total page 60 pages. Available in PDF, EPUB and Kindle. Book excerpt: Will help facilitate the acquisition of trusted computer systems in accordance with DoD Trusted Computer System Evaluation Criteria. Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Topics addressed include the procurement process, request for proposal, evaluation factors for award, nonmandatory requirements and options, evidence availability, documentation cost, interpreting the TCSEC, standard solicitation language, and descriptions, specifications, and statements of work.