Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
LIST OF TABLES<br />
Table 1-1 <strong>Procurement</strong> <strong>Guide</strong>line Series 1<br />
Table 1-2 <strong>Guide</strong>line Overview 4<br />
Table 2-1 RFP Organization 18<br />
Table 3-1 Division D, Minimal Protection 24<br />
Table 3-2 Division C, Discretionary Protection 25<br />
Table 3-3 Division B, Manda<strong>to</strong>ry Protection 25<br />
Table 3-4 Division A, Verified Protection 26<br />
Table 4-1 Security Modes and Minimum Division/Class 45<br />
Table 4-2 Input <strong>to</strong> <strong>the</strong> System Threat Assessment Report (STAR) 48<br />
Table 4-3 Suggested Changes and Additions <strong>to</strong> <strong>the</strong> DoD 5000.2-M<br />
STAR Guidance <strong>to</strong> Adapt <strong>to</strong> AISs 49<br />
Table 5-1 DT&E Objectives 56<br />
Table 5-2 OT&E Objectives 57<br />
Table 5-3 Desired MOE/MOP Characteristics 59<br />
Table 6-1 Risk Management Activity 64<br />
Table 6-2 Supporting Documentation 67<br />
Table 6-3 Supplementary Documentation 68<br />
Table 6-4 Data Collection Sources 70<br />
Table 6-5 Accreditation Supporting Documentation 73<br />
<strong>Page</strong> 14