23.11.2014 Views

Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt

Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt

Page 1 A Guide to the Procurement of Trusted Systems: An ... - csirt

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

LIST OF TABLES<br />

Table 1-1 <strong>Procurement</strong> <strong>Guide</strong>line Series 1<br />

Table 1-2 <strong>Guide</strong>line Overview 4<br />

Table 2-1 RFP Organization 18<br />

Table 3-1 Division D, Minimal Protection 24<br />

Table 3-2 Division C, Discretionary Protection 25<br />

Table 3-3 Division B, Manda<strong>to</strong>ry Protection 25<br />

Table 3-4 Division A, Verified Protection 26<br />

Table 4-1 Security Modes and Minimum Division/Class 45<br />

Table 4-2 Input <strong>to</strong> <strong>the</strong> System Threat Assessment Report (STAR) 48<br />

Table 4-3 Suggested Changes and Additions <strong>to</strong> <strong>the</strong> DoD 5000.2-M<br />

STAR Guidance <strong>to</strong> Adapt <strong>to</strong> AISs 49<br />

Table 5-1 DT&E Objectives 56<br />

Table 5-2 OT&E Objectives 57<br />

Table 5-3 Desired MOE/MOP Characteristics 59<br />

Table 6-1 Risk Management Activity 64<br />

Table 6-2 Supporting Documentation 67<br />

Table 6-3 Supplementary Documentation 68<br />

Table 6-4 Data Collection Sources 70<br />

Table 6-5 Accreditation Supporting Documentation 73<br />

<strong>Page</strong> 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!