Evaluation Criteria Flashcards
Orange Book
DoD Trusted Computer System Evaluation Criteria
Green Book
DoD Password Management Guidelines
Yellow Book
Guidance for Applying TCSEC in Specific Environments
Tan Book
A Guide to Understanding Audit in Trusted Systems
Bright Blue Book
Trusted Product Evaluation: A Guide for Vendors
Light Blue Book
PC Security Considerations
Neon Orange Book
A Guide to Understanding Discretionary Access Controls in Trusted Systems
Aqua Book
Glossary of Computer Security Terms
Red Book
Trusted Network Interpretation
Amber Book
A Guide to Understanding Configuration Management in Trusted Systems
Burgundy Book
A Guide to Understanding Design Documentation in Trusted Systems
Lavender Book
A Guide to Understanding Trusted Distribution in Trusted Systems
Venice Blue Book
Computer Security Subsystem Interpretation of the TCSEC
C1
Discretionary Protection
C2
Controlled Access Protection
B1
Labeled Security
B2
Structured Protection
B3
Security Domains
A1
Verified Protection
Category A
Verified protection. The highest level of security.
Category B
Mandatory protection.
Category C
Discretionary protection.
Category D
Minimal protection. Reserved for systems that have been evaluated but do not meet requirements to belong to any other category.
EAL1
Functionally tested. Applies when some confidence in correct operation is required but where threats to security are not serious. This is of value when independent assurance that due care has been exercised in protecting personal information is necessary.