A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements
Author | : |
Publisher | : |
Total Pages | : 140 |
Release | : 1992 |
ISBN-10 | : OCLC:227968361 |
ISBN-13 | : |
Rating | : 4/5 ( Downloads) |
Download or read book A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements written by and published by . This book was released on 1992 with total page 140 pages. Available in PDF, EPUB and Kindle. Book excerpt: This document, the first of a four volume set on Trusted Systems Procurement, is a guideline designed for those who must identify and satisfy deliverable data requirements associated with security-relevant acquisitions of trusted, stand-alone systems. It identifies what must be complied with, what must be read, what must be written, and what others must be instructed to write. The detailed acquisition process, coupled with the technical complexity of computers, security, and contracting, represents an unsolvable mystery for many. The goal of this document is to help clarify the complex issues. It applies to AIS developers purchasers, or program managers who deliver systems to customers. It specifically supports acquisition of systems from commercial-off-the-shelf (COTS) products on the Evaluated Products List (EPL). It will help those responsible to develop plans and procedures for acquisition of trusted, stand-alone systems. Specifically, it will help identify security-relevant data to be delivered by a contractor.