Security Target Usage
¨ Users (User Advocates) - Compare
Implementation to Stated Needs
¨ Developers - Communicate Provision
¨ Evaluators - Basis for Assessing
                  - Basis for Resource
       Allocation
600.436 High-
Assurance Systems
Fall 01/Protection Profiles
6