¨ The developer shall conduct a search for
covert channels for each information flow
control policy.
¨ The developer shall provide covert channel
analysis documentation that shall:
provide evidence that the method used to
identify covert channels is systematic
Primary additional requirement here is that there be
a systematic strategy for identifying and verifying
covert channels
600.436 High-Assurance Systems
Fall 01/Operational Assurance
20