|  |  |  |  |  |  |  |  |  | 
   
    | ¨ | The
    developer shall perform and document 
 | 
   
    |  | 
   
    |  | an
    analysis of the TOE deliverables 
 |  | 
   
    |  | 
   
    |  | searching
    for ways in which a user can 
 |  | 
   
    |  | 
   
    |  | violate
    the TSP 
 |  | 
   
    |  | 
   
    |  | – | The
    documentation shall justify that the 
 |  | 
   
    |  | 
   
    |  | TOE,
    with the identified vulnerabilities, is 
 |  | 
   
    |  | 
   
    |  | resistant
    to obvious penetration attacks 
 |  |