600.436 High-Assurance Systems
Fall 01/Introduction
22
Developer Inputs
¨User Requirements – preferably as:
–CC Protection Profiles
–User-system-specific CC Security Target
¨Evaluation Scheme policies and procedures that implicitly or explicitly define the details of evidence identified by the CC and CEM