600.436 High-
Assurance Systems
Fall 01/Introduction
22
Developer Inputs
¨
User Requirements – preferably as:
–
CC Protection Profiles
–
User-system-specific CC Security Target
¨
Evaluation Scheme policies and procedures
that implicitly or explicitly define the
details of evidence identified by the CC and
CEM