¨The actual representation (e.g.,
source code) from which a TOE is generated
¨Must include representations of all
elements of the TOE that have been previously identified (in,
e.g., the LLD) as being:
–Security enforcing
–Relied upon to behave in a specified
fashion by security enforcing elements (also called security
relevant)