Security Target Usage
¨
Users (User Advocates) - Compare
Implementation to Stated Needs
¨
Developers - Communicate Provision
¨
Evaluators - Basis for Assessing
- Basis for Resource
Allocation
600.436 High-
Assurance Systems
Fall 01/Protection Profiles
6