 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
 |
Protection Profile Structure:
|
|
|
Intended Security Environment
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Threats
Intending to Address/Counter
|
|
|
|
– |
Threat
Agent
|
|
|
|
– |
Attack
|
|
|
|
– |
Asset
|
|
|
¨ |
Description
of Organizational Security
|
|
|
Policies
|
|
|
¨ |
Secure
Use Assumptions
|
|
|
|
|
|
 |
600.436 High-
|
|
|
Assurance
Systems
|
|
|
|
|
Fall
01/Protection Profiles
|
|
|
|
|
|
|
|
|