|
|
|
|
|
|
|
|
|
|
|
|
Protection Profile Structure:
|
|
Security Objectives
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
IT
Security Objectives
|
|
|
|
– |
“Executive
summary” of security capabilities
|
|
provided
by the TOE
|
|
|
|
– |
Drive
the Security Function requirements
|
|
|
¨ |
Non-IT
Objectives
|
|
|
|
– |
“Executive
summary” of constraints on how
|
|
|
TOE
be operated
|
|
|
|
– |
Ultimately
drive the details of the user and
|
|
|
administrator
documentation
|
|
|
|
|
|
|
600.436 High-
|
|
|
Assurance
Systems
|
|
|
|
|
Fall
01/Protection Profiles
|
|
|
|
|
|
|
|
|