 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
Definition – Security Policy Model
|
|
|
|
|
 |
 |
 |
 |
¨ |
Description
of the security rules and
|
|
|
|
characteristics
that determine the operation
|
|
|
|
of
the TOE Security Functions, as accessed
|
|
|
through the
external TOE interfaces
|
|
|
|
|
|
 |
600.436 High-
|
|
|
Assurance
Systems
|
|
|
|
|
Fall
01/Protection Profiles
|
|
|
|
|
|
|
|
|