¨Describe the TOE Security Functions
(TSF) as
Seen From the Inside
¨Provide the Basis For Understanding
How the
TSF Actually Meet ST Security Function Requirements
¨Provide the Information Needed to
Analyze the Correctness of the TSF With Respect to the System
Security Concept Specifications
¨Provide the Basis For Developing
“White Box” Tests of the Security Functions