 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Security
Functionality Provided
|
|
|
|
– |
“…set
of operations that a module performs in
|
|
|
contribution
to security functions implemented by the
|
|
|
TOE.”
|
|
|
|
– |
Modules
don’t necessarily have to relate to specific
|
|
|
security
functions
|
|
|
|
– |
Many-to-many
relationship between security functions
|
|
and
modules
|
|
|
¨ |
Internal
Consistency –Only Defined Interfaces
|
|
|
Are
Used For Inter-Module Interactions
|
|
|
¨ |
Dependencies
On Other Modules
|
|
|
|
– |
Security
Functions from other modules that a module
|
|
|
uses
to provide its security functions
|
|