¨The
developer shall conduct a search for covert channels for each information flow control
policy.
¨The
developer shall provide covert channel analysis documentation that shall:
–provide evidence that the method used to identify covert
channels is exhaustive
•“exhaustive” is meant to imply that there are strong arguments that
following the CCA plan will uncover all covert channels that might exist