¨The
developer shall conduct a search for covert channels for each information flow control
policy.
¨The
developer shall provide covert channel analysis documentation that shall:
–provide evidence that the method used to identify
covert channels is systematic
•Primary additional requirement here is that there be a systematic
strategy for identifying and verifying covert channels