600.436 High-Assurance Systems
Fall 01/Operational Assurance
30
Independent Vulnerability Analysis
¨The developer shall perform and document an analysis of the TOE deliverables searching for ways in which a user can violate the TSP
–The documentation shall justify that the TOE, with the identified vulnerabilities, is resistant to obvious penetration attacks