¨The
developer shall perform and document an analysis of the TOE deliverables searching for ways
in which a user can violate the TSP
–The documentation shall justify that the TOE, with the
identified vulnerabilities, is resistant to obvious penetration
attacks