¨The developer shall perform and document an
analysis of the TOE deliverables searching for obvious ways in which a
user can violate the TSP
–The documentation shall show, for
all identified vulnerabilities, that the vulnerability
cannot be exploited in the intended environment for the TOE
¨The developer shall document the disposition
of obvious vulnerabilities