 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
The
developer shall conduct a search for
|
|
|
|
covert
channels for each information flow
|
|
|
|
control
policy.
|
|
|
¨ |
The
developer shall provide covert channel
|
|
|
analysis
documentation that shall:
|
|
|
|
– |
provide
evidence that the method used to
|
|
|
|
identify
covert channels is systematic
|
|
|
|
• |
Primary
additional requirement here is that there be
|
|
|
a
systematic strategy for identifying and verifying
|
|
|
|
covert
channels
|
|