Independent Vulnerability Analysis
¨ The developer shall perform and document
an analysis of the TOE deliverables
searching for ways in which a user can
violate the TSP
The documentation shall justify that the
TOE, with the identified vulnerabilities, is
resistant to obvious penetration attacks
600.436 High-Assurance Systems
Fall 01/Operational Assurance
30