|
|
|
|
|
|
|
|
|
¨ |
The
developer shall perform and document
|
|
|
an
analysis of the TOE deliverables
|
|
|
|
searching
for ways in which a user can
|
|
|
|
violate
the TSP
|
|
|
|
– |
The
documentation shall justify that the
|
|
|
|
TOE,
with the identified vulnerabilities, is
|
|
|
|
resistant
to obvious penetration attacks
|
|