💾 Archived View for spam.works › mirrors › textfiles › hacking › orange captured on 2023-11-04 at 13:24:48.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-


orange-boot.txt: No such file or directory
% cat orange.boo
orange.boo: No such file or directory
% cat orange-book.txt
                                                                 CSC-STD-001-83
                                                           Library No. S225,711





                             DEPARTMENT OF DEFENSE

                TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA







                                15 August 1983



                                                                 CSC-STD-001-83






                               FOREWORD


This publication, "Department of Defense Trusted Computer System Evaluation
Criteria," is being issued by the DoD Computer Security Center under the
authority of and in accordance with DoD Directive 5215.1, "Computer Security
Evaluation Center." The criteria defined in this document constitute a uniform
set of basic requirements and evaluation classes for assessing the
effectiveness of security controls built into Automatic Data Processing (ADP)
systems.  These criteria are intended for use in the evaluation and selection
of ADP systems being considered for the processing and/or storage and
retrieval of sensitive or classified information by the Department of Defense.
Point of contact concerning this publication is the Office of Standards and
Products, Attention: Chief, Computer Security Standards.





____________________________                                     15 August 1983
Melville H. Klein
Director
DoD Computer Security Center




                           ACKNOWLEDGMENTS


Special recognition is extended to Sheila L. Brand, DoD Computer Security
Center (DoDCSC), who integrated theory, policy, and practice into and directed
the production of this document.

Acknowledgment is also given for the contributions of: Grace Hammonds and
Peter S. Tasker, the MITRE Corp., Daniel J. Edwards, Col. Roger R. Schell,
Marvin Schaefer, DoDCSC, and Theodore M. P. Lee, Sperry UNIVAC, who as
original architects formulated and articulated the technical issues and
solutions presented in this document; Jeff Makey and Warren F. Shadle,
DoDCSC, who assisted in the preparation of this document; James P. Anderson,
James P. Anderson & Co., Steven B. Lipner, Digital Equipment Corp., Clark
Weissman, System Development Corp., LTC Lawrence A. Noble, formerly U.S. Air
Force, Stephen T. Walker, formerly DoD, Eugene V. Epperly, DoD, and James E.
Studer, formerly Dept. of the Army, who gave generously of their time and
expertise in the review and critique of this document; and finally, thanks are
given to the computer industry and others interested in trusted computing for
their enthusiastic advice and assistance throughout this effort.




                          TABLE OF CONTENTS

FOREWORD. . . . . . . . . . . . . . . . . . . . . . . . . . . .i
ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . . . . . . . . ii
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . .1

                        PART I: THE CRITERIA
Section
1.0  DIVISION D:    MINIMAL PROTECTION. . . . . . . . . . . . .9
2.0  DIVISION C:    DISCRETIONARY PROTECTION. . . . . . . . . 11
     2.1   Class (C1):  Discretionary Security Protection . . 12
     2.2   Class (C2):  Controlled Access Protection. . . . . 15
3.0  DIVISION B:    MANDATORY PROTECTION. . . . . . . . . . . 19
     3.1   Class (B1):  Labeled Security Protection . . . . . 20
     3.2   Class (B2):  Structured Protection . . . . . . . . 26
     3.3   Class (B3):  Security Domains. . . . . . . . . . . 33
4.0  DIVISION A:    VERIFIED PROTECTION . . . . . . . . . . . 41
     4.1   Class (A1):  Verified Design . . . . . . . . . . . 42
     4.2   Beyond Class (A1). . . . . . . . . . . . . . . . . 51

                 PART II: RATIONALE AND GUIDELINES

5.0  CONTROL OBJECTIVES FOR TRUSTED COMPUTER SYSTEMS. . . . . 55
     5.1   A Need for Consensus . . . . . . . . . . . . . . . 56
     5.2   Definition and Usefulness. . . . . . . . . . . . . 56
     5.3   Criteria Control Objective . . . . . . . . . . . . 56
6.0  RATIONALE BEHIND THE EVALUATION CLASSES. . . . . . . . . 63
     6.1   The Reference Monitor Concept. . . . . . . . . . . 64
     6.2   A Formal Security Policy Model . . . . . . . . . . 64
     6.3   The Trusted Computing Base . . . . . . . . . . . . 65
     6.4   Assurance. . . . . . . . . . . . . . . . . . . . . 65
     6.5   The Classes. . . . . . . . . . . . . . . . . . . . 66
7.0  THE RELATIONSHIP BETWEEN POLICY AND THE CRITERIA . . . . 69
     7.1   Established Federal Policies . . . . . . . . . . . 70
     7.2   DoD Policies . . . . . . . . . . . . . . . . . . . 70
     7.3   Criteria Control Objective For Security Policy . . 71
     7.4   Criteria Control Objective for Accountability. . . 74
     7.5   Criteria Control Objective for Assurance . . . . . 76
8.0  A GUIDELINE ON COVERT CHANNELS . . . . . . . . . . . . . 79
9.0  A GUIDELINE ON CONFIGURING MANDATORY ACCESS CONTROL
     FEATURES . . . . . . . . . . . . . . . . . . . . . . . . 81
10.0  A GUIDELINE ON SECURITY TESTING . . . . . . . . . . . . 83
      10.1 Testing for Division C . . . . . . . . . . . . . . 84
      10.2 Testing for Division B . . . . . . . . . . . . . . 84
      10.3 Testing for Division A . . . . . . . . . . . . . . 85
APPENDIX A:  Commercial Product Evaluation Process. . . . . . 87
APPENDIX B:  Summary of Evaluation Criteria Divisions . . . . 89
APPENDIX C:  Sumary of Evaluation Criteria Classes. . . . . . 91
APPENDIX D:  Requirement Directory. . . . . . . . . . . . . . 93

GLOSSARY. . . . . . . . . . . . . . . . . . . . . . . . . . .109

REFERENCES. . . . . . . . . . . . . . . . . . . . . . . . . .115




                                PREFACE


The trusted computer system evaluation criteria defined in this document
classify systems into four broad hierarchical divisions of enhanced security
protection.  They provide a basis for the evaluation of effectiveness of
security controls built into automatic data processing system products.  The
criteria were developed with three objectives in mind: (a) to provide users
with a yardstick with which to assess the degree of trust that can be placed
in computer systems for the secure processing of classified or other sensitive
information; (b) to provide guidance to manufacturers as to what to build into
their new, widely-available trusted commercial products in order to satisfy
trust requirements for sensitive applications; and (c) to provide a basis for
specifying security requirements in acquisition specifications.  Two types of
requirements are delineated for secure processing: (a) specific security
feature requirements and (b) assurance requirements.  Some of the latter
requirements enable evaluation personnel to determine if the required features
are present and functioning as intended.  Though the criteria are
application-independent, it is recognized that the specific security feature
requirements may have to be interpreted when applying the criteria to specific
applications or other special processing environments.  The underlying
assurance requirements can be applied across the entire spectrum of ADP system
or application processing environments without special interpretation.


INTRODUCTION

Historical Perspective

In October 1967, a task force was assembled under the auspices of the Defense
Science Board to address computer security safeguards that would protect
classified information in remote-access, resource-sharing computer systems.
The Task Force report, "Security Controls for Computer Systems," published in
February 1970, made a number of policy and technical recommendations on
actions to be taken to reduce the threat of compromise of classified
information processed on remote-access computer systems.[34]  Department of
Defense Directive 5200.28 and its accompanying manual DoD 5200.28-M, published
in 1972 and 1973 respectivley, responded to one of these recommendations by
establishing uniform DoD policy, security requirements, administrative
controls, and technical measures to protect classified information processed
by DoD computer systems.[8;9]  Research and development work undertaken by the
Air Force, Advanced Research Projects Agency, and other defense agencies in
the early and mid 70's developed and demonstrated solution approaches for the
technical problems associated with controlling the flow of information in
resource and information sharing computer systems.[1]  The DoD Computer
Security Initiative was started in 1977 under the auspices of the Under
Secretary of Defense for Research and Engineering to focus DoD efforts
addressing computer security issues.[33]

Concurrent with DoD efforts to address computer security issues, work was
begun under the leadership of the National Bureau of Standards (NBS) to define
problems and solutions for building, evaluating, and auditing secure computer
systems.[17]  As part of this work NBS held two invitational workshops on the
subject of audit and evaluation of computer security.[20;28]  The first was
held in March 1977, and the second in November of 1978.  One of the products
of the second workshop was a definitive paper on the problems related to
providing criteria for the evaluation of technical computer security
effectiveness.[20]  As an outgrowth of recommendations from this report, and in
support of the DoD Computer Security Initiative, the MITRE Corporation began
work on a set of computer security evaluation criteria that could be used to
assess the degree of trust one could place in a computer system to protect
classified data.[24;25;31]  The preliminary concepts for computer security
evaluation were defined and expanded upon at invitational workshops and
symposia whose participants represented computer security expertise drawn from
industry and academia in addition to the government.  Their work has since
been subjected to much peer review and constructive technical criticism from
the DoD, industrial research and development organizations, universities, and
computer manufacturers.

The DoD Computer Security Center (the Center) was formed in January 1981 to
staff and expand on the work started by the DoD Computer Security
Initiative.[15]  A major goal of the Center as given in its DoD Charter is to
encourage the widespread availability of trusted computer systems for use by
those who process classified or other sensitive information.[10]  The criteria
presented in this document have evolved from the earlier NBS and MITRE
evaluation material.


Scope

The trusted computer system evaluation criteria defined in this document apply
to both trusted general-purpose and trusted embedded (e.g., those dedicated to
a specific application) automatic data processing (ADP) systems.  Included are
two distinct sets of requirements: 1) specific security feature requirements;
and 2) assurance requirements.  The specific feature requirements encompass
the capabilities typically found in information processing systems employing
general-purpose operating systems that are distinct from the applications
programs being supported.  The assurance requirements, on the other hand,
apply to systems that cover the full range of computing environments from
dedicated controllers to full range multilevel secure resource sharing
systems.


Purpose

As outlined in the Preface, the criteria have been developed for a number of
reasons:

           * To provide users with a metric with which to evaluate the
           degree of trust that can be placed in computer systems for
           the secure processing of classified and other sensitive
           information.

           * To provide guidance to manufacturers as to what security
           features to build into their new and planned, commercial
           products in order to provide widely available systems that
           satisfy trust requirements for sensitive applications.

           * To provide a basis for specifying security requirements in
           acquisition specifications.

With respect to the first purpose for development of the criteria, i.e.,
providing users with a security evaluation metric, evaluations can be
delineated into two types: (a) an evaluation can be performed on a computer
product from a perspective that excludes the application environment; or, (b)
it can be done to assess whether appropriate security measures have been taken
to permit the system to be used operationally in a specific environment.  The
former type of evaluation is done by the Computer Security Center through the
Commercial Product Evaluation Process.  That process is described in Appendix
A.

The latter type of evaluation, i.e., those done for the purpose of assessing a
system's security attributes with respect to a specific operational mission,
is known as a certification evaluation.  It must be understood that the
completion of a formal product evaluation does not constitute certification or
accreditation for the system to be used in any specific application
environment.  On the contrary, the evaluation report only provides a trusted
computer system's evaluation rating along with supporting data describing the
product system's strengths and weaknesses from a computer security point of
view.  The system security certification and the formal approval/accreditation
procedure, done in accordance with the applicable policies of the issuing
agencies, must still be followed-before a system can be approved for use in
processing or handling classified information.[8;9]

The trusted computer system evaluation criteria will be used directly and
indirectly in the certification process.  Along with applicable policy, it
will be used directly as the basis for evaluation of the total system and for
specifying system security and certification requirements for new
acquisitions.  Where a system being evaluated for certification employs a
product that has undergone a Commercial Product Evaluation, reports from that
process will be used as input to the certification evaluation.  Technical data
will be furnished to designers, evaluators and the Designated Approving
Authorities to support their needs for making decisions.


Fundamental Computer Security Requirements

Any discussion of computer security necessarily starts from a statement of
requirements, i.e., what it really means to call a computer system "secure."
In general, secure systems will control, through use of specific security
features, access to information such that only properly authorized
individuals, or processes operating on their behalf, will have access to read,
write, create, or delete information.  Six fundamental requirements are
derived from this basic statement of objective: four deal with what needs to
be provided to control access to information; and two deal with how one can
obtain credible assurances that this is accomplished in a trusted computer
system.

                                POLICY

Requirement 1 - SECURITY POLICY - There must be an explicit and well-defined
security policy enforced by the system.  Given identified subjects and
objects, there must be a set of rules that are used by the system to determine
whether a given subject can be permitted to gain access to a specific object.
Computer systems of interest must enforce a mandatory security policy that can
effectively implement access rules for handling sensitive (e.g., classified)
information.[7]  These rules include requirements such as: No person lacking
proper personnel security clearance shall obtain access to classified
information.  In addition, discretionary security controls are required to
ensure that only selected users or groups of users may obtain access to data
(e.g., based on a need-to-know).

Requirement 2 - MARKING - Access control labels must be associated with
objects.  In order to control access to information stored in a computer,
according to the rules of a mandatory security policy, it must be possible to
mark every object with a label that reliably identifies the object's
sensitivity level (e.g., classification), and/or the modes of access accorded
those subjects who may potentially access the object.

                          ACCOUNTABILITY

Requirement 3 - IDENTIFICATION - Individual subjects must be identified.  Each
access to information must be mediated based on who is accessing the
information and what classes of information they are authorized to deal with.
This identification and authorization information must be securely maintained
by the computer system and be associated with every active element that
performs some security-relevant action in the system.

Requirement 4 - ACCOUNTABILITY - Audit information must be selectively kept
and protected so that actions affecting security can be traced to the
responsible party.  A trusted system must be able to record the occurrences of
security-relevant events in an audit log.  The capability to select the audit
events to be recorded is necessary to minimize the expense of auditing and to
allow efficient analysis.  Audit data must be protected from modification and
unauthorized destruction to permit detection and after-the-fact investigations
of security violations.

                             ASSURANCE

Requirement 5 - ASSURANCE - The computer system must contain hardware/software
mechanisms that can be independently evaluated to provide sufficient assurance
that the system enforces requirements 1 through 4 above.  In order to assure
that the four requirements of Security Policy, Marking, Identification, and
Accountability are enforced by a computer system, there must be some
identified and unified collection of hardware and software controls that
perform those functions.  These mechanisms are typically embedded in the
operating system and are designed to carry out the assigned tasks in a secure
manner.  The basis for trusting such system mechanisms in their operational
setting must be clearly documented such that it is possible to independently
examine the evidence to evaluate their sufficiency.

Requirement 6 - CONTINUOUS PROTECTION - The trusted mechanisms that enforce
these basic requirements must be continuously protected against tampering
and/or unauthorized changes.  No computer system can be considered truly
secure if the basic hardware and software mechanisms that enforce the security
policy are themselves subject to unauthorized modification or subversion.  The
continuous protection requirement has direct implications throughout the
computer system's life-cycle.

These fundamental requirements form the basis for the individual evaluation
criteria applicable for each evaluation division and class.  The interested
reader is referred to Section 5 of this document, "Control Objectives for
Trusted Computer Systems," for a more complete discussion and further
amplification of these fundamental requirements as they apply to
general-purpose information processing systems and to Section 7 for
amplification of the relationship between Policy and these requirements.


Structure of the Document

The remainder of this document is divided into two parts, four appendices, and
a glossary.  Part I (Sections 1 through 4) presents the detailed criteria
derived from the fundamental requirements described above and relevant to the
rationale and policy excerpts contained in Part II.

Part II (Sections 5 through 10) provides a discussion of basic objectives,
rationale, and national policy behind the development of the criteria, and
guidelines for developers pertaining to: mandatory access control rules
implementation, the covert channel problem, and security testing.  It is
divided into six sections.  Section 5 discusses the use of control objectives
in general and presents the three basic control objectives of the criteria.
Section 6 provides the theoretical basis behind the criteria.  Section 7 gives
excerpts from pertinent regulations, directives, OMB Circulars, and Executive
Orders which provide the basis for many trust requirements for processing
nationally sensitive and classified information with computer systems.
Section 8 provides guidance to system developers on expectations in dealing
with the covert channel problem.  Section 9 provides guidelines dealing with
mandatory security.  Section 10 provides guidelines for security testing.
There are four appendices, including a description of the Trusted Computer
System Commercial Products Evaluation Process (Appendix A), summaries of the
evaluation divisions (Appendix B) and classes (Appendix C), and finally a
directory of requirements ordered alphabetically.  In addition, there is a
glossary.


Structure of the Criteria

The criteria are divided into four divisions: D, C, B, and A ordered in a
hierarchical manner with the highest division (A) being reserved for systems
providing the most comprehensive security.  Each division represents a major
improvement in the overall confidence one can place in the system for the
protection of sensitive information.  Within divisions C and B there are a
number of subdivisions known as classes.  The classes are also ordered in a
hierarchical manner with systems representative of division C and lower
classes of division B being characterized by the set of computer security
mechanisms that they possess.  Assurance of correct and complete design and
implementation for these systems is gained mostly through testing of the
security- relevant portions of the system.  The security-relevant portions of
a system are referred to throughout this document as the Trusted Computing
Base (TCB).  Systems representative of higher classes in division B and
division A derive their security attributes more from their design and
implementation structure.  Increased assurance that the required features are
operative, correct, and tamperproof under all circumstances is gained through
progressively more rigorous analysis during the design process.

Within each class, four major sets of criteria are addressed.  The first three
represent features necessary to satisfy the broad control objectives of
Security Policy, Accountability, and Assurance that are discussed in Part II,
Section 5.  The fourth set, Documentation, describes the type of written
evidence in the form of user guides, manuals, and the test and design
documentation required for each class.

A reader using this publication for the first time may find it helpful to
first read Part II, before continuing on with Part I.




                        PART I:  THE CRITERIA

Highlighting (UPPERCASE) is used in Part I to indicate criteria not contained
in a lower class or changes and additions to already defined criteria.  Where
there is no highlighting, requirements have been carried over from lower
classes without addition or modification.



1.0  DIVISION D:    MINIMAL PROTECTION

This division contains only one class.  It is reserved for those systems that
have been evaluated but that fail to meet the requirements for a higher
evaluation class.



2.0 DIVISION C:  DISCRETIONARY PROTECTION

Classes in this division provide for discretionary (need-to-know) protection
and, through the inclusion of audit capabilities, for accountability of
subjects and the actions they initiate.


2.1  CLASS (C1):   DISCRETIONARY SECURITY PROTECTION

The Trusted Computing Base (TCB) of a class (C1) system nominally satisfies
the discretionary security requirements by providing separation of users and
data.  It incorporates some form of credible controls capable of enforcing
access limitations on an individual basis, i.e., ostensibly suitable for
allowing users to be able to protect project or private information and to
keep other users from accidentally reading or destroying their data.  The
class (C1) environment is expected to be one of cooperating users processing
data at the same level(s) of sensitivity.  The following are minimal
requirements for systems assigned a class (C1) rating:

2.1.1  SECURITY POLICY

     2.1.1.1   Discretionary Access Control

               THE TCB SHALL DEFINE AND CONTROL ACCESS BETWEEN NAMED USERS AND
             NAMED OBJECTS (E.G., FILES AND PROGRAMS) IN THE ADP SYSTEM.  THE
             ENFORCEMENT MECHANISM (E.G., SELF/GROUP/PUBLIC CONTROLS, ACCESS 
             CONTROL LISTS) SHALL ALLOW USERS TO SPECIFY AND CONTROL SHARING 
             OF THOSE OBJECTS BY NAMED INDIVIDUALS OR DEFINED GROUPS OR BOTH.

2.1.2  ACCOUNTABILITY

     2.1.2.1   Identification and Authentication

               THE TCB SHALL REQUIRE USERS TO IDENTIFY THEMSELVES TO IT BEFORE
             BEGINNING TO PERFORM ANY OTHER ACTIONS THAT THE TCB IS EXPECTED 
             TO MEDIATE.  FURTHERMORE, THE TCB SHALL USE A PROTECTED 
             MECHANISM (E.G., PASSWORDS) TO AUTHENTICATE THE USER'S IDENTITY.
             THE TCB SHALL PROTECT AUTHENTICATION DATA SO THAT IT CANNOT BE 
             ACCESSED BY ANY UNAUTHORIZED USER.

2.1.3  ASSURANCE

     2.1.3.1   Operational Assurance

        2.1.3.1.1  System Architecture

                     THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION
                 THAT PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING
                 (E.G., BY MODIFICATION OF ITS CODE OR DATA STRUCTURES). 
                 RESOURCES CONTROLLED BY THE TCB MAY BE A DEFINED SUBSET 
                 OF THE SUBJECTS AND OBJECTS IN THE ADP SYSTEM.

        2.1.3.1.2  System Integrity

                     HARDWARE AND/OR SOFTWARE FEATURES SHALL BE PROVIDED THAT
                 CAN BE USED TO PERIODICALLY VALIDATE THE CORRECT OPERATION
                 OF THE ON-SITE HARDWARE AND FIRMWARE ELEMENTS OF THE TCB.

     2.1.3.2   Life-Cycle Assurance

        2.1.3.2.1  Security Testing

                     THE SECURITY MECHANISMS OF THE ADP SYSTEM SHALL BE TESTED
                 AND FOUND TO WORK AS CLAIMED IN THE SYSTEM DOCUMENTATION. 
                 TESTING SHALL BE DONE TO ASSURE THAT THERE ARE NO OBVIOUS
                 WAYS FOR AN UNAUTHORIZED USER TO BYPASS OR OTHERWISE 
                 DEFEAT THE SECURITY PROTECTION MECHANISMS OF THE TCB.
                 (SEE THE SECURITY TESTING GUIDELINES.)

2.1.4  DOCUMENTATION

     2.1.4.1   Security Features User's Guide

               A SINGLE SUMMARY, CHAPTER, OR MANUAL IN USER DOCUMENTATION
             SHALL DESCRIBE THE PROTECTION MECHANISMS PROVIDED BY THE TCB,
             GUIDELINES ON THEIR USE, AND HOW THEY INTERACT WITH ONE ANOTHER.

     2.1.4.2   Trusted Facility Manual

               A MANUAL ADDRESSED TO THE ADP SYSTEM ADMINISTRATOR SHALL
             PRESENT CAUTIONS ABOUT FUNCTIONS AND PRIVILEGES THAT SHOULD BE 
             CONTROLLED WHEN RUNNING A SECURE FACILITY.

     2.1.4.3   Test Documentation

               THE SYSTEM DEVELOPER SHALL PROVIDE TO THE EVALUATORS A DOCUMENT
             THAT DESCRIBES THE TEST PLAN AND RESULTS OF THE SECURITY 
             MECHANISMS' FUNCTIONAL TESTING.

     2.1.4.4   Design Documentation

               DOCUMENTATION SHALL BE AVAILABLE THAT PROVIDES A DESCRIPTION OF
             THE MANUFACTURER'S PHILOSOPHY OF PROTECTION AND AN EXPLANATION 
             OF HOW THIS PHILOSOPHY IS TRANSLATED INTO THE TCB.  IF THE TCB 
             IS COMPOSED OF DISTINCT MODULES, THE INTERFACES BETWEEN THESE 
             MODULES SHALL BE DESCRIBED.


2.2  CLASS (C2):    CONTROLLED ACCESS PROTECTION

Systems in this class enforce a more finely grained discretionary access
control than (C1) systems, making users individually accountable for their
actions through login procedures, auditing of security-relevant events, and
resource isolation.  The following are minimal requirements for systems
assigned a class (C2) rating:

2.2.1  SECURITY POLICY

     2.2.1.1   Discretionary Access Control

               The TCB shall define and control access between named users and
             named objects (e.g., files and programs) in the ADP system.  The
             enforcement mechanism (e.g., self/group/public controls, access
             control lists) shall allow users to specify and control sharing
             of those objects by named individuals, or defined groups OF 
             INDIVIDUALS, or by both.  THE DISCRETIONARY ACCESS CONTROL
             MECHANISM SHALL, EITHER BY EXPLICIT USER ACTION OR BY DEFAULT,
             PROVIDE THAT OBJECTS ARE PROTECTED FROM UNAUTHORIZED ACCESS. 
             THESE ACCESS CONTROLS SHALL BE CAPABLE OF INCLUDING OR EXCLUDING
             ACCESS TO THE GRANULARITY OF A SINGLE USER.  ACCESS PERMISSION 
             TO AN OBJECT BY USERS NOT ALREADY POSSESSING ACCESS PERMISSION
             SHALL ONLY BE ASSIGNED BY AUTHORIZED USERS.

     2.2.1.2   Object Reuse

               WHEN A STORAGE OBJECT IS INITIALLY ASSIGNED, ALLOCATED, OR
             REALLOCATED TO A SUBJECT FROM THE TCB'S POOL OF UNUSED STORAGE
             OBJECTS, THE TCB SHALL ASSURE THAT THE OBJECT CONTAINS NO DATA
             FOR WHICH THE SUBJECT IS NOT AUTHORIZED.

2.2.2  ACCOUNTABILITY

     2.2.2.1   Identification and Authentication

               The TCB shall require users to identify themselves to it before
             beginning to perform any other actions that the TCB is expected
             to mediate.  Furthermore, the TCB shall use a protected 
             mechanism (e.g., passwords) to authenticate the user's identity.
             The TCB shall protect authentication data so that it cannot be
             accessed by any unauthorized user.  THE TCB SHALL BE ABLE TO
             ENFORCE INDIVIDUAL ACCOUNTABILITY BY PROVIDING THE CAPABILITY TO
             UNIQUELY IDENTIFY EACH INDIVIDUAL ADP SYSTEM USER.  THE TCB 
             SHALL ALSO PROVIDE THE CAPABILITY OF ASSOCIATING THIS IDENTITY
             WITH ALL AUDITABLE ACTIONS TAKEN BY THAT INDIVIDUAL.

     2.2.2.2   Audit

               THE TCB SHALL BE ABLE TO CREATE, MAINTAIN, AND PROTECT FROM
             MODIFICATION OR UNAUTHORIZED ACCESS OR DESTRUCTION AN AUDIT 
             TRAIL OF ACCESSES TO THE OBJECTS IT PROTECTS.  THE AUDIT DATA
             SHALL BE PROTECTED BY THE TCB SO THAT READ ACCESS TO IT IS
             LIMITED TO THOSE WHO ARE AUTHORIZED FOR AUDIT DATA.  THE TCB
             SHALL BE ABLE TO RECORD THE FOLLOWING TYPES OF EVENTS: USE OF
             IDENTIFICATION AND AUTHENTICATION MECHANISMS, INTRODUCTION OF 
             OBJECTS INTO A USER'S ADDRESS SPACE (E.G., FILE OPEN, PROGRAM
             INITIATION), DELETION OF OBJECTS, AND ACTIONS TAKEN BY
             COMPUTER OPERATORS AND SYSTEM ADMINISTRATORS AND/OR SYSTEM
             SECURITY OFFICERS.  FOR EACH RECORDED EVENT, THE AUDIT RECORD
             SHALL IDENTIFY: DATE AND TIME OF THE EVENT, USER, TYPE OF 
             EVENT, AND SUCCESS OR FAILURE OF THE EVENT.  FOR 
             IDENTIFICATION/AUTHENTICATION EVENTS THE ORIGIN OF REQUEST
             (E.G., TERMINAL ID) SHALL BE INCLUDED IN THE AUDIT RECORD.  FOR
             EVENTS THAT INTRODUCE AN OBJECT INTO A USER'S ADDRESS SPACE AND
             FOR OBJECT DELETION EVENTS THE AUDIT RECORD SHALL INCLUDE THE 
             NAME OF THE OBJECT.  THE ADP SYSTEM ADMINISTRATOR SHALL BE ABLE
             TO SELECTIVELY AUDIT THE ACTIONS OF ANY ONE OR MORE USERS BASED
             ON INDIVIDUAL IDENTITY.

2.2.3  ASSURANCE

     2.2.3.1   Operational Assurance

        2.2.3.1.1  System Architecture

                     The TCB shall maintain a domain for its own execution
                 that protects it from external interference or tampering
                 (e.g., by modification of its code or data structures). 
                 Resources controlled by the TCB may be a defined subset
                 of the subjects and objects in the ADP system.  THE TCB
                 SHALL ISOLATE THE RESOURCES TO BE PROTECTED SO THAT THEY
                 ARE SUBJECT TO THE ACCESS CONTROL AND AUDITING 
                 REQUIREMENTS.

        2.2.3.1.2  System Integrity

                     Hardware and/or software features shall be provided that
                 can be used to periodically validate the correct operation
                 of the on-site hardware and firmware elements of the TCB.

     2.2.3.2   Life-Cycle Assurance

        2.2.3.2.1  Security Testing

                     The security mechanisms of the ADP system shall be tested
                 and found to work as claimed in the system documentation.
                 Testing shall be done to assure that there are no obvious
                 ways for an unauthorized user to bypass or otherwise
                 defeat the security protection mechanisms of the TCB.
                 TESTING SHALL ALSO INCLUDE A SEARCH FOR OBVIOUS FLAWS THAT
                 WOULD ALLOW VIOLATION OF RESOURCE ISOLATION, OR THAT WOULD
                 PERMIT UNAUTHORIZED ACCESS TO THE AUDIT OR AUTHENTICATION
                 DATA.  (See the Security Testing guidelines.)

2.2.4  DOCUMENTATION

     2.2.4.1   Security Features User's Guide

               A single summary, chapter, or manual in user documentation
             shall describe the protection mechanisms provided by the TCB, 
             guidelines on their use, and how they interact with one another.

     2.2.4.2   Trusted Facility Manual

               A manual addressed to the ADP system administrator shall
             present cautions about functions and privileges that should be
             controlled when running a secure facility.  THE PROCEDURES FOR
             EXAMINING AND MAINTAINING THE AUDIT FILES AS WELL AS THE
             DETAILED AUDIT RECORD STRUCTURE FOR EACH TYPE OF AUDIT EVENT
             SHALL BE GIVEN.

     2.2.4.3   Test Documentation

               The system developer shall provide to the evaluators a document
             that describes the test plan and results of the security 
             mechanisms' functional testing.

     2.2.4.4   Design Documentation

               Documentation shall be available that provides a description of
             the manufacturer's philosophy of protection and an explanation
             of how this philosophy is translated into the TCB.  If the TCB
             is composed of distinct modules, the interfaces between these
             modules shall be described.



3.0  DIVISION B:    MANDATORY PROTECTION

The notion of a TCB that preserves the integrity of sensitivity labels and
uses them to enforce a set of mandatory access control rules is a major
requirement in this division.  Systems in this division must carry the
sensitivity labels with major data structures in the system.  The system
developer also provides the security policy model on which the TCB is based
and furnishes a specification of the TCB.  Evidence must be provided to
demonstrate that the reference monitor concept has been implemented.


3.1  CLASS (B1):    LABELED SECURITY PROTECTION

Class (B1) systems require all the features required for class (C2).  In
addition, an informal statement of the security policy model, data labeling,
and mandatory access control over named subjects and objects must be present.
The capability must exist for accurately labeling exported information.  Any
flaws identified by testing must be removed.  The following are minimal
requirements for systems assigned a class (B1) rating:

3.1.1  SECURITY POLICY

     3.1.1.1   Discretionary Access Control

               The TCB shall define and control access between named users and
             named objects (e.g., files and programs) in the ADP system.  
             The enforcement mechanism (e.g., self/group/public controls, 
             access control lists) shall allow users to specify and control
             sharing of those objects by named individuals, or defined groups
             of individuals, or by both.  The discretionary access control
             mechanism shall, either by explicit user action or by default,
             provide that objects are protected from unauthorized access. 
             These access controls shall be capable of including or excluding
             access to the granularity of a single user.  Access permission
             to an object by users not already possessing access permission
             shall only be assigned by authorized users.

     3.1.1.2   Object Reuse

               When a storage object is initially assigned, allocated, or
             reallocated to a subject from the TCB's pool of unused storage
             objects, the TCB shall assure that the object contains no data
             for which the subject is not authorized.

     3.1.1.3   Labels

               SENSITIVITY LABELS ASSOCIATED WITH EACH SUBJECT AND STORAGE
             OBJECT UNDER ITS CONTROL (E.G., PROCESS, FILE, SEGMENT, DEVICE)
             SHALL BE MAINTAINED BY THE TCB.  THESE LABELS SHALL BE USED AS
             THE BASIS FOR MANDATORY ACCESS CONTROL DECISIONS.  IN ORDER TO
             IMPORT NON-LABELED DATA, THE TCB SHALL REQUEST AND RECEIVE FROM
             AN AUTHORIZED USER THE SECURITY LEVEL OF THE DATA, AND ALL SUCH
             ACTIONS SHALL BE AUDITABLE BY THE TCB.

        3.1.1.3.1  Label Integrity

                     SENSITIVITY LABELS SHALL ACCURATELY REPRESENT SECURITY
                 LEVELS OF THE SPECIFIC SUBJECTS OR OBJECTS WITH WHICH THEY
                 ARE ASSOCIATED.  WHEN EXPORTED BY THE TCB, SENSITIVITY
                 LABELS SHALL ACCURATELY AND UNAMBIGUOUSLY REPRESENT THE
                 INTERNAL LABELS AND SHALL BE ASSOCIATED WITH THE 
                 INFORMATION BEING EXPORTED.

        3.1.1.3.2  Exportation of Labeled Information

                     THE TCB SHALL DESIGNATE EACH COMMUNICATION CHANNEL AND
                 I/O DEVICE AS EITHER SINGLE-LEVEL OR MULTILEVEL.  ANY
                 CHANGE IN THIS DESIGNATION SHALL BE DONE MANUALLY AND
                 SHALL BE AUDITABLE BY THE TCB.  THE TCB SHALL MAINTAIN
                 AND BE ABLE TO AUDIT ANY CHANGE IN THE CURRENT SECURITY
                 LEVEL ASSOCIATED WITH A SINGLE-LEVEL COMMUNICATION 
                 CHANNEL OR I/O DEVICE.

             3.1.1.3.2.1  Exportation to Multilevel Devices

                            WHEN THE TCB EXPORTS AN OBJECT TO A MULTILEVEL I/O
                        DEVICE, THE SENSITIVITY LABEL ASSOCIATED WITH THAT
                        OBJECT SHALL ALSO BE EXPORTED AND SHALL RESIDE ON
                        THE SAME PHYSICAL MEDIUM AS THE EXPORTED 
                        INFORMATION AND SHALL BE IN THE SAME FORM 
                        (I.E., MACHINE-READABLE OR  HUMAN-READABLE FORM).
                        WHEN THE TCB EXPORTS OR IMPORTS AN OBJECT OVER A
                        MULTILEVEL COMMUNICATION CHANNEL, THE PROTOCOL 
                        USED ON THAT CHANNEL SHALL PROVIDE FOR THE
                        UNAMBIGUOUS PAIRING BETWEEN THE SENSITIVITY LABELS
                        AND THE ASSOCIATED INFORMATION THAT IS SENT OR 
                        RECEIVED.

             3.1.1.3.2.2  Exportation to Single-Level Devices

                        SINGLE-LEVEL I/O DEVICES AND SINGLE-LEVEL
                        COMMUNICATION CHANNELS ARE NOT REQUIRED TO 
                        MAINTAIN THE SENSITIVITY LABELS OF THE INFORMATION
                        THEY PROCESS.  HOWEVER, THE TCB SHALL INCLUDE A 
                        MECHANISM BY WHICH THE TCB AND AN AUTHORIZED USER
                        RELIABLY COMMUNICATE TO DESIGNATE THE SINGLE
                        SECURITY LEVEL OF INFORMATION IMPORTED OR EXPORTED
                        VIA SINGLE-LEVEL COMMUNICATION CHANNELS OR I/O 
                        DEVICES.

             3.1.1.3.2.3  Labeling Human-Readable Output

                        THE ADP SYSTEM ADMINISTRATOR SHALL BE ABLE TO
                        SPECIFY THE PRINTABLE LABEL NAMES ASSOCIATED WITH
                        EXPORTED SENSITIVITY LABELS.  THE TCB SHALL MARK
                        THE BEGINNING AND END OF ALL HUMAN-READABLE, PAGED,
                        HARDCOPY OUTPUT (E.G., LINE PRINTER OUTPUT) WITH
                        HUMAN-READABLE SENSITIVITY LABELS THAT PROPERLY*
                        REPRESENT THE SENSITIVITY OF THE OUTPUT.  THE TCB
                        SHALL, BY DEFAULT, MARK THE TOP AND BOTTOM OF EACH
                        PAGE OF HUMAN-READABLE, PAGED, HARDCOPY OUTPUT
                        (E.G., LINE PRINTER OUTPUT) WITH HUMAN-READABLE
                        SENSITIVITY LABELS THAT PROPERLY* REPRESENT THE
                        OVERALL SENSITIVITY OF THE OUTPUT OR THAT PROPERLY*
                        REPRESENT THE SENSITIVITY OF THE INFORMATION ON THE
                        PAGE.  THE TCB SHALL, BY DEFAULT AND IN AN
                        APPROPRIATE MANNER, MARK OTHER FORMS OF HUMAN-
                        READABLE OUTPUT (E.G., MAPS, GRAPHICS) WITH HUMAN-
                        READABLE SENSITIVITY LABELS THAT PROPERLY*
                        REPRESENT THE SENSITIVITY OF THE OUTPUT.  ANY 
                        OVERRIDE OF THESE MARKING DEFAULTS SHALL BE 
                        AUDITABLE BY THE TCB.


           _____________________________________________________________
           * THE HIERARCHICAL CLASSIFICATION COMPONENT IN HUMAN-READABLE
           SENSITIVITY LABELS SHALL BE EQUAL TO THE GREATEST
           HIERARCHICAL CLASSIFICATION OF ANY OF THE INFORMATION IN THE
           OUTPUT THAT THE LABELS REFER TO;  THE NON-HIERARCHICAL
           CATEGORY COMPONENT SHALL INCLUDE ALL OF THE NON-HIERARCHICAL
           CATEGORIES OF THE INFORMATION IN THE OUTPUT THE LABELS REFER
           TO, BUT NO OTHER NON-HIERARCHICAL CATEGORIES.
           _____________________________________________________________


     3.1.1.4   Mandatory Access Control

               THE TCB SHALL ENFORCE A MANDATORY ACCESS CONTROL POLICY OVER
             ALL SUBJECTS AND STORAGE OBJECTS UNDER ITS CONTROL (E.G., 
             PROCESSES, FILES, SEGMENTS, DEVICES).  THESE SUBJECTS AND 
             OBJECTS SHALL BE ASSIGNED SENSITIVITY LABELS THAT ARE A
             COMBINATION OF HIERARCHICAL CLASSIFICATION LEVELS AND
             NON-HIERARCHICAL CATEGORIES, AND THE LABELS SHALL BE USED AS
             THE BASIS FOR MANDATORY ACCESS CONTROL DECISIONS.  THE TCB 
             SHALL BE ABLE TO SUPPORT TWO OR MORE SUCH SECURITY LEVELS.
             (SEE THE MANDATORY ACCESS CONTROL GUIDELINES.) THE FOLLOWING
             REQUIREMENTS SHALL HOLD FOR ALL ACCESSES BETWEEN SUBJECTS AND
             OBJECTS CONTROLLED BY THE TCB: A SUBJECT CAN READ AN OBJECT
             ONLY IF THE HIERARCHICAL CLASSIFICATION IN THE SUBJECT'S
             SECURITY LEVEL IS GREATER THAN OR EQUAL TO THE HIERARCHICAL
             CLASSIFICATION IN THE OBJECT'S SECURITY LEVEL AND THE NON-
             HIERARCHICAL CATEGORIES IN THE SUBJECT'S SECURITY LEVEL INCLUDE
             ALL THE NON-HIERARCHICAL CATEGORIES IN THE OBJECT'S SECURITY
             LEVEL.  A SUBJECT CAN WRITE AN OBJECT ONLY IF THE HIERARCHICAL
             CLASSIFICATION IN THE SUBJECT'S SECURITY LEVEL IS LESS THAN OR
             EQUAL TO THE HIERARCHICAL CLASSIFICATION IN THE OBJECT'S
             SECURITY LEVEL AND ALL THE NON-HIERARCHICAL CATEGORIES IN THE
             SUBJECT'S SECURITY LEVEL ARE INCLUDED IN THE NON- HIERARCHICAL
             CATEGORIES IN THE OBJECT'S SECURITY LEVEL.

3.1.2  ACCOUNTABILITY

     3.1.2.1   Identification and Authentication

               The TCB shall require users to identify themselves to it before
             beginning to perform any other actions that the TCB is expected
             to mediate.  Furthermore, the TCB shall MAINTAIN AUTHENTICATION
             DATA THAT INCLUDES INFORMATION FOR VERIFYING THE IDENTITY OF 
             INDIVIDUAL USERS (E.G., PASSWORDS) AS WELL AS INFORMATION FOR
             DETERMINING THE CLEARANCE AND AUTHORIZATIONS OF INDIVIDUAL
             USERS.  THIS DATA SHALL BE USED BY THE TCB TO AUTHENTICATE the
             user's identity AND TO DETERMINE THE SECURITY LEVEL AND 
             AUTHORIZATIONS OF SUBJECTS THAT MAY BE CREATED TO ACT ON BEHALF
             OF THE INDIVIDUAL USER.  The TCB shall protect authentication
             data so that it cannot be accessed by any unauthorized user.  
             The TCB shall be able to enforce individual accountability by
             providing the capability to uniquely identify each individual
             ADP system user.  The TCB shall also provide the capability of
             associating this identity with all auditable actions taken by
             that individual.

     3.1.2.2   Audit

               The TCB shall be able to create, maintain, and protect from
             modification or unauthorized access or destruction an audit
             trail of accesses to the objects it protects.  The audit data
             shall be protected by the TCB so that read access to it is
             limited to those who are authorized for audit data.  The TCB
             shall be able to record the following types of events: use of
             identification and authentication mechanisms, introduction of
             objects into a user's address space (e.g., file open, program
             initiation), deletion of objects, and actions taken by computer
             operators and system administrators and/or system security
             officers.  THE TCB SHALL ALSO BE ABLE TO AUDIT ANY OVERRIDE OF
             HUMAN-READABLE OUTPUT MARKINGS.  FOR each recorded event, the
             audit record shall identify: date and time of the event, user,
             type of event, and success or failure of the event.  For 
             identification/authentication events the origin of request
             (e.g., terminal ID) shall be included in the audit record.
             For events that introduce an object into a user's address space
             and for object deletion events the audit record shall include
             the name of the object AND THE OBJECT'S SECURITY LEVEL.  The 
             ADP system administrator shall be able to selectively audit the
             actions of any one or more users based on individual identity
             AND/OR OBJECT SECURITY LEVEL.

3.1.3  ASSURANCE

     3.1.3.1   Operational Assurance

        3.1.3.1.1  System Architecture

                     The TCB shall maintain a domain for its own execution
                 that protects it from external interference or tampering
                 (e.g., by modification of its code or data structures). 
                 Resources controlled by the TCB may be a defined subset
                 of the subjects and objects in the ADP system.  THE TCB
                 SHALL MAINTAIN PROCESS ISOLATION THROUGH THE PROVISION OF
                 DISTINCT ADDRESS SPACES UNDER ITS CONTROL.  The TCB shall
                 isolate the resources to be protected so that they are
                 subject to the access control and auditing requirements.

        3.1.3.1.2  System Integrity

                     Hardware and/or software features shall be provided that
                 can be used to periodically validate the correct operation
                 of the on-site hardware and firmware elements of the TCB.

     3.1.3.2   Life-Cycle Assurance

        3.1.3.2.1  Security Testing

                     THE SECURITY MECHANISMS OF THE ADP SYSTEM SHALL BE TESTED
                 AND FOUND TO WORK AS CLAIMED IN THE SYSTEM DOCUMENTATION. 
                 A TEAM OF INDIVIDUALS WHO THOROUGHLY UNDERSTAND THE
                 SPECIFIC IMPLEMENTATION OF THE TCB SHALL SUBJECT ITS
                 DESIGN DOCUMENTATION, SOURCE CODE, AND OBJECT CODE TO
                 THOROUGH ANALYSIS AND TESTING.  THEIR OBJECTIVES SHALL BE:
                 TO UNCOVER ALL DESIGN AND IMPLEMENTATION FLAWS THAT WOULD
                 PERMIT A SUBJECT EXTERNAL TO THE TCB TO READ, CHANGE, OR
                 DELETE DATA NORMALLY DENIED UNDER THE MANDATORY OR
                 DISCRETIONARY SECURITY POLICY ENFORCED BY THE TCB; AS WELL
                 AS TO ASSURE THAT NO SUBJECT (WITHOUT AUTHORIZATION TO DO
                 SO) IS ABLE TO CAUSE THE TCB TO ENTER A STATE SUCH THAT
                 IT IS UNABLE TO RESPOND TO COMMUNICATIONS INITIATED BY
                 OTHER USERS.  ALL DISCOVERED FLAWS SHALL BE REMOVED OR
                 NEUTRALIZED AND THE TCB RETESTED TO DEMONSTRATE THAT THEY
                 HAVE BEEN ELIMINATED AND THAT NEW FLAWS HAVE NOT BEEN
                 INTRODUCED.  (SEE THE SECURITY TESTING GUIDELINES.)

        3.1.3.2.2  Design Specification and Verification

                     AN INFORMAL OR FORMAL MODEL OF THE SECURITY POLICY
                 SUPPORTED BY THE TCB SHALL BE MAINTAINED THAT IS SHOWN TO
                 BE CONSISTENT WITH ITS AXIOMS.

3.1.4  DOCUMENTATION

     3.1.4.1   Security Features User's Guide

               A single summary, chapter, or manual in user documentation
             shall describe the protection mechanisms provided by the TCB,
             guidelines on their use, and how they interact with one another.

     3.1.4.2   Trusted Facility Manual

               A manual addressed to the ADP system administrator shall
             present cautions about functions and privileges that should be
             controlled when running a secure facility.  The procedures for
             examining and maintaining the audit files as well as the
             detailed audit record structure for each type of audit event
             shall be given.  THE MANUAL SHALL DESCRIBE THE OPERATOR AND
             ADMINISTRATOR FUNCTIONS RELATED TO SECURITY, TO INCLUDE CHANGING
             THE SECURITY CHARACTERISTICS OF A USER.  IT SHALL PROVIDE 
             GUIDELINES ON THE CONSISTENT AND EFFECTIVE USE OF THE PROTECTION
             FEATURES OF THE SYSTEM, HOW THEY INTERACT, HOW TO SECURELY
             GENERATE A NEW TCB, AND FACILITY PROCEDURES, WARNINGS, AND
             PRIVILEGES THAT NEED TO BE CONTROLLED IN ORDER TO OPERATE THE 
             FACILITY IN A SECURE MANNER.

     3.1.4.3   Test Documentation

               The system developer shall provide to the evaluators a document
             that describes the test plan and results of the security 
             mechanisms' functional testing.

     3.1.4.4   Design Documentation

               Documentation shall be available that provides a description of
             the manufacturer's philosophy of protection and an explanation
             of how this philosophy is translated into the TCB.  If the TCB
             is composed of distinct modules, the interfaces between these
             modules shall be described.  AN INFORMAL OR FORMAL DESCRIPTION
             OF THE SECURITY POLICY MODEL ENFORCED BY THE TCB SHALL BE
             AVAILABLE AND AN EXPLANATION PROVIDED TO SHOW THAT IT IS 
             SUFFICIENT TO ENFORCE THE SECURITY POLICY.  THE SPECIFIC TCB 
             PROTECTION MECHANISMS SHALL BE IDENTIFIED AND AN EXPLANATION
             GIVEN TO SHOW THAT THEY SATISFY THE MODEL.


3.2  CLASS (B2):    STRUCTURED PROTECTION

In class (B2) systems, the TCB is based on a clearly defined and documented
formal security policy model that requires the discretionary and mandatory
access control enforcement found in class (B1) systems be extended to all
subjects and objects in the ADP system.  In addition, covert channels are
addressed.  The TCB must be carefully structured into protection-critical and
non- protection-critical elements.  The TCB interface is well-defined and the
TCB design and implementation enable it to be subjected to more thorough
testing and more complete review.  Authentication mechanisms are strengthened,
trusted facility management is provided in the form of support for system
administrator and operator functions, and stringent configuration management
controls are imposed.  The system is relatively resistant to penetration.  The
following are minimal requirements for systems assigned a class (B2) rating:

3.2.1  SECURITY POLICY

     3.2.1.1   Discretionary Access Control

               The TCB shall define and control access between named users and
             named objects (e.g., files and programs) in the ADP system.
             The enforcement mechanism (e.g., self/group/public controls,
             access control lists) shall allow users to specify and control
             sharing of those objects by named individuals, or defined
             groups of individuals, or by both.  The discretionary access
             control mechanism shall, either by explicit user action or by
             default, provide that objects are protected from unauthorized
             access.  These access controls shall be capable of including
             or excluding access to the granularity of a single user.
             Access permission to an object by users not already possessing
             access permission shall only be assigned by authorized users.

     3.2.1.2   Object Reuse

               When a storage object is initially assigned, allocated, or
             reallocated to a subject from the TCB's pool of unused storage
             objects, the TCB shall assure that the object contains no data
             for which the subject is not authorized.

     3.2.1.3   Labels

               Sensitivity labels associated with each ADP SYSTEM RESOURCE
             (E.G., SUBJECT, STORAGE OBJECT) THAT IS DIRECTLY OR INDIRECTLY
             ACCESSIBLE BY SUBJECTS EXTERNAL TO THE TCB shall be maintained
             by the TCB.  These labels shall be used as the basis for
             mandatory access control decisions.  In order to import non-
             labeled data, the TCB shall request and receive from an
             authorized user the security level of the data, and all such
             actions shall be auditable by the TCB.

        3.2.1.3.1  Label Integrity

                 Sensitivity labels shall accurately represent security
                 levels of the specific subjects or objects with which
                 they are associated.  When exported by the TCB,
                 sensitivity labels shall accurately and unambiguously
                 represent the internal labels and shall be associated
                 with the information being exported.

        3.2.1.3.2  Exportation of Labeled Information

                 The TCB shall designate each communication channel and
                 I/O device as either single-level or multilevel.  Any
                 change in this designation shall be done manually and
                 shall be auditable by the TCB.  The TCB shall maintain
                 and be able to audit any change in the current security
                 level associated with a single-level communication
                 channel or I/O device.

             3.2.1.3.2.1  Exportation to Multilevel Devices

                        When the TCB exports an object to a multilevel I/O
                        device, the sensitivity label associated with that
                        object shall also be exported and shall reside on
                        the same physical medium as the exported 
                        information and shall be in the same form (i.e., 
                        machine-readable or human-readable form).  When
                        the TCB exports or imports an object over a
                        multilevel communication channel, the protocol
                        used on that channel shall provide for the
                        unambiguous pairing between the sensitivity labels
                        and the associated information that is sent or
                        received.

             3.2.1.3.2.2  Exportation to Single-Level Devices

                        Single-level I/O devices and single-level
                        communication channels are not required to 
                        maintain the sensitivity labels of the
                        information they process.  However, the TCB shall
                        include a mechanism by which the TCB and an
                        authorized user reliably communicate to designate
                        the single security level of information imported
                        or exported via single-level communication 
                        channels or I/O devices.

             3.2.1.3.2.3  Labeling Human-Readable Output

                        The ADP system administrator shall be able to
                        specify the printable label names associated with
                        exported sensitivity labels.  The TCB shall mark
                        the beginning and end of all human-readable, paged,
                        hardcopy output (e.g., line printer output) with
                        human-readable sensitivity labels that properly*
                        represent the sensitivity of the output.  The TCB
                        shall, by default, mark the top and bottom of each
                        page of human-readable, paged, hardcopy output
                        (e.g., line printer output) with human-readable
                        sensitivity labels that properly* represent the
                        overall sensitivity of the output or that 
                        properly* represent the sensitivity of the
                        information on the page.  The TCB shall, by
                        default and in an appropriate manner, mark other
                        forms of human-readable output (e.g., maps,
                        graphics) with human-readable sensitivity labels
                        that properly* represent the sensitivity of the
                        output.  Any override of these marking defaults
                        shall be auditable by the TCB.
           _____________________________________________________________
           * The hierarchical classification component in human-readable
           sensitivity labels shall be equal to the greatest
           hierarchical classification of any of the information in the
           output that the labels refer to;  the non-hierarchical
           category component shall include all of the non-hierarchical
           categories of the information in the output the labels refer
           to, but no other non-hierarchical categories.
           _____________________________________________________________


        3.2.1.3.3  Subject Sensitivity Labels

                 THE TCB SHALL IMMEDIATELY NOTIFY A TERMINAL USER OF EACH
                 CHANGE IN THE SECURITY LEVEL ASSOCIATED WITH THAT USER
                 DURING AN INTERACTIVE SESSION.  A TERMINAL USER SHALL BE
                 ABLE TO QUERY THE TCB AS DESIRED FOR A DISPLAY OF THE
                 SUBJECT'S COMPLETE SENSITIVITY LABEL.

        3.2.1.3.4  Device Labels

                 THE TCB SHALL SUPPORT THE ASSIGNMENT OF MINIMUM AND
                 MAXIMUM SECURITY LEVELS TO ALL ATTACHED PHYSICAL DEVICES.
                 THESE SECURITY LEVELS SHALL BE USED BY THE TCB TO ENFORCE
                 CONSTRAINTS IMPOSED BY THE PHYSICAL ENVIRONMENTS IN WHICH
                 THE DEVICES ARE LOCATED.

     3.2.1.4   Mandatory Access Control

               The TCB shall enforce a mandatory access control policy over
             all RESOURCES (I.E., SUBJECTS, STORAGE OBJECTS, AND I/O DEVICES)
             THAT ARE DIRECTLY OR INDIRECTLY ACCESSIBLE BY SUBJECTS EXTERNAL
             TO THE TCB.  These subjects and objects shall be assigned
             sensitivity labels that are a combination of hierarchical
             classification levels and non-hierarchical categories, and the
             labels shall be used as the basis for mandatory access control
             decisions.  The TCB shall be able to support two or more such
             security levels.  (See the Mandatory Access Control guidelines.)
             The following requirements shall hold for all accesses between
             ALL SUBJECTS EXTERNAL TO THE TCB AND ALL OBJECTS DIRECTLY OR
             INDIRECTLY ACCESSIBLE BY THESE SUBJECTS: A subject can read an
             object only if the hierarchical classification in the subject's
             security level is greater than or equal to the hierarchical
             classification in the object's security level and the non-
             hierarchical categories in the subject's security level include
             all the non-hierarchical categories in the object's security
             level.  A subject can write an object only if the hierarchical
             classification in the subject's security level is less than or
             equal to the hierarchical classification in the object's
             security level and all the non-hierarchical categories in the
             subject's security level are included in the non-hierarchical
             categories in the object's security level.

3.2.2  ACCOUNTABILITY

     3.2.2.1   Identification and Authentication

               The TCB shall require users to identify themselves to it before
             beginning to perform any other actions that the TCB is expected
             to mediate.  Furthermore, the TCB shall maintain authentication
             data that includes information for verifying the identity of
             individual users (e.g., passwords) as well as information for
             determining the clearance and authorizations of individual
             users.  This data shall be used by the TCB to authenticate the
             user's identity and to determine the security level and
             authorizations of subjects that may be created to act on behalf
             of the individual user.  The TCB shall protect authentication
             data so that it cannot be accessed by any unauthorized user.
             The TCB shall be able to enforce individual accountability by
             providing the capability to uniquely identify each individual
             ADP system user.  The TCB shall also provide the capability of
             associating this identity with all auditable actions taken by
             that individual.

        3.2.2.1.1  Trusted Path

                 THE TCB SHALL SUPPORT A TRUSTED COMMUNICATION PATH
                 BETWEEN ITSELF AND USER FOR INITIAL LOGIN AND
                 AUTHENTICATION.  COMMUNICATIONS VIA THIS PATH SHALL BE
                 INITIATED EXCLUSIVELY BY A USER.

     3.2.2.2   Audit

               The TCB shall be able to create, maintain, and protect from
             modification or unauthorized access or destruction an audit
             trail of accesses to the objects it protects.  The audit data
             shall be protected by the TCB so that read access to it is
             limited to those who are authorized for audit data.  The TCB
             shall be able to record the following types of events: use of
             identification and authentication mechanisms, introduction of
             objects into a user's address space (e.g., file open, program
             initiation), deletion of objects, and actions taken by computer
             operators and system administrators and/or system security
             officers.  The TCB shall also be able to audit any override of
             human-readable output markings.  For each recorded event, the
             audit record shall identify: date and time of the event, user,
             type of event, and success or failure of the event.  For
             identification/authentication events the origin of request
             (e.g., terminal ID) shall be included in the audit record.  For
             events that introduce an object into a user's address space and
             for object deletion events the audit record shall include the
             name of the object and the object's security level.  The ADP
             system administrator shall be able to selectively audit the
             actions of any one or more users based on individual identity
             and/or object security level.  THE TCB SHALL BE ABLE TO AUDIT
             THE IDENTIFIED EVENTS THAT MAY BE USED IN THE EXPLOITATION OF
             COVERT STORAGE CHANNELS.

3.2.3  ASSURANCE

     3.2.3.1   Operational Assurance

        3.2.3.1.1  System Architecture

                 THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION
                 THAT PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING
                 (E.G., BY MODIFICATION OF ITS CODE OR DATA STRUCTURES).
                   THE TCB SHALL MAINTAIN PROCESS ISOLATION THROUGH THE
                 PROVISION OF DISTINCT ADDRESS SPACES UNDER ITS CONTROL.
                 THE TCB SHALL BE INTERNALLY STRUCTURED INTO WELL-DEFINED
                 LARGELY INDEPENDENT MODULES.  IT SHALL MAKE EFFECTIVE USE
                 OF AVAILABLE HARDWARE TO SEPARATE THOSE ELEMENTS THAT ARE
                 PROTECTION-CRITICAL FROM THOSE THAT ARE NOT.  THE TCB
                 MODULES SHALL BE DESIGNED SUCH THAT THE PRINCIPLE OF LEAST
                 PRIVILEGE IS ENFORCED.  FEATURES IN HARDWARE, SUCH AS
                 SEGMENTATION, SHALL BE USED TO SUPPORT LOGICALLY DISTINCT
                 STORAGE OBJECTS WITH SEPARATE ATTRIBUTES (NAMELY:
                 READABLE, WRITEABLE).  THE USER INTERFACE TO THE TCB 
                 SHALL BE COMPLETELY DEFINED AND ALL ELEMENTS OF THE TCB
                 IDENTIFIED.

        3.2.3.1.2  System Integrity

                 Hardware and/or software features shall be provided that
                 can be used to periodically validate the correct 
                 operation of the on-site hardware and firmware elements 
                 of the TCB.

        3.2.3.1.3  Covert Channel Analysis

                 THE SYSTEM DEVELOPER SHALL CONDUCT A THOROUGH SEARCH FOR
                 COVERT STORAGE CHANNELS AND MAKE A DETERMINATION (EITHER
                 BY ACTUAL MEASUREMENT OR BY ENGINEERING ESTIMATION) OF
                 THE MAXIMUM BANDWIDTH OF EACH IDENTIFIED CHANNEL.  (SEE
                 THE COVERT CHANNELS GUIDELINE SECTION.)

        3.2.3.1.4  Trusted Facility Management

                 THE TCB SHALL SUPPORT SEPARATE OPERATOR AND ADMINISTRATOR
                 FUNCTIONS.

     3.2.3.2   Life-Cycle Assurance

        3.2.3.2.1  Security Testing

                 The security mechanisms of the ADP system shall be tested
                 and found to work as claimed in the system documentation. 
                 A team of individuals who thoroughly understand the
                 specific implementation of the TCB shall subject its
                 design documentation, source code, and object code to
                 thorough analysis and testing.  Their objectives shall be:
                 to uncover all design and implementation flaws that would
                 permit a subject external to the TCB to read, change, or
                 delete data normally denied under the mandatory or
                 discretionary security policy enforced by the TCB; as well
                 as to assure that no subject (without authorization to do
                 so) is able to cause the TCB to enter a state such that it
                 is unable to respond to communications initiated by other
                 users.  THE TCB SHALL BE FOUND RELATIVELY RESISTANT TO
                 PENETRATION.  All discovered flaws shall be CORRECTED and
                 the TCB retested to demonstrate that they have been
                 eliminated and that new flaws have not been introduced.
                 TESTING SHALL DEMONSTRATE THAT THE TCB IMPLEMENTATION IS
                 CONSISTENT WITH THE DESCRIPTIVE TOP-LEVEL SPECIFICATION. 
                 (See the Security Testing Guidelines.)

        3.2.3.2.2  Design Specification and Verification

                 A FORMAL model of the security policy supported by the
                 TCB shall be maintained that is PROVEN consistent with
                 its axioms.  A DESCRIPTIVE TOP-LEVEL SPECIFICATION (DTLS)
                 OF THE TCB SHALL BE MAINTAINED THAT COMPLETELY AND
                 ACCURATELY DESCRIBES THE TCB IN TERMS OF EXCEPTIONS, ERROR
                 MESSAGES, AND EFFECTS.  IT SHALL BE SHOWN TO BE AN
                 ACCURATE DESCRIPTION OF THE TCB INTERFACE.

        3.2.3.2.3  Configuration Management

                 DURING DEVELOPMENT AND MAINTENANCE OF THE TCB, A
                 CONFIGURATION MANAGEMENT SYSTEM SHALL BE IN PLACE THAT
                 MAINTAINS CONTROL OF CHANGES TO THE DESCRIPTIVE TOP-LEVEL
                 SPECIFICATION, OTHER DESIGN DATA, IMPLEMENTATION
                 DOCUMENTATION, SOURCE CODE, THE RUNNING VERSION OF THE
                 OBJECT CODE, AND TEST FIXTURES AND DOCUMENTATION.  THE
                 CONFIGURATION MANAGEMENT SYSTEM SHALL ASSURE A CONSISTENT
                 MAPPING AMONG ALL DOCUMENTATION AND CODE ASSOCIATED WITH
                 THE CURRENT VERSION OF THE TCB.  TOOLS SHALL BE PROVIDED
                 FOR GENERATION OF A NEW VERSION OF THE TCB FROM SOURCE
                 CODE.  ALSO AVAILABLE SHALL BE TOOLS FOR COMPARING A 
                 NEWLY GENERATED VERSION WITH THE PREVIOUS TCB VERSION IN
                 ORDER TO ASCERTAIN THAT ONLY THE INTENDED CHANGES HAVE
                 BEEN MADE IN THE CODE THAT WILL ACTUALLY BE USED AS THE
                 NEW VERSION OF THE TCB.

3.2.4  DOCUMENTATION

     3.2.4.1   Security Features User's Guide

               A single summary, chapter, or manual in user documentation
             shall describe the protection mechanisms provided by the TCB,
             guidelines on their use, and how they interact with one another.

     3.2.4.2   Trusted Facility Manual

               A manual addressed to the ADP system administrator shall
             present cautions about functions and privileges that should be
             controlled when running a secure facility.  The procedures for
             examining and maintaining the audit files as well as the
             detailed audit record structure for each type of audit event
             shall be given.  The manual shall describe the operator and
             administrator functions related to security, to include 
             changing the security characteristics of a user.  It shall
             provide guidelines on the consistent and effective use of the
             protection features of the system, how they interact, how to
             securely generate a new TCB, and facility procedures, warnings,
             and privileges that need to be controlled in order to operate
             the facility in a secure manner.  THE TCB MODULES THAT CONTAIN
             THE REFERENCE VALIDATION MECHANISM SHALL BE IDENTIFIED.  THE
             PROCEDURES FOR SECURE GENERATION OF A NEW TCB FROM SOURCE AFTER
             MODIFICATION OF ANY MODULES IN THE TCB SHALL BE DESCRIBED.

     3.2.4.3   Test Documentation

               The system developer shall provide to the evaluators a document
             that describes the test plan and results of the security
             mechanisms' functional testing.  IT SHALL INCLUDE RESULTS OF
             TESTING THE EFFECTIVENESS OF THE METHODS USED TO REDUCE COVERT
             CHANNEL BANDWIDTHS.

     3.2.4.4   Design Documentation

               Documentation shall be available that provides a description of
             the manufacturer's philosophy of protection and an explanation
             of how this philosophy is translated into the TCB.  THE
             interfaces between THE TCB modules shall be described.  A
             FORMAL description of the security policy model enforced by the
             TCB shall be available and PROVEN that it is sufficient to
             enforce the security policy.  The specific TCB protection 
             mechanisms shall be identified and an explanation given to show
             that they satisfy the model.  THE DESCRIPTIVE TOP-LEVEL
             SPECIFICATION (DTLS) SHALL BE SHOWN TO BE AN ACCURATE 
             DESCRIPTION OF THE TCB INTERFACE.  DOCUMENTATION SHALL DESCRIBE
             HOW THE TCB IMPLEMENTS THE REFERENCE MONITOR CONCEPT AND GIVE
             AN EXPLANATION WHY IT IS TAMPERPROOF, CANNOT BE BYPASSED, AND
             IS CORRECTLY IMPLEMENTED.  DOCUMENTATION SHALL DESCRIBE HOW THE
             TCB IS STRUCTURED TO FACILITATE TESTING AND TO ENFORCE LEAST
             PRIVILEGE.  THIS DOCUMENTATION SHALL ALSO PRESENT THE RESULTS
             OF THE COVERT CHANNEL ANALYSIS AND THE TRADEOFFS INVOLVED IN
             RESTRICTING THE CHANNELS.  ALL AUDITABLE EVENTS THAT MAY BE
             USED IN THE EXPLOITATION OF KNOWN COVERT STORAGE CHANNELS SHALL
             BE IDENTIFIED.  THE BANDWIDTHS OF KNOWN COVERT STORAGE CHANNELS,
             THE USE OF WHICH IS NOT DETECTABLE BY THE AUDITING MECHANISMS,
             SHALL BE PROVIDED.  (SEE THE COVERT CHANNEL GUIDELINE SECTION.)


3.3  CLASS (B3):    SECURITY DOMAINS

The class (B3) TCB must satisfy the reference monitor requirements that it
mediate all accesses of subjects to objects, be tamperproof, and be small
enough to be subjected to analysis and tests.  To this end, the TCB is
structured to exclude code not essential to security policy enforcement, with
significant system engineering during TCB design and implementation directed
toward minimizing its complexity.  A security administrator is supported,
audit mechanisms are expanded to signal security- relevant events, and system
recovery procedures are required.  The system is highly resistant to
penetration.  The following are minimal requirements for systems assigned a
class (B3) rating:

3.3.1  SECURITY POLICY

     3.3.1.1   Discretionary Access Control

               The TCB shall define and control access between named users and
             named objects (e.g., files and programs) in the ADP system.
             The enforcement mechanism (E.G., ACCESS CONTROL LISTS) shall
             allow users to specify and control sharing of those OBJECTS.
             The discretionary access control mechanism shall, either by
             explicit user action or by default, provide that objects are
             protected from unauthorized access.  These access controls shall
             be capable of SPECIFYING, FOR EACH NAMED OBJECT, A LIST OF NAMED
             INDIVIDUALS AND A LIST OF GROUPS OF NAMED INDIVIDUALS WITH THEIR
             RESPECTIVE MODES OF ACCESS TO THAT OBJECT.  FURTHERMORE, FOR
             EACH SUCH NAMED OBJECT, IT SHALL BE POSSIBLE TO SPECIFY A LIST
             OF NAMED INDIVIDUALS AND A LIST OF GROUPS OF NAMED INDIVIDUALS
             FOR WHICH NO ACCESS TO THE OBJECT IS TO BE GIVEN.  Access
             permission to an object by users not already possessing access
             permission shall only be assigned by authorized users.

     3.3.1.2   Object Reuse

               When a storage object is initially assigned, allocated, or
             reallocated to a subject from the TCB's pool of unused storage
             objects, the TCB shall assure that the object contains no data
             for which the subject is not authorized.

     3.3.1.3   Labels

               Sensitivity labels associated with each ADP system resource
             (e.g., subject, storage object) that is directly or indirectly
             accessible by subjects external to the TCB shall be maintained
             by the TCB.  These labels shall be used as the basis for
             mandatory access control decisions.  In order to import non-
             labeled data, the TCB shall request and receive from an
             authorized user the security level of the data, and all such
             actions shall be auditable by the TCB.

        3.3.1.3.1  Label Integrity

                 Sensitivity labels shall accurately represent security
                 levels of the specific subjects or objects with which
                 they are associated.  When exported by the TCB,
                 sensitivity labels shall accurately and unambiguously
                 represent the internal labels and shall be associated
                 with the information being exported.

        3.3.1.3.2  Exportation of Labeled Information

                 The TCB shall designate each communication channel and
                 I/O device as either single-level or multilevel.  Any
                 change in this designation shall be done manually and
                 shall be auditable by the TCB.  The TCB shall maintain
                 and be able to audit any change in the current security
                 level associated with a single-level communication
                 channel or I/O device.

             3.3.1.3.2.1  Exportation to Multilevel Devices

                        When the TCB exports an object to a multilevel I/O
                        device, the sensitivity label associated with that
                        object shall also be exported and shall reside on
                        the same physical medium as the exported 
                        information and shall be in the same form (i.e., 
                        machine-readable or human-readable form).  When
                        the TCB exports or imports an object over a
                        multilevel communication channel, the protocol 
                        used on that channel shall provide for the
                        unambiguous pairing between the sensitivity labels
                        and the associated information that is sent or
                        received.

             3.3.1.3.2.2  Exportation to Single-Level Devices

                        Single-level I/O devices and single-level
                        communication channels are not required to 
                        maintain the sensitivity labels of the information
                        they process.  However, the TCB shall include a 
                        mechanism by which the TCB and an authorized user
                        reliably communicate to designate the single
                        security level of information imported or exported
                        via single-level communication channels or I/O
                        devices.

             3.3.1.3.2.3  Labeling Human-Readable Output

                        The ADP system administrator shall be able to
                        specify the printable label names associated with
                        exported sensitivity labels.  The TCB shall mark
                        the beginning and end of all human-readable, paged,
                        hardcopy output (e.g., line printer output) with
                        human-readable sensitivity labels that properly*
                        represent the sensitivity of the output.  The TCB
                        shall, by default, mark the top and bottom of each
                        page of human-readable, paged, hardcopy output
                        (e.g., line printer output) with human-readable
                        sensitivity labels that properly* represent the
                        overall sensitivity of the output or that
                        properly* represent the sensitivity of the 
                        information on the page.  The TCB shall, by
                        default and in an appropriate manner, mark other
                        forms of human-readable output (e.g., maps,
                        graphics) with human-readable sensitivity labels
                        that properly* represent the sensitivity of the 
                        output.  Any override of these marking defaults
                        shall be auditable by the TCB.

           _____________________________________________________________
           * The hierarchical classification component in human-readable
           sensitivity labels shall be equal to the greatest
           hierarchical classification of any of the information in the
           output that the labels refer to;  the non-hierarchical
           category component shall include all of the non-hierarchical
           categories of the information in the output the labels refer
           to, but no other non-hierarchical categories.
         _____________________________________________________________


        3.3.1.3.3  Subject Sensitivity Labels

                 The TCB shall immediately notify a terminal user of each
                 change in the security level associated with that user
                 during an interactive session.  A terminal user shall be
                 able to query the TCB as desired for a display of the
                 subject's complete sensitivity label.

        3.3.1.3.4  Device Labels

                 The TCB shall support the assignment of minimum and
                 maximum security levels to all attached physical devices.
                 These security levels shall be used by the TCB to enforce
                 constraints imposed by the physical environments in which
                 the devices are located.

     3.3.1.4   Mandatory Access Control

               The TCB shall enforce a mandatory access control policy over
             all resources (i.e., subjects, storage objects, and I/O 
             devices) that are directly or indirectly accessible by subjects
             external to the TCB.  These subjects and objects shall be
             assigned sensitivity labels that are a combination of
             hierarchical classification levels and non-hierarchical
             categories, and the labels shall be used as the basis for 
             mandatory access control decisions.  The TCB shall be able to
             support two or more such security levels.  (See the Mandatory
             Access Control guidelines.) The following requirements shall
             hold for all accesses between all subjects external to the TCB
             and all objects directly or indirectly accessible by these 
             subjects: A subject can read an object only if the hierarchical
             classification in the subject's security level is greater than
             or equal to the hierarchical classification in the object's
             security level and the non-hierarchical categories in the
             subject's security level include all the non-hierarchical
             categories in the object's security level.  A subject can write
             an object only if the hierarchical classification in the 
             subject's security level is less than or equal to the
             hierarchical classification in the object's security level and
             all the non-hierarchical categories in the subject's security 
             level are included in the non- hierarchical categories in the 
             object's security level.

3.3.2  ACCOUNTABILITY

     3.3.2.1   Identification and Authentication

               The TCB shall require users to identify themselves to it before
             beginning to perform any other actions that the TCB is expected
             to mediate.  Furthermore, the TCB shall maintain authentication
             data that includes information for verifying the identity of
             individual users (e.g., passwords) as well as information for
             determining the clearance and authorizations of individual
             users.  This data shall be used by the TCB to authenticate the
             user's identity and to determine the security level and 
             authorizations of subjects that may be created to act on behalf
             of the individual user.  The TCB shall protect authentication
             data so that it cannot be accessed by any unauthorized user.
             The TCB shall be able to enforce individual accountability by
             providing the capability to uniquely identify each individual 
             ADP system user.  The TCB shall also provide the capability of
             associating this identity with all auditable actions taken by
             that individual.

        3.3.2.1.1  Trusted Path

                 The TCB shall support a trusted communication path
                 between itself and USERS for USE WHEN A POSITIVE TCB-TO-
                 USER CONNECTION IS REQUIRED (E.G., LOGIN, CHANGE SUBJECT
                 SECURITY LEVEL).  Communications via this TRUSTED path
                 shall be ACTIVATED exclusively by a user OR THE TCB AND
                 SHALL BE LOGICALLY ISOLATED AND UNMISTAKABLY 
                 DISTINGUISHABLE FROM OTHER PATHS.

     3.3.2.2   Audit

               The TCB shall be able to create, maintain, and protect from
             modification or unauthorized access or destruction an audit 
             trail of accesses to the objects it protects.  The audit data
             shall be protected by the TCB so that read access to it is
             limited to those who are authorized for audit data.  The TCB
             shall be able to record the following types of events: use of
             identification and authentication mechanisms, introduction of
             objects into a user's address space (e.g., file open, program
             initiation), deletion of objects, and actions taken by computer
             operators and system administrators and/or system security
             officers.  The TCB shall also be able to audit any override of
             human-readable output markings.  For each recorded event, the
             audit record shall identify: date and time of the event, user,
             type of event, and success or failure of the event.  For 
             identification/authentication events the origin of request
             (e.g., terminal ID) shall be included in the audit record.
             For events that introduce an object into a user's address 
             space and for object deletion events the audit record shall 
             include the name of the object and the object's security level.
             The ADP system administrator shall be able to selectively audit
             the actions of any one or more users based on individual
             identity and/or object security level.  The TCB shall be able to
             audit the identified events that may be used in the exploitation
             of covert storage channels.  THE TCB SHALL CONTAIN A MECHANISM
             THAT IS ABLE TO MONITOR THE OCCURRENCE OR ACCUMULATION OF
             SECURITY AUDITABLE EVENTS THAT MAY INDICATE AN IMMINENT
             VIOLATION OF SECURITY POLICY.  THIS MECHANISM SHALL BE ABLE TO
             IMMEDIATELY NOTIFY THE SECURITY ADMINISTRATOR WHEN THRESHOLDS
             ARE EXCEEDED.

3.3.3  ASSURANCE

     3.3.3.1   Operational Assurance

        3.3.3.1.1  System Architecture

                 The TCB shall maintain a domain for its own execution
                 that protects it from external interference or tampering
                 (e.g., by modification of its code or data structures).
                 The TCB shall maintain process isolation through the
                 provision of distinct address spaces under its control.
                 The TCB shall be internally structured into well-defined
                 largely independent modules.  It shall make effective use
                 of available hardware to separate those elements that are
                 protection-critical from those that are not.  The TCB
                 modules shall be designed such that the principle of 
                 least privilege is enforced.  Features in hardware, such
                 as segmentation, shall be used to support logically
                 distinct storage objects with separate attributes (namely:
                 readable, writeable).  The user interface to the TCB shall
                 be completely defined and all elements of the TCB
                 identified.  THE TCB SHALL BE DESIGNED AND STRUCTURED TO
                 USE A COMPLETE, CONCEPTUALLY SIMPLE PROTECTION MECHANISM
                 WITH PRECISELY DEFINED SEMANTICS.  THIS MECHANISM SHALL
                 PLAY A CENTRAL ROLE IN ENFORCING THE INTERNAL STRUCTURING
                 OF THE TCB AND THE SYSTEM.  THE TCB SHALL INCORPORATE
                 SIGNIFICANT USE OF LAYERING, ABSTRACTION AND DATA HIDING.
                 SIGNIFICANT SYSTEM ENGINEERING SHALL BE DIRECTED TOWARD
                 MINIMIZING THE COMPLEXITY OF THE TCB AND EXCLUDING FROM
                 THE TCB MODULES THAT ARE NOT PROTECTION-CRITICAL.

        3.3.3.1.2  System Integrity

                 Hardware and/or software features shall be provided that
                 can be used to periodically validate the correct 
                 operation of the on-site hardware and firmware elements 
                 of the TCB.

        3.3.3.1.3  Covert Channel Analysis

                 The system developer shall conduct a thorough search for
                 COVERT CHANNELS and make a determination (either by 
                 actual measurement or by engineering estimation) of the
                 maximum bandwidth of each identified channel.  (See the
                 Covert Channels Guideline section.)

        3.3.3.1.4  Trusted Facility Management

                 The TCB shall support separate operator and administrator
                 functions.  THE FUNCTIONS PERFORMED IN THE ROLE OF A 
                 SECURITY ADMINISTRATOR SHALL BE IDENTIFIED.  THE ADP
                 SYSTEM ADMINISTRATIVE PERSONNEL SHALL ONLY BE ABLE TO
                 PERFORM SECURITY ADMINISTRATOR FUNCTIONS AFTER TAKING A 
                 DISTINCT AUDITABLE ACTION TO ASSUME THE SECURITY
                 ADMINISTRATOR ROLE ON THE ADP SYSTEM.  NON-SECURITY
                 FUNCTIONS THAT CAN BE PERFORMED IN THE SECURITY 
                 ADMINISTRATION ROLE SHALL BE LIMITED STRICTLY TO THOSE
                 ESSENTIAL TO PERFORMING THE SECURITY ROLE EFFECTIVELY.

        3.3.3.1.5  Trusted Recovery

                 PROCEDURES AND/OR MECHANISMS SHALL BE PROVIDED TO ASSURE
                 THAT, AFTER AN ADP SYSTEM FAILURE OR OTHER DISCONTINUITY,
                 RECOVERY WITHOUT A PROTECTION COMPROMISE IS OBTAINED.

     3.3.3.2   Life-Cycle Assurance

        3.3.3.2.1  Security Testing

                 The security mechanisms of the ADP system shall be tested
                 and found to work as claimed in the system documentation.
                 A team of individuals who thoroughly understand the
                 specific implementation of the TCB shall subject its
                 design documentation, source code, and object code to
                 thorough analysis and testing.  Their objectives shall 
                 be: to uncover all design and implementation flaws that
                 would permit a subject external to the TCB to read,
                 change, or delete data normally denied under the 
                 mandatory or discretionary security policy enforced by
                 the TCB; as well as to assure that no subject (without
                 authorization to do so) is able to cause the TCB to enter
                 a state such that it is unable to respond to 
                 communications initiated by other users.  The TCB shall
                 be FOUND RESISTANT TO penetration.  All discovered flaws
                 shall be corrected and the TCB retested to demonstrate 
                 that they have been eliminated and that new flaws have
                 not been introduced.  Testing shall demonstrate that the
                 TCB implementation is consistent with the descriptive
                 top-level specification.  (See the Security Testing 
                 Guidelines.)  NO DESIGN FLAWS AND NO MORE THAN A FEW
                 CORRECTABLE IMPLEMENTATION FLAWS MAY BE FOUND DURING
                 TESTING AND THERE SHALL BE REASONABLE CONFIDENCE THAT 
                 FEW REMAIN.

        3.3.3.2.2  Design Specification and Verification

                 A formal model of the security policy supported by the
                 TCB shall be maintained that is proven consistent with 
                 its axioms.  A descriptive top-level specification (DTLS)
                 of the TCB shall be maintained that completely and
                 accurately describes the TCB in terms of exceptions, error
                 messages, and effects.  It shall be shown to be an 
                 accurate description of the TCB interface.  A CONVINCING
                 ARGUMENT SHALL BE GIVEN THAT THE DTLS IS CONSISTENT WITH
                 THE MODEL.

        3.3.3.2.3  Configuration Management

                 During development and maintenance of the TCB, a
                 configuration management system shall be in place that 
                 maintains control of changes to the descriptive top-level
                 specification, other design data, implementation
                 documentation, source code, the running version of the
                 object code, and test fixtures and documentation.  The
                 configuration management system shall assure a consistent
                 mapping among all documentation and code associated with
                 the current version of the TCB.  Tools shall be provided
                 for generation of a new version of the TCB from source 
                 code.  Also available shall be tools for comparing a
                 newly generated version with the previous TCB version in
                 order to ascertain that only the intended changes have 
                 been made in the code that will actually be used as the
                 new version of the TCB.

3.3.4  DOCUMENTATION

     3.3.4.1   Security Features User's Guide

             A single summary, chapter, or manual in user documentation
             shall describe the protection mechanisms provided by the TCB,
             guidelines on their use, and how they interact with one another.

     3.3.4.2   Trusted Facility Manual

               A manual addressed to the ADP system administrator shall
             present cautions about functions and privileges that should be
             controlled when running a secure facility.  The procedures for
             examining and maintaining the audit files as well as the
             detailed audit record structure for each type of audit event
             shall be given.  The manual shall describe the operator and
             administrator functions related to security, to include 
             changing the security characteristics of a user.  It shall
             provide guidelines on the consistent and effective use of the
             protection features of the system, how they interact, how to
             securely generate a new TCB, and facility procedures, warnings,
             and privileges that need to be controlled in order to operate
             the facility in a secure manner.  The TCB modules that contain
             the reference validation mechanism shall be identified.  The
             procedures for secure generation of a new TCB from source after
             modification of any modules in the TCB shall be described.  IT
             SHALL INCLUDE THE PROCEDURES TO ENSURE THAT THE SYSTEM IS
             INITIALLY STARTED IN A SECURE MANNER.  PROCEDURES SHALL ALSO BE
             INCLUDED TO RESUME SECURE SYSTEM OPERATION AFTER ANY LAPSE IN 
             SYSTEM OPERATION.

     3.3.4.3   Test Documentation

               The system developer shall provide to the evaluators a document
             that describes the test plan and results of the security 
             mechanisms' functional testing.  It shall include results of
             testing the effectiveness of the methods used to reduce covert
             channel bandwidths.

     3.3.4.4   Design Documentation

               Documentation shall be available that provides a description of
             the manufacturer's philosophy of protection and an explanation
             of how this philosophy is translated into the TCB.  The
             interfaces between the TCB modules shall be described.  A
             formal description of the security policy model enforced by the
             TCB shall be available and proven that it is sufficient to
             enforce the security policy.  The specific TCB protection 
             mechanisms shall be identified and an explanation given to show
             that they satisfy the model.  The descriptive top-level
             specification (DTLS) shall be shown to be an accurate 
             description of the TCB interface.  Documentation shall describe
             how the TCB implements the reference monitor concept and give 
             an explanation why it is tamperproof, cannot be bypassed, and
             is correctly implemented.  THE TCB IMPLEMENTATION (I.E., IN
             HARDWARE, FIRMWARE, AND SOFTWARE) SHALL BE INFORMALLY SHOWN TO
             BE CONSISTENT WITH THE DTLS.  THE ELEMENTS OF THE DTLS SHALL BE
             SHOWN, USING INFORMAL TECHNIQUES, TO CORRESPOND TO THE ELEMENTS
             OF THE TCB.  Documentation shall describe how the TCB is
             structured to facilitate testing and to enforce least privilege.
             This documentation shall also present the results of the covert
             channel analysis and the tradeoffs involved in restricting the
             channels.  All auditable events that may be used in the 
             exploitation of known covert storage channels shall be 
             identified.  The bandwidths of known covert storage channels,
             the use of which is not detectable by the auditing mechanisms,
             shall be provided.  (See the Covert Channel Guideline section.)


4.0  DIVISION A:    VERIFIED PROTECTION

This division is characterized by the use of formal security verification
methods to assure that the mandatory and discretionary security controls
employed in the system can effectively protect classified or other sensitive
information stored or processed by the system.  Extensive documentation is
required to demonstrate that the TCB meets the security requirements in all
aspects of design, development and implementation.


4.1  CLASS (A1):    VERIFIED DESIGN

Systems in class (A1) are functionally equivalent to those in class (B3) in
that no additional architectural features or policy requirements are added.
The distinguishing feature of systems in this class is the analysis derived
from formal design specification and verification techniques and the resulting
high degree of assurance that the TCB is correctly implemented.  This
assurance is developmental in nature, starting with a formal model of the
security policy and a formal top-level specification (FTLS) of the design.
Independent of the particular specification language or verification system
used, there are five important criteria for class (A1) design verification:

        * A formal model of the security policy must be clearly
        identified and documented, including a mathematical proof
        that the model is consistent with its axioms and is
        sufficient to support the security policy.

        * An FTLS must be produced that includes abstract definitions
        of the functions the TCB performs and of the hardware and/or
        firmware mechanisms that are used to support separate
        execution domains.

        * The FTLS of the TCB must be shown to be consistent with the
        model by formal techniques where possible (i.e., where
        verification tools exist) and informal ones otherwise.

        * The TCB implementation (i.e., in hardware, firmware, and
        software) must be informally shown to be consistent with the
        FTLS.  The elements of the FTLS must be shown, using
        informal techniques, to correspond to the elements of the
        TCB.  The FTLS must express the unified protection mechanism
        required to satisfy the security policy, and it is the
        elements of this protection mechanism that are mapped to the
        elements of the TCB.

        * Formal analysis techniques must be used to identify and
        analyze covert channels.  Informal techniques may be used to
        identify covert timing channels.  The continued existence of
        identified covert channels in the system must be justified.

In keeping with the extensive design and development analysis of the TCB
required of systems in class (A1), more stringent configuration management is
required and procedures are established for securely distributing the system
to sites.  A system security administrator is supported.

The following are minimal requirements for systems assigned a class (A1)
rating:

4.1.1  SECURITY POLICY

     4.1.1.1   Discretionary Access Control

             The TCB shall define and control access between named users and
             named objects (e.g., files and programs) in the ADP system.  
             The enforcement mechanism (e.g., access control lists) shall 
             allow users to specify and control sharing of those objects.
             The discretionary access control mechanism shall, either by
             explicit user action or by default, provide that objects are
             protected from unauthorized access.  These access controls 
             shall be capable of specifying, for each named object, a list 
             of named individuals and a list of groups of named individuals
             with their respective modes of access to that object.
             Furthermore, for each such named object, it shall be possible to
             specify a list of named individuals and a list of groups of 
             named individuals for which no access to the object is to be 
             given.  Access permission to an object by users not already
             possessing access permission shall only be assigned by
             authorized users.

     4.1.1.2   Object Reuse

             When a storage object is initially assigned, allocated, or
             reallocated to a subject from the TCB's pool of unused storage
             objects, the TCB shall assure that the object contains no data
             for which the subject is not authorized.

     4.1.1.3   Labels

             Sensitivity labels associated with each ADP system resource
             (e.g., subject, storage object) that is directly or indirectly
             accessible by subjects external to the TCB shall be maintained
             by the TCB.  These labels shall be used as the basis for
             mandatory access control decisions.  In order to import non-
             labeled data, the TCB shall request and receive from an 
             authorized user the security level of the data, and all such
             actions shall be auditable by the TCB.

        4.1.1.3.1  Label Integrity

                 Sensitivity labels shall accurately represent security
                 levels of the specific subjects or objects with which 
                 they are associated.  When exported by the TCB,
                 sensitivity labels shall accurately and unambiguously
                 represent the internal labels and shall be associated 
                 with the information being exported.

        4.1.1.3.2  Exportation of Labeled Information

                 The TCB shall designate each communication channel and
                 I/O device as either single-level or multilevel.  Any 
                 change in this designation shall be done manually and
                 shall be auditable by the TCB.  The TCB shall maintain
                 and be able to audit any change in the current security
                 level associated with a single-level communication
                 channel or I/O device.

             4.1.1.3.2.1  Exportation to Multilevel Devices

                        When the TCB exports an object to a multilevel I/O
                        device, the sensitivity label associated with that
                        object shall also be exported and shall reside on
                        the same physical medium as the exported 
                        information and shall be in the same form (i.e., 
                        machine-readable or human-readable form).  When
                        the TCB exports or imports an object over a
                        multilevel communication channel, the protocol 
                        used on that channel shall provide for the
                        unambiguous pairing between the sensitivity labels
                        and the associated information that is sent or 
                        received.

             4.1.1.3.2.2  Exportation to Single-Level Devices

                        Single-level I/O devices and single-level
                        communication channels are not required to 
                        maintain the sensitivity labels of the information
                        they process.  However, the TCB shall include a 
                        mechanism by which the TCB and an authorized user
                        reliably communicate to designate the single
                        security level of information imported or exported
                        via single-level communication channels or I/O 
                        devices.

             4.1.1.3.2.3  Labeling Human-Readable Output

                        The ADP system administrator shall be able to
                        specify the printable label names associated with
                        exported sensitivity labels.  The TCB shall mark
                        the beginning and end of all human-readable, paged,
                        hardcopy output (e.g., line printer output) with 
                        human-readable sensitivity labels that properly*
                        represent the sensitivity of the output.  The TCB
                        shall, by default, mark the top and bottom of each
                        page of human-readable, paged, hardcopy output
                        (e.g., line printer output) with human-readable 
                        sensitivity labels that properly* represent the
                        overall sensitivity of the output or that 
                        properly* represent the sensitivity of the 
                        information on the page.  The TCB shall, by
                        default and in an appropriate manner, mark other
                        forms of human-readable output (e.g., maps,
                        graphics) with human-readable sensitivity labels
                        that properly* represent the sensitivity of the 
                        output.  Any override of these marking defaults
                        shall be auditable by the TCB.

           ____________________________________________________________________
           * The hierarchical classification component in human-readable
           sensitivity labels shall be equal to the greatest
           hierarchical classification of any of the information in the
           output that the labels refer to;  the non-hierarchical
           category component shall include all of the non-hierarchical
           categories of the information in the output the labels refer
           to, but no other non-hierarchical categories.
           ____________________________________________________________________


        4.1.1.3.3  Subject Sensitivity Labels

                 The TCB shall immediately notify a terminal user of each
                 change in the security level associated with that user 
                 during an interactive session.  A terminal user shall be
                 able to query the TCB as desired for a display of the
                 subject's complete sensitivity label.

        4.1.1.3.4  Device Labels

                 The TCB shall support the assignment of minimum and
                 maximum security levels to all attached physical devices.
                 These security levels shall be used by the TCB to enforce
                 constraints imposed by the physical environments in which
                 the devices are located.

     4.1.1.4   Mandatory Access Control

             The TCB shall enforce a mandatory access control policy over
             all resources (i.e., subjects, storage objects, and I/O 
             devices) that are directly or indirectly accessible by subjects
             external to the TCB.  These subjects and objects shall be
             assigned sensitivity labels that are a combination of
             hierarchical classification levels and non-hierarchical
             categories, and the labels shall be used as the basis for 
             mandatory access control decisions.  The TCB shall be able to
             support two or more such security levels.  (See the Mandatory
             Access Control guidelines.) The following requirements shall
             hold for all accesses between all subjects external to the TCB
             and all objects directly or indirectly accessible by these 
             subjects: A subject can read an object only if the hierarchical
             classification in the subject's security level is greater than
             or equal to the hierarchical classification in the object's
             security level and the non-hierarchical categories in the
             subject's security level include all the non-hierarchical
             categories in the object's security level.  A subject can write
             an object only if the hierarchical classification in the 
             subject's security level is less than or equal to the
             hierarchical classification in the object's security level and
             all the non-hierarchical categories in the subject's security 
             level are included in the non- hierarchical categories in the 
             object's security level.

4.1.2  ACCOUNTABILITY

     4.1.2.1   Identification and Authentication

             The TCB shall require users to identify themselves to it before
             beginning to perform any other actions that the TCB is expected
             to mediate.  Furthermore, the TCB shall maintain authentication
             data that includes information for verifying the identity of
             individual users (e.g., passwords) as well as information for
             determining the clearance and authorizations of individual
             users.  This data shall be used by the TCB to authenticate the
             user's identity and to determine the security level and 
             authorizations of subjects that may be created to act on behalf
             of the individual user.  The TCB shall protect authentication
             data so that it cannot be accessed by any unauthorized user.
             The TCB shall be able to enforce individual accountability by
             providing the capability to uniquely identify each individual 
             ADP system user.  The TCB shall also provide the capability of
             associating this identity with all auditable actions taken by
             that individual.

        4.1.2.1.1  Trusted Path

                 The TCB shall support a trusted communication path
                 between itself and users for use when a positive TCB-to-
                 user connection is required (e.g., login, change subject
                 security level).  Communications via this trusted path
                 shall be activated exclusively by a user or the TCB and
                 shall be logically isolated and unmistakably 
                 distinguishable from other paths.

     4.1.2.2   Audit

             The TCB shall be able to create, maintain, and protect from
             modification or unauthorized access or destruction an audit 
             trail of accesses to the objects it protects.  The audit data
             shall be protected by the TCB so that read access to it is
             limited to those who are authorized for audit data.  The TCB
             shall be able to record the following types of events: use of
             identification and authentication mechanisms, introduction of
             objects into a user's address space (e.g., file open, program
             initiation), deletion of objects, and actions taken by computer
             operators and system administrators and/or system security
             officers.  The TCB shall also be able to audit any override of
             human-readable output markings.  For each recorded event, the
             audit record shall identify: date and time of the event, user,
             type of event, and success or failure of the event.  For
             identification/authentication events the origin of request
             (e.g., terminal ID) shall be included in the audit record.  For
             events that introduce an object into a user's address space and
             for object deletion events the audit record shall include the 
             name of the object and the object's security level.  The ADP
             system administrator shall be able to selectively audit the
             actions of any one or more users based on individual identity
             and/or object security level.  The TCB shall be able to audit
             the identified events that may be used in the exploitation of
             covert storage channels.  The TCB shall contain a mechanism 
             that is able to monitor the occurrence or accumulation of 
             security auditable events that may indicate an imminent
             violation of security policy.  This mechanism shall be able to
             immediately notify the security administrator when thresholds 
             are exceeded.

4.1.3  ASSURANCE

     4.1.3.1   Operational Assurance

        4.1.3.1.1  System Architecture

                 The TCB shall maintain a domain for its own execution
                 that protects it from external interference or tampering
                 (e.g., by modification of its code or data structures).
                 The TCB shall maintain process isolation through the
                 provision of distinct address spaces under its control.
                 The TCB shall be internally structured into well-defined
                 largely independent modules.  It shall make effective use
                 of available hardware to separate those elements that are
                 protection-critical from those that are not.  The TCB
                 modules shall be designed such that the principle of 
                 least privilege is enforced.  Features in hardware, such
                 as segmentation, shall be used to support logically 
                 distinct storage objects with separate attributes (namely:
                 readable, writeable).  The user interface to the TCB 
                 shall be completely defined and all elements of the TCB 
                 identified.  The TCB shall be designed and structured to
                 use a complete, conceptually simple protection mechanism
                 with precisely defined semantics.  This mechanism shall 
                 play a central role in enforcing the internal structuring
                 of the TCB and the system.  The TCB shall incorporate
                 significant use of layering, abstraction and data hiding.
                 Significant system engineering shall be directed toward 
                 minimizing the complexity of the TCB and excluding from
                 the TCB modules that are not protection-critical.

        4.1.3.1.2  System Integrity

                 Hardware and/or software features shall be provided that
                 can be used to periodically validate the correct 
                 operation of the on-site hardware and firmware elements
                 of the TCB.

        4.1.3.1.3  Covert Channel Analysis

                 The system developer shall conduct a thorough search for
                 COVERT CHANNELS and make a determination (either by 
                 actual measurement or by engineering estimation) of the
                 maximum bandwidth of each identified channel.  (See the
                 Covert Channels Guideline section.)  FORMAL METHODS SHALL
                 BE USED IN THE ANALYSIS.

        4.1.3.1.4  Trusted Facility Management

                 The TCB shall support separate operator and administrator
                 functions.  The functions performed in the role of a 
                 security administrator shall be identified.  The ADP
                 system administrative personnel shall only be able to
                 perform security administrator functions after taking a 
                 distinct auditable action to assume the security
                 administrator role on the ADP system.  Non-security
                 functions that can be performed in the security 
                 administration role shall be limited strictly to those
                 essential to performing the security role effectively.

        4.1.3.1.5  Trusted Recovery

                 Procedures and/or mechanisms shall be provided to assure
                 that, after an ADP system failure or other discontinuity,
                 recovery without a protection compromise is obtained.

     4.1.3.2   Life-Cycle Assurance

        4.1.3.2.1  Security Testing

                 The security mechanisms of the ADP system shall be tested
                 and found to work as claimed in the system documentation.
                 A team of individuals who thoroughly understand the
                 specific implementation of the TCB shall subject its
                 design documentation, source code, and object code to
                 thorough analysis and testing.  Their objectives shall 
                 be: to uncover all design and implementation flaws that
                 would permit a subject external to the TCB to read,
                 change, or delete data normally denied under the 
                 mandatory or discretionary security policy enforced by 
                 the TCB; as well as to assure that no subject (without
                 authorization to do so) is able to cause the TCB to enter
                 a state such that it is unable to respond to 
                 communications initiated by other users.  The TCB shall 
                 be found resistant to penetration.  All discovered flaws
                 shall be corrected and the TCB retested to demonstrate 
                 that they have been eliminated and that new flaws have
                 not been introduced.  Testing shall demonstrate that the
                 TCB implementation is consistent with the FORMAL top-
                 level specification.  (See the Security Testing 
                 Guidelines.)  No design flaws and no more than a few
                 correctable implementation flaws may be found during
                 testing and there shall be reasonable confidence that few
                 remain.  MANUAL OR OTHER MAPPING OF THE FTLS TO THE 
                 SOURCE CODE MAY FORM A BASIS FOR PENETRATION TESTING.

        4.1.3.2.2  Design Specification and Verification

                 A formal model of the security policy supported by the
                 TCB shall be maintained that is proven consistent with 
                 its axioms.  A descriptive top-level specification (DTLS)
                 of the TCB shall be maintained that completely and
                 accurately describes the TCB in terms of exceptions, error
                 messages, and effects.  A FORMAL TOP-LEVEL SPECIFICATION
                 (FTLS) OF THE TCB SHALL BE MAINTAINED THAT ACCURATELY
                 DESCRIBES THE TCB IN TERMS OF EXCEPTIONS, ERROR MESSAGES,
                 AND EFFECTS.  THE DTLS AND FTLS SHALL INCLUDE THOSE 
                 COMPONENTS OF THE TCB THAT ARE IMPLEMENTED AS HARDWARE
                 AND/OR FIRMWARE IF THEIR PROPERTIES ARE VISIBLE AT THE
                 TCB INTERFACE.  THE FTLS shall be shown to be an accurate
                 description of the TCB interface.  A convincing argument
                 shall be given that the DTLS is consistent with the model
                 AND A COMBINATION OF FORMAL AND INFORMAL TECHNIQUES SHALL
                 BE USED TO SHOW THAT THE FTLS IS CONSISTENT WITH THE
                 MODEL.  THIS VERIFICATION EVIDENCE SHALL BE CONSISTENT 
                 WITH THAT PROVIDED WITHIN THE STATE-OF-THE-ART OF THE 
                 PARTICULAR COMPUTER SECURITY CENTER-ENDORSED FORMAL
                 SPECIFICATION AND VERIFICATION SYSTEM USED.  MANUAL OR
                 OTHER MAPPING OF THE FTLS TO THE TCB SOURCE CODE SHALL BE
                 PERFORMED TO PROVIDE EVIDENCE OF CORRECT IMPLEMENTATION.

        4.1.3.2.3  Configuration Management

                 During THE ENTIRE LIFE-CYCLE, I.E., DURING THE DESIGN,
                 DEVELOPMENT, and maintenance of the TCB, a configuration
                 management system shall be in place FOR ALL SECURITY-
                 RELEVANT HARDWARE, FIRMWARE, AND SOFTWARE that maintains
                 control of changes to THE FORMAL MODEL, the descriptive 
                 AND FORMAL top-level SPECIFICATIONS, other design data, 
                 implementation documentation, source code, the running
                 version of the object code, and test fixtures and
                 documentation.  The configuration management system shall
                 assure a consistent mapping among all documentation and 
                 code associated with the current version of the TCB.
                 Tools shall be provided for generation of a new version
                 of the TCB from source code.  Also available shall be 
                 tools, MAINTAINED UNDER STRICT CONFIGURATION CONTROL, for
                 comparing a newly generated version with the previous TCB
                 version in order to ascertain that only the intended
                 changes have been made in the code that will actually be
                 used as the new version of the TCB.  A COMBINATION OF
                 TECHNICAL, PHYSICAL, AND PROCEDURAL SAFEGUARDS SHALL BE
                 USED TO PROTECT FROM UNAUTHORIZED MODIFICATION OR
                 DESTRUCTION THE MASTER COPY OR COPIES OF ALL MATERIAL 
                 USED TO GENERATE THE TCB.

        4.1.3.2.4  Trusted Distribution

                 A TRUSTED ADP SYSTEM CONTROL AND DISTRIBUTION FACILITY
                 SHALL BE PROVIDED FOR MAINTAINING THE INTEGRITY OF THE 
                 MAPPING BETWEEN THE MASTER DATA DESCRIBING THE CURRENT
                 VERSION OF THE TCB AND THE ON-SITE MASTER COPY OF THE
                 CODE FOR THE CURRENT VERSION.  PROCEDURES (E.G., SITE 
                 SECURITY ACCEPTANCE TESTING) SHALL EXIST FOR ASSURING
                 THAT THE TCB SOFTWARE, FIRMWARE, AND HARDWARE UPDATES
                 DISTRIBUTED TO A CUSTOMER ARE EXACTLY AS SPECIFIED BY 
                 THE MASTER COPIES.

4.1.4  DOCUMENTATION

     4.1.4.1   Security Features User's Guide

             A single summary, chapter, or manual in user documentation
             shall describe the protection mechanisms provided by the TCB,
             guidelines on their use, and how they interact with one another.

     4.1.4.2   Trusted Facility Manual

               A manual addressed to the ADP system administrator shall
             present cautions about functions and privileges that should be
             controlled when running a secure facility.  The procedures for
             examining and maintaining the audit files as well as the
             detailed audit record structure for each type of audit event
             shall be given.  The manual shall describe the operator and
             administrator functions related to security, to include 
             changing the security characteristics of a user.  It shall
             provide guidelines on the consistent and effective use of the
             protection features of the system, how they interact, how to
             securely generate a new TCB, and facility procedures, warnings,
             and privileges that need to be controlled in order to operate
             the facility in a secure manner.  The TCB modules that contain
             the reference validation mechanism shall be identified.  The 
             procedures for secure generation of a new TCB from source after
             modification of any modules in the TCB shall be described.  It
             shall include the procedures to ensure that the system is 
             initially started in a secure manner.  Procedures shall also be
             included to resume secure system operation after any lapse in 
             system operation.  

     4.1.4.3   Test Documentation

             The system developer shall provide to the evaluators a document
             that describes the test plan and results of the security
             mechanisms' functional testing.  It shall include results of 
             testing the effectiveness of the methods used to reduce covert
             channel bandwidths.  THE RESULTS OF THE MAPPING BETWEEN THE
             FORMAL TOP-LEVEL SPECIFICATION AND THE TCB SOURCE CODE SHALL BE
             GIVEN.

     4.1.4.4   Design Documentation

             Documentation shall be available that provides a description of
             the manufacturer's philosophy of protection and an explanation
             of how this philosophy is translated into the TCB.  The 
             interfaces between the TCB modules shall be described.  A
             formal description of the security policy model enforced by the
             TCB shall be available and proven that it is sufficient to 
             enforce the security policy.  The specific TCB protection 
             mechanisms shall be identified and an explanation given to show
             that they satisfy the model.  The descriptive top-level
             specification (DTLS) shall be shown to be an accurate 
             description of the TCB interface.  Documentation shall describe
             how the TCB implements the reference monitor concept and give 
             an explanation why it is tamperproof, cannot be bypassed, and
             is correctly implemented.  The TCB implementation (i.e., in
             hardware, firmware, and software) shall be informally shown to
             be consistent with the FORMAL TOP- LEVEL SPECIFICATION (FTLS).
             The elements of the FTLS shall be shown, using informal 
             techniques, to correspond to the elements of the TCB.  
             Documentation shall describe how the TCB is structured to
             facilitate testing and to enforce least privilege.  This
             documentation shall also present the results of the covert 
             channel analysis and the tradeoffs involved in restricting the
             channels.  All auditable events that may be used in the
             exploitation of known covert storage channels shall be 
             identified.  The bandwidths of known covert storage channels,
             the use of which is not detectable by the auditing mechanisms,
             shall be provided.  (See the Covert Channel Guideline section.)
             HARDWARE, FIRMWARE, AND SOFTWARE MECHANISMS NOT DEALT WITH IN
             THE FTLS BUT STRICTLY INTERNAL TO THE TCB (E.G., MAPPING
             REGISTERS, DIRECT MEMORY ACCESS I/O) SHALL BE CLEARLY DESCRIBED.

4.2  BEYOND CLASS (A1)

Most of the security enhancements envisioned for systems that will provide
features and assurance in addition to that already provided by class (Al)
systems are beyond current technology.  The discussion below is intended to
guide future work and is derived from research and development activities
already underway in both the public and private sectors.  As more and better
analysis techniques are developed, the requirements for these systems will
become more explicit.  In the future, use of formal verification will be
extended to the source level and covert timing channels will be more fully
addressed.  At this level the design environment will become important and
testing will be aided by analysis of the formal top-level specification.
Consideration will be given to the correctness of the tools used in TCB
development (e.g., compilers, assemblers, loaders) and to the correct
functioning of the hardware/firmware on which the TCB will run.  Areas to be
addressed by systems beyond class (A1) include:

           * System Architecture

           A demonstration (formal or otherwise) must be given showing
           that requirements of self-protection and completeness for
           reference monitors have been implemented in the TCB.

           * Security Testing

           Although beyond the current state-of-the-art, it is
           envisioned that some test-case generation will be done
           automatically from the formal top-level specification or
           formal lower-level specifications.

           * Formal Specification and Verification

           The TCB must be verified down to the source code level,
           using formal verification methods where feasible.  Formal
           verification of the source code of the security-relevant
           portions of an operating system has proven to be a difficult
           task.  Two important considerations are the choice of a
           high-level language whose semantics can be fully and
           formally expressed, and a careful mapping, through
           successive stages, of the abstract formal design to a
           formalization of the implementation in low-level
           specifications.    Experience has shown that only when the
           lowest level specifications closely correspond to the actual
           code can code proofs be successfully accomplished.

           * Trusted Design Environment

           The TCB must be designed in a trusted facility with only
         trusted (cleared) personnel.




                               PART II:


5.0  CONTROL OBJECTIVES FOR TRUSTED COMPUTER SYSTEMS

The criteria are divided within each class into groups of requirements.  These
groupings were developed to assure that three basic control objectives for
computer security are satisfied and not overlooked.  These control objectives
deal with:

                      * Security Policy
                      * Accountability
                      * Assurance

This section provides a discussion of these general control objectives and
their implication in terms of designing trusted systems.

5.1  A Need for Consensus

A major goal of the DoD Computer Security Center is to encourage the Computer
Industry to develop trusted computer systems and products, making them widely
available in the commercial market place.  Achievement of this goal will
require recognition and articulation by both the public and private sectors of
a need and demand for such products.

As described in the introduction to this document, efforts to define the
problems and develop solutions associated with processing nationally sensitive
information, as well as other sensitive data such as financial, medical, and
personnel information used by the National Security Establishment, have been
underway for a number of years.  The criteria, as described in Part I,
represent the culmination of these efforts and describe basic requirements for
building trusted computer systems.  To date, however, these systems have been
viewed by many as only satisfying National Security needs.  As long as this
perception continues the consensus needed to motivate manufacture of trusted
systems will be lacking.

The purpose of this section is to describe, in some detail, the fundamental
control objectives that lay the foundations for requirements delineated in the
criteria.  The goal is to explain the foundations so that those outside the
National Security Establishment can assess their universality and, by
extension, the universal applicability of the criteria requirements to
processing all types of sensitive applications whether they be for National
Security or the private sector.

5.2  Definition and Usefulness

The term "control objective" refers to a statement of intent with respect to
control over some aspect of an organization's resources, or processes, or
both.  In terms of a computer system, control objectives provide a framework
for developing a strategy for fulfilling a set of security requirements for
any given system.  Developed in response to generic vulnerabilities, such as
the need to manage and handle sensitive data in order to prevent compromise,
or the need to provide accountability in order to detect fraud, control
objectives have been identified as a useful method of expressing security
goals.[3]

Examples of control objectives include the three basic design requirements for
implementing the reference monitor concept discussed in Section 6.  They are:

        * The reference validation mechanism must be tamperproof.

        * The reference validation mechanism must always be invoked.

        * The reference validation mechanism must be small enough to be
          subjected to analysis and tests, the completeness of which can 
          be assured.[1]

5.3  Criteria Control Objectives

The three basic control objectives of the criteria are concerned with security
policy, accountability, and assurance.  The remainder of this section provides
a discussion of these basic requirements.

     5.3.1  Security Policy

          In the most general sense, computer security is concerned with
          controlling the way in which a computer can be used, i.e., 
          controlling how information processed by it can be accessed and 
          manipulated.  However, at closer examination, computer security 
          can refer to a number of areas.  Symptomatic of this, FIPS PUB 39,
          Glossary For Computer Systems Security, does not have a unique
          definition for computer security.[16]  Instead there are eleven
          separate definitions for security which include: ADP systems 
          security, administrative security, data security, etc.  A common 
          thread running through these definitions is the word "protection."
          Further declarations of protection requirements can be found in
          DoD Directive 5200.28 which describes an acceptable level of
          protection for classified data to be one that will "assure that
          systems which process, store, or use classified data and produce
          classified information will, with reasonable dependability, 
          prevent: a. Deliberate or inadvertent access to classified 
          material by unauthorized persons, and b.  Unauthorized 
          manipulation of the computer and its associated peripheral 
          devices."[8]

          In summary, protection requirements must be defined in terms of
          the perceived threats, risks, and goals of an organization.  This
          is often stated in terms of a security policy.  It has been 
          pointed out in the literature that it is external laws, rules, 
          regulations, etc.  that establish what access to information is to
          be permitted, independent of the use of a computer.  In particular,
          a given system can only be said to be secure with respect to its
          enforcement of some specific policy.[30]  Thus, the control 
          objective for security policy is:

          SECURITY POLICY CONTROL OBJECTIVE

          A STATEMENT OF INTENT WITH REGARD TO CONTROL OVER ACCESS TO AND
          DISSEMINATION OF INFORMATION, TO BE KNOWN AS THE SECURITY POLICY,
          MUST BE PRECISELY DEFINED AND IMPLEMENTED FOR EACH SYSTEM THAT IS
          USED TO PROCESS SENSITIVE INFORMATION.  THE SECURITY POLICY MUST 
          ACCURATELY REFLECT THE LAWS, REGULATIONS, AND GENERAL POLICIES
          FROM WHICH IT IS DERIVED.

        5.3.1.1  Mandatory Security Policy

                 Where a security policy is developed that is to be applied
                 to control of classified or other specifically designated 
                 sensitive information, the policy must include detailed 
                 rules on how to handle that information throughout its
                 life-cycle.  These rules are a function of the various
                 sensitivity designations that the information can assume 
                 and the various forms of access supported by the system.
                 Mandatory security refers to the enforcement of a set of
                 access control rules that constrains a subject's access to
                 information on the basis of a comparison of that 
                 individual's clearance/authorization to the information,
                 the classification/sensitivity designation of the
                 information, and the form of access being mediated.
                 Mandatory policies either require or can be satisfied by 
                 systems that can enforce a partial ordering of 
                 designations, namely, the designations must form what is
                 mathematically known as a "lattice."[5]

                 A clear implication of the above is that the system must
                 assure that the designations associated with sensitive data
                 cannot be arbitrarily changed, since this could permit 
                 individuals who lack the appropriate authorization to 
                 access sensitive information.  Also implied is the
                 requirement that the system control the flow of information
                 so that data cannot be stored with lower sensitivity 
                 designations unless its "downgrading" has been authorized.
                 The control objective is:

                 MANDATORY SECURITY CONTROL OBJECTIVE

                 SECURITY POLICIES DEFINED FOR SYSTEMS THAT ARE USED TO
                 PROCESS CLASSIFIED OR OTHER SPECIFICALLY CATEGORIZED 
                 SENSITIVE INFORMATION MUST INCLUDE PROVISIONS FOR THE 
                 ENFORCEMENT OF MANDATORY ACCESS CONTROL RULES.  THAT IS,
                 THEY MUST INCLUDE A SET OF RULES FOR CONTROLLING ACCESS 
                 BASED DIRECTLY ON A COMPARISON OF THE INDIVIDUAL'S 
                 CLEARANCE OR AUTHORIZATION FOR THE INFORMATION AND THE 
                 CLASSIFICATION OR SENSITIVITY DESIGNATION OF THE
                 INFORMATION BEING SOUGHT, AND INDIRECTLY ON CONSIDERATIONS
                 OF PHYSICAL AND OTHER ENVIRONMENTAL FACTORS OF CONTROL.  
                 THE MANDATORY ACCESS CONTROL RULES MUST ACCURATELY REFLECT
                 THE LAWS, REGULATIONS, AND GENERAL POLICIES FROM WHICH
                 THEY ARE DERIVED.

        5.3.1.2  Discretionary Security Policy

                 Discretionary security is the principal type of access
                 control available in computer systems today.  The basis of
                 this kind of security is that an individual user, or
                 program operating on his behalf, is allowed to specify
                 explicitly the types of access other users may have to
                 information under his control.  Discretionary security
                 differs from mandatory security in that it implements an
                 access control policy on the basis of an individual's
                 need-to-know as opposed to mandatory controls which are
                 driven by the classification or sensitivity designation of
                 the information.

                 Discretionary controls are not a replacement for mandatory
                 controls.  In an environment in which information is 
                 classified (as in the DoD) discretionary security provides
                 for a finer granularity of control within the overall
                 constraints of the mandatory policy.  Access to classified
                 information requires effective implementation of both types
                 of controls as precondition to granting that access.  In 
                 general, no person may have access to classified
                 information unless: (a) that person has been determined to
                 be trustworthy, i.e., granted a personnel security 
                 clearance -- MANDATORY, and (b) access is necessary for the
                 performance of official duties, i.e., determined to have a
                 need-to-know -- DISCRETIONARY.  In other words, 
                 discretionary controls give individuals discretion to 
                 decide on which of the permissible accesses will actually
                 be allowed to which users, consistent with overriding
                 mandatory policy restrictions.  The control objective is:

                 DISCRETIONARY SECURITY CONTROL OBJECTIVE

                 SECURITY POLICIES DEFINED FOR SYSTEMS THAT ARE USED TO
                 PROCESS CLASSIFIED OR OTHER SENSITIVE INFORMATION MUST 
                 INCLUDE PROVISIONS FOR THE ENFORCEMENT OF DISCRETIONARY
                 ACCESS CONTROL RULES.  THAT IS, THEY MUST INCLUDE A
                 CONSISTENT SET OF RULES FOR CONTROLLING AND LIMITING ACCESS
                 BASED ON IDENTIFIED INDIVIDUALS WHO HAVE BEEN DETERMINED TO
                 HAVE A NEED-TO-KNOW FOR THE INFORMATION.

        5.3.1.3  Marking

                 To implement a set of mechanisms that will put into effect
                 a mandatory security policy, it is necessary that the 
                 system mark information with appropriate classification or
                 sensitivity labels and maintain these markings as the
                 information moves through the system.  Once information is
                 unalterably and accurately marked, comparisons required by
                 the mandatory access control rules can be accurately and
                 consistently made.  An additional benefit of having the
                 system maintain the classification or sensitivity label
                 internally is the ability to automatically generate 
                 properly "labeled" output.  The labels, if accurately and
                 integrally maintained by the system, remain accurate when
                 output from the system.  The control objective is:

                 MARKING CONTROL OBJECTIVE

                 SYSTEMS THAT ARE DESIGNED TO ENFORCE A MANDATORY SECURITY
                 POLICY MUST STORE AND PRESERVE THE INTEGRITY OF 
                 CLASSIFICATION OR OTHER SENSITIVITY LABELS FOR ALL 
                 INFORMATION.  LABELS EXPORTED FROM THE SYSTEM MUST BE
                 ACCURATE REPRESENTATIONS OF THE CORRESPONDING INTERNAL 
                 SENSITIVITY LABELS BEING EXPORTED.

     5.3.2  Accountability

          The second basic control objective addresses one of the
          fundamental principles of security, i.e., individual 
          accountability.  Individual accountability is the key to securing
          and controlling any system that processes information on behalf
          of individuals or groups of individuals.  A number of requirements
          must be met in order to satisfy this objective.

          The first requirement is for individual user identification.
          Second, there is a need for authentication of the identification.
          Identification is functionally dependent on authentication.  
          Without authentication, user identification has no credibility.  
          Without a credible identity, neither mandatory nor discretionary
          security policies can be properly invoked because there is no
          assurance that proper authorizations can be made.

          The third requirement is for dependable audit capabilities.  That
          is, a trusted computer system must provide authorized personnel 
          with the ability to audit any action that can potentially cause
          access to, generation of, or effect the release of classified or
          sensitive information.  The audit data will be selectively 
          acquired based on the auditing needs of a particular installation
          and/or application.  However, there must be sufficient granularity
          in the audit data to support tracing the auditable events to a
          specific individual who has taken the actions or on whose behalf
          the actions were taken.  The control objective is:

          ACCOUNTABILITY CONTROL OBJECTIVE

          SYSTEMS THAT ARE USED TO PROCESS OR HANDLE CLASSIFIED OR OTHER
          SENSITIVE INFORMATION MUST ASSURE INDIVIDUAL ACCOUNTABILITY 
          WHENEVER EITHER A MANDATORY OR DISCRETIONARY SECURITY POLICY IS
          INVOKED.  FURTHERMORE, TO ASSURE ACCOUNTABILITY THE CAPABILITY 
          MUST EXIST FOR AN AUTHORIZED AND COMPETENT AGENT TO ACCESS AND
          EVALUATE ACCOUNTABILITY INFORMATION BY A SECURE MEANS, WITHIN A
          REASONABLE AMOUNT OF TIME, AND WITHOUT UNDUE DIFFICULTY.

     5.3.3  Assurance

          The third basic control objective is concerned with guaranteeing
          or providing confidence that the security policy has been 
          implemented correctly and that the protection-relevant elements of
          the system do, indeed, accurately mediate and enforce the intent
          of that policy.  By extension, assurance must include a guarantee
          that the trusted portion of the system works only as intended.  To
          accomplish these objectives, two types of assurance are needed.
          They are life-cycle assurance and operational assurance.

          Life-cycle assurance refers to steps taken by an organization to
          ensure that the system is designed, developed, and maintained 
          using formalized and rigorous controls and standards.[17]  
          Computer systems that process and store sensitive or classified
          information depend on the hardware and software to protect that
          information.  It follows that the hardware and software themselves
          must be protected against unauthorized changes that could cause
          protection mechanisms to malfunction or be bypassed completely.  
          For this reason trusted computer systems must be carefully 
          evaluated and tested during the design and development phases and
          reevaluated whenever changes are made that could affect the
          integrity of the protection mechanisms.  Only in this way can
          confidence be provided that the hardware and software 
          interpretation of the security policy is maintained accurately 
          and without distortion.

          While life-cycle assurance is concerned with procedures for
          managing system design, development, and maintenance; operational
          assurance focuses on features and system architecture used to
          ensure that the security policy is uncircumventably enforced
          during system operation.  That is, the security policy must be
          integrated into the hardware and software protection features of
          the system.  Examples of steps taken to provide this kind of
          confidence include: methods for testing the operational hardware 
          and software for correct operation, isolation of protection-
          critical code, and the use of hardware and software to provide
          distinct domains.  The control objective is:

          ASSURANCE CONTROL OBJECTIVE

          SYSTEMS THAT ARE USED TO PROCESS OR HANDLE CLASSIFIED OR OTHER
          SENSITIVE INFORMATION MUST BE DESIGNED TO GUARANTEE CORRECT AND
          ACCURATE INTERPRETATION OF THE SECURITY POLICY AND MUST NOT 
          DISTORT THE INTENT OF THAT POLICY.  ASSURANCE MUST BE PROVIDED
          THAT CORRECT IMPLEMENTATION AND OPERATION OF THE POLICY EXISTS
          THROUGHOUT THE SYSTEM'S LIFE-CYCLE.  


6.0 RATIONALE BEHIND THE EVALUATION CLASSES

6.1  The Reference Monitor Concept

In October of 1972, the Computer Security Technology Planning Study, conducted
by James P.  Anderson & Co., produced a report for the Electronic Systems
Division (ESD) of the United States Air Force.[1]  In that report, the concept
of "a reference monitor which enforces the authorized access relationships
between subjects and objects of a system" was introduced.  The reference
monitor concept was found to be an essential element of any system that would
provide multilevel secure computing facilities and controls.

The Anderson report went on to define the reference validation mechanism as
"an implementation of the reference monitor concept .  .  .  that validates
each reference to data or programs by any user (program) against a list of
authorized types of reference for that user." It then listed the three design
requirements that must be met by a reference validation mechanism:

        a. The reference validation mechanism must be tamper proof.

        b. The reference validation mechanism must always be invoked.

        c. The reference validation mechanism must be small enough to be
           subject to analysis and tests, the completeness of which can 
           be assured."[1]

Extensive peer review and continuing research and development activities have
sustained the validity of the Anderson Committee's findings.  Early examples
of the reference validation mechanism were known as security kernels.  The
Anderson Report described the security kernel as "that combination of hardware
and software which implements the reference monitor concept."[1]  In this vein,
it will be noted that the security kernel must support the three reference
monitor requirements listed above.

6.2  A Formal Security Policy Model

Following the publication of the Anderson report, considerable research was
initiated into formal models of security policy requirements and of the
mechanisms that would implement and enforce those policy models as a security
kernel.  Prominent among these efforts was the ESD-sponsored development of
the Bell and LaPadula model, an abstract formal treatment of DoD security
policy.[2]  Using mathematics and set theory, the model precisely defines the
notion of secure state, fundamental modes of access, and the rules for
granting subjects specific modes of access to objects.  Finally, a theorem is
proven to demonstrate that the rules are security-preserving operations, so
that the application of any sequence of the rules to a system that is in a
secure state will result in the system entering a new state that is also
secure.  This theorem is known as the Basic Security Theorem.

The Bell and LaPadula model defines a relationship between clearances of
subjects and classifications of system objects, now referenced as the
"dominance relation." From this definition, accesses permitted between
subjects and objects are explicitly defined for the fundamental modes of
access, including read-only access, read/write access, and write-only access.
The model defines the Simple Security Condition to control granting a subject
read access to a specific object, and the *-Property (read "Star Property") to
control granting a subject write access to a specific object.  Both the Simple
Security Condition and the *-Property include mandatory security provisions
based on the dominance relation between the clearance of the subject and the
classification of the object.  The Discretionary Security Property is also
defined, and requires that a specific subject be authorized for the particular
mode of access required for the state transition.  In its treatment of
subjects (processes acting on behalf of a user), the model distinguishes
between trusted subjects (i.e., not constrained within the model by the


From the Bell and LaPadula model there evolved a model of the method of proof
required to formally demonstrate that all arbitrary sequences of state
transitions are security-preserving.  It was also shown that the *- Property
is sufficient to prevent the compromise of information by Trojan Horse
attacks.

6.3  The Trusted Computing Base

In order to encourage the widespread commercial availability of trusted
computer systems, these evaluation criteria have been designed to address
those systems in which a security kernel is specifically implemented as well
as those in which a security kernel has not been implemented.  The latter case
includes those systems in which objective (c) is not fully supported because
of the size or complexity of the reference validation mechanism.  For
convenience, these evaluation criteria use the term Trusted Computing Base to
refer to the reference validation mechanism, be it a security kernel,
front-end security filter, or the entire trusted computer system.

The heart of a trusted computer system is the Trusted Computing Base (TCB)
which contains all of the elements of the system responsible for supporting
the security policy and supporting the isolation of objects (code and data) on
which the protection is based.  The bounds of the TCB equate to the "security
perimeter" referenced in some computer security literature.  In the interest
of understandable and maintainable protection, a TCB should be as simple as
possible consistent with the functions it has to perform.  Thus, the TCB
includes hardware, firmware, and software critical to protection and must be
designed and implemented such that system elements excluded from it need not
be trusted to maintain protection.  Identification of the interface and
elements of the TCB along with their correct functionality therefore forms the
basis for evaluation.

For general-purpose systems, the TCB will include key elements of the
operating system and may include all of the operating system.  For embedded
systems, the security policy may deal with objects in a way that is meaningful
at the application level rather than at the operating system level.  Thus, the
protection policy may be enforced in the application software rather than in
the underlying operating system.  The TCB will necessarily include all those
portions of the operating system and application software essential to the
support of the policy.  Note that, as the amount of code in the TCB increases,
it becomes harder to be confident that the TCB enforces the reference monitor
requirements under all circumstances.

6.4  Assurance

The third reference monitor design objective is currently interpreted as
meaning that the TCB "must be of sufficiently simple organization and
complexity to be subjected to analysis and tests, the completeness of which
can be assured."

Clearly, as the perceived degree of risk increases (e.g., the range of
sensitivity of the system's protected data, along with the range of clearances
held by the system's user population) for a particular system's operational
application and environment, so also must the assurances be increased to
substantiate the degree of trust that will be placed in the system.  The
hierarchy of requirements that are presented for the evaluation classes in the
trusted computer system evaluation criteria reflect the need for these
assurances.

As discussed in Section 5.3, the evaluation criteria uniformly require a
statement of the security policy that is enforced by each trusted computer
system.  In addition, it is required that a convincing argument be presented
that explains why the TCB satisfies the first two design requirements for a
reference monitor.  It is not expected that this argument will be entirely
formal.  This argument is required for each candidate system in order to
satisfy the assurance control objective.

The systems to which security enforcement mechanisms have been added, rather
than built-in as fundamental design objectives, are not readily amenable to
extensive analysis since they lack the requisite conceptual simplicity of a
security kernel.  This is because their TCB extends to cover much of the
entire system.  Hence, their degree of trustworthiness can best be ascertained
only by obtaining test results.  Since no test procedure for something as
complex as a computer system can be truly exhaustive, there is always the
possibility that a subsequent penetration attempt could succeed.  It is for
this reason that such systems must fall into the lower evaluation classes.

On the other hand, those systems that are designed and engineered to support
the TCB concepts are more amenable to analysis and structured testing.  Formal
methods can be used to analyze the correctness of their reference validation
mechanisms in enforcing the system's security policy.  Other methods,
including less-formal arguments, can be used in order to substantiate claims
for the completeness of their access mediation and their degree of
tamper-resistance.  More confidence can be placed in the results of this
analysis and in the thoroughness of the structured testing than can be placed
in the results for less methodically structured systems.  For these reasons,
it appears reasonable to conclude that these systems could be used in
higher-risk environments.  Successful implementations of such systems would be
placed in the higher evaluation classes.

6.5  The Classes

It is highly desirable that there be only a small number of overall evaluation
classes.  Three major divisions have been identified in the evaluation
criteria with a fourth division reserved for those systems that have been
evaluated and found to offer unacceptable security protection.  Within each
major evaluation division, it was found that "intermediate" classes of trusted
system design and development could meaningfully be defined.  These
intermediate classes have been designated in the criteria because they
identify systems that:

        * are viewed to offer significantly better protection and assurance
          than would systems that satisfy the basic requirements for their
          evaluation class; and

        * there is reason to believe that systems in the intermediate
          evaluation classes could eventually be evolved such that they 
          would satisfy the requirements for the next higher evaluation 
          class.

Except within division A it is not anticipated that additional "intermediate"
evaluation classes satisfying the two characteristics described above will be
identified.

Distinctions in terms of system architecture, security policy enforcement, and
evidence of credibility between evaluation classes have been defined such that
the "jump" between evaluation classes would require a considerable investment
of effort on the part of implementors.  Correspondingly, there are expected to
be significant differentials of risk to which systems from the higher
evaluation classes will be exposed.


7.0  THE RELATIONSHIP BETWEEN POLICY AND THE CRITERIA

Section 1 presents fundamental computer security requirements and Section 5
presents the control objectives for Trusted Computer Systems.  They are
general requirements, useful and necessary, for the development of all secure
systems.  However, when designing systems that will be used to process
classified or other sensitive information, functional requirements for meeting
the Control Objectives become more specific.  There is a large body of policy
laid down in the form of Regulations, Directives, Presidential Executive
Orders, and OMB Circulars that form the basis of the procedures for the
handling and processing of Federal information in general and classified
information specifically.  This section presents pertinent excerpts from these
policy statements and discusses their relationship to the Control Objectives.


7.1  Established Federal Policies

A significant number of computer security policies and associated requirements
have been promulgated by Federal government elements.  The interested reader
is referred to reference [32] which analyzes the need for trusted systems in
the civilian agencies of the Federal government, as well as in state and local
governments and in the private sector.  This reference also details a number
of relevant Federal statutes, policies and requirements not treated further
below.

Security guidance for Federal automated information systems is provided by the
Office of Management and Budget.  Two specifically applicable Circulars have
been issued.  OMB Circular No.  A-71, Transmittal Memorandum No.  1, "Security
of Federal Automated Information Systems,"[26] directs each executive agency
to establish and maintain a computer security program.  It makes the head of
each executive branch, department and agency responsible "for assuring an
adequate level of security for all agency data whether processed in-house or
commercially.  This includes responsibility for the establishment of physical,
administrative and technical safeguards required to adequately protect
personal, proprietary or other sensitive data not subject to national security
regulations, as well as national security data."[26, para. 4 p. 2]

OMB Circular No.  A-123, "Internal Control Systems,"[27] issued to help
eliminate fraud, waste, and abuse in government programs requires: (a) agency
heads to issue internal control directives and assign responsibility, (b)
managers to review programs for vulnerability, and (c) managers to perform
periodic reviews to evaluate strengths and update controls.  Soon after
promulgation of OMB Circular A-123, the relationship of its internal control
requirements to building secure computer systems was recognized.[4] While not
stipulating computer controls specifically, the definition of Internal
Controls in A-123 makes it clear that computer systems are to be included:

     "Internal Controls - The plan of organization and all of the methods and
      measures adopted within an agency to safeguard its resources, assure the
      accuracy and reliability of its information, assure adherence to 
      applicable laws, regulations and policies, and promote operational 
      economy and efficiency."[27, sec. 4.C]

The matter of classified national security information processed by ADP
systems was one of the first areas given serious and extensive concern in
computer security.  The computer security policy documents promulgated as a
result contain generally more specific and structured requirements than most,
keyed in turn to an authoritative basis that itself provides a rather clearly
articulated and structured information security policy.  This basis, Executive
Order 12356, "National Security Information," sets forth requirements for the
classification, declassification and safeguarding of "national security
information" per se.[14]

7.2  DoD Policies

Within the Department of Defense, these broad requirements are implemented and
further specified primarily through two vehicles: 1) DoD Regulation 5200.1-R
[7], which applies to all components of the DoD as such, and 2) DoD 5220.22-M,
"Industrial Security Manual for Safeguarding Classified Information" [11],
which applies to contractors included within the Defense Industrial Security
Program.  Note that the latter transcends DoD as such, since it applies not
only to any contractors handling classified information for any DoD component,
but also to the contractors of eighteen other Federal organizations for whom
the Secretary of Defense is authorized to act in rendering industrial security
services.*

           ____________________________________________________________
           * i.e., NASA, Commerce Department, GSA, State Department,
           Small Business Administration, National Science Foundation,
           Treasury Department, Transportation Department, Interior
           Department, Agriculture Department, Health and Human
           Services Department, Labor Department, Environmental
           Protection Agency, Justice Department, U.S. Arms Control and
           Disarmament Agency, Federal Emergency Management Agency,
           Federal Reserve System, and U.S. General Accounting Office.
           ____________________________________________________________


For ADP systems, these information security requirements are further amplified
and specified in: 1) DoD Directive 5200.28 [8] and DoD Manual 5200.28-M [9],
for DoD components; and 2) Section XIII of DoD 5220.22-M [11] for contractors.
DoD Directive 5200.28, "Security Requirements for Automatic Data Processing
(ADP) Systems," stipulates: "Classified material contained in an ADP system
shall be safeguarded by the continuous employment of protective features in
the system's hardware and software design and configuration .  .  .  ."[8,
sec.  IV] Furthermore, it is required that ADP systems that "process, store,
or use classified data and produce classified information will, with
reasonable dependability, prevent:

     a.  Deliberate or inadvertent access to classified material by
         unauthorized persons, and

     b.  Unauthorized manipulation of the computer and its associated
         peripheral devices."[8, sec. I B.3]

Requirements equivalent to these appear within DoD 5200.28-M [9] and in DoD
5220.22-M [11].

From requirements imposed by these regulations, directives and circulars, the
three components of the Security Policy Control Objective, i.e., Mandatory and
Discretionary Security and Marking, as well as the Accountability and
Assurance Control Objectives, can be functionally defined for DoD
applications.  The following discussion provides further specificity in Policy
for these Control Objectives.

7.3  Criteria Control Objective for Security Policy

     7.3.1  Marking

          The control objective for marking is: "Systems that are designed
          to enforce a mandatory security policy must store and preserve the
          integrity of classification or other sensitivity labels for all 
          information.  Labels exported from the system must be accurate 
          representations of the corresonding internal sensitivity labels
          being exported."

          DoD 5220.22-M, "Industrial Security Manual for Safeguarding
          Classified Information," explains in paragraph 11 the reasons for 
          marking information:

               "Designation by physical marking, notation or other means
               serves to inform and to warn the holder about the 
               classification designation of the information which requires
               protection in the interest of national security.  The degree
               of protection against unauthorized disclosure which will be
               required for a particular level of classification is directly
               commensurate with the marking designation which is assigned 
               to the material."[11]

          Marking requirements are given in a number of policy statements.

          Executive Order 12356 (Sections 1.5.a and 1.5.a.1) requires that
          classification markings "shall be shown on the face of all 
          classified documents, or clearly associated with other forms of 
          classified information in a manner appropriate to the medium 
          involved."[14]

          DoD Regulation 5200.1-R (Section 1-500) requires that: ".  .  .
          information or material that requires protection against 
          unauthorized disclosure in the interest of national security shall
          be classified in one of three designations, namely: 'Top Secret,'
          'Secret' or 'Confidential.'"[7] (By extension, for use in computer
          processing, the unofficial designation "Unclassified" is used to
          indicate information that does not fall under one of the other
          three designations of classified information.)

          DoD Regulation 5200.1-R (Section 4-304b) requires that: "ADP
          systems and word processing systems employing such media shall 
          provide for internal classification marking to assure that 
          classified information contained therein that is reproduced or 
          generated, will bear applicable classification and associated
          markings." (This regulation provides for the exemption of certain
          existing systems where "internal classification and applicable
          associated markings cannot be implemented without extensive system
          modifications."[7]  However, it is clear that future DoD ADP 
          systems must be able to provide applicable and accurate labels for
          classified and other sensitive information.)

          DoD Manual 5200.28-M (Section IV, 4-305d) requires the following:
          "Security Labels - All classified material accessible by or within
          the ADP system shall be identified as to its security 
          classification and access or dissemination limitations, and all
          output of the ADP system shall be appropriately marked."[9]

     7.3.2  Mandatory Security

          The control objective for mandatory security is: "Security
          policies defined for systems that are used to process classified
          or other specifically categorized sensitive information must 
          include provisions for the enforcement of mandatory access control
          rules.  That is, they must include a set of rules for controlling
          access based directly on a comparison of the individual's
          clearance or authorization for the information and the 
          classification or sensitivity designation of the information being
          sought, and indirectly on considerations of physical and other 
          environmental factors of control.  The mandatory access control
          rules must accurately reflect the laws, regulations, and general
          policies from which they are derived."

          There are a number of policy statements that are related to
          mandatory security.

          Executive Order 12356 (Section 4.1.a) states that "a person is
          eligible for access to classified information provided that a 
          determination of trustworthiness has been made by agency heads or
          designated officials and provided that such access is essential
          to the accomplishment of lawful and authorized Government
          purposes."[14]

          DoD Regulation 5200.1-R (Chapter I, Section 3) defines a Special
          Access Program as "any program imposing 'need-to-know' or access
          controls beyond those normally provided for access to 
          Confidential, Secret, or Top Secret information.  Such a program
          includes, but is not limited to, special clearance, adjudication,
          or investigative requirements, special designation of officials
          authorized to determine 'need-to-know', or special lists of persons
          determined to have a 'need-to- know.'"[7, para.  1-328] This
          passage distinguishes between a 'discretionary' determination of
          need-to-know and formal need-to-know which is implemented through
          Special Access Programs.  DoD Regulation 5200.1-R, paragraph 7-100
          describes general requirements for trustworthiness (clearance) and
          need-to-know, and states that the individual with possession,
          knowledge or control of classified information has final
          responsibility for determining if conditions for access have been
          met.  This regulation further stipulates that "no one has a right
          to have access to classified information solely by virtue of rank
          or position." [7, para. 7-100])

          DoD Manual 5200.28-M (Section II 2-100) states that, "Personnel
          who develop, test (debug), maintain, or use programs which are 
          classified or which will be used to access or develop classified
          material shall have a personnel security clearance and an access
          authorization (need-to-know), as appropriate for the highest
          classified and most restrictive category of classified material
          which they will access under system constraints."[9]

          DoD Manual 5220.22-M (Paragraph 3.a) defines access as "the
          ability and opportunity to obtain knowledge of classified 
          information.  An individual, in fact, may have access to 
          classified information by being in a place where such information
          is kept, if the security measures which are in force do not
          prevent him from gaining knowledge of the classified 
          information."[11]

          The above mentioned Executive Order, Manual, Directives and
          Regulations clearly imply that a trusted computer system must 
          assure that the classification labels associated with sensitive
          data cannot be arbitrarily changed, since this could permit
          individuals who lack the appropriate clearance to access
          classified information.  Also implied is the requirement that a
          trusted computer system must control the flow of information so 
          that data from a higher classification cannot be placed in a 
          storage object of lower classification unless its "downgrading" 
          has been authorized.

     7.3.3  Discretionary Security

          The term discretionary security refers to a computer system's
          ability to control information on an individual basis.  It stems
          from the fact that even though an individual has all the formal 
          clearances for access to specific classified information, each
          individual's access to information must be based on a demonstrated
          need-to-know.  Because of this, it must be made clear that this
          requirement is not discretionary in a "take it or leave it" sense.
          The directives and regulations are explicit in stating that the
          need-to-know test must be satisfied before access can be granted 
          to the classified information.  The control objective for 
          discretionary security is: "Security policies defined for systems
          that are used to process classified or other sensitive information
          must include provisions for the enforcement of discretionary
          access control rules.  That is, they must include a consistent set
          of rules for controlling and limiting access based on identified
          individuals who have been determined to have a need-to-know for the
          information."

          DoD Regulation 5200.1-R (Paragraph 7-100) In addition to excerpts
          already provided that touch on need-to- know, this section of the
          regulation stresses the need- to-know principle when it states "no
          person may have access to classified information unless .  .  .  
          access is necessary for the performance of official duties."[7]

          Also, DoD Manual 5220.22-M (Section III 20.a) states that "an
          individual shall be permitted to have access to classified
          information only . . . when the contractor determines that access
          is necessary in the performance of tasks or services essential to
          the fulfillment of a contract or program, i.e., the individual has
          a need-to-know."[11]

7.4  Criteria Control Objective for Accountability

     The control objective for accountability is: "Systems that are used to
     process or handle classified or other sensitive information must assure
     individual accountability whenever either a mandatory or discretionary
     security policy is invoked.  Furthermore, to assure accountability the
     capability must exist for an authorized and competent agent to access and
     evaluate accountability information by a secure means, within a reasonable
     amount of time, and without undue difficulty."

     This control objective is supported by the following citations:

     DoD Directive 5200.28 (VI.A.1) states: "Each user's identity shall be
     positively established, and his access to the system, and his activity in
     the system (including material accessed and actions taken) controlled and
     open to scrutiny."[8]

     DoD Manual 5200.28-M (Section V 5-100) states: "An audit log or file
     (manual, machine, or a combination of both) shall be maintained as a 
     history of the use of the ADP System to permit a regular security review
     of system activity.  (e.g., The log should record security related 
     transactions, including each access to a classified file and the nature 
     of the access, e.g., logins, production of accountable classified 
     outputs, and creation of new classified files.  Each classified file
     successfully accessed [regardless of the number of individual references]
     during each 'job' or 'interactive session' should also be recorded in the
     audit log.  Much of the material in this log may also be required to 
     assure that the system preserves information entrusted to it.)"[9]

     DoD Manual 5200.28-M (Section IV 4-305f) states: "Where needed to assure
     control of access and individual accountability, each user or specific 
     group of users shall be identified to the ADP System by appropriate 
     administrative or hardware/software measures.  Such identification 
     measures must be in sufficient detail to enable the ADP System to provide
     the user only that material which he is authorized."[9]

     DoD Manual 5200.28-M (Section I 1-102b) states: 

        "Component's Designated Approving Authorities, or their designees
         for this purpose .  .  .  will assure:

                 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .

           (4) Maintenance of documentation on operating systems (O/S)
           and all modifications thereto, and its retention for a
           sufficient period of time to enable tracing of security-
           related defects to their point of origin or inclusion in the
           system.

                 .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .

           (6) Establishment of procedures to discover, recover,
           handle, and dispose of classified material improperly
           disclosed through system malfunction or personnel action.

           (7) Proper disposition and correction of security
           deficiencies in all approved ADP Systems, and the effective
           use and disposition of system housekeeping or audit records,
           records of security violations or security-related system
           malfunctions, and records of tests of the security features
           of an ADP System."[9]

     DoD Manual 5220.22-M (Section XIII 111) states: "Audit Trails

           a. The general security requirement for any ADP system audit
           trail is that it provide a documented history of the use of
           the system.  An approved audit trail will permit review of
           classified system activity and will provide a detailed
           activity record to facilitate reconstruction of events to
           determine the magnitude of compromise (if any) should a
           security malfunction occur.  To fulfill this basic
           requirement, audit trail systems, manual, automated or a
           combination of both must document significant events
           occurring in the following areas of concern: (i) preparation
           of input data and dissemination of output data (i.e.,
           reportable interactivity between users and system support
           personnel), (ii) activity involved within an ADP environment
           (e.g., ADP support personnel modification of security and
           related controls), and (iii) internal machine activity.

           b. The audit trail for an ADP system approved to process
           classified information must be based on the above three
           areas and may be stylized to the particular system.  All
           systems approved for classified processing should contain
           most if not all of the audit trail records listed below. The
           contractor's SPP documentation must identify and describe
           those applicable:

                      1. Personnel access;

                      2. Unauthorized and surreptitious entry into the
           central computer facility or remote terminal areas;

                      3. Start/stop time of classified processing indicating
           pertinent systems security initiation and termination events
           (e.g., upgrading/downgrading actions pursuant to paragraph
           107);

                      4. All functions initiated by ADP system console
           operators;

                      5. Disconnects of remote terminals and peripheral
           devices (paragraph 107c);

                      6. Log-on and log-off user activity;

                      7. Unauthorized attempts to access files or programs,
           as well as all open, close, create, and file destroy
           actions;

                      8. Program aborts and anomalies including
           identification information (i.e., user/program name, time
           and location of incident, etc.);

                      9. System hardware additions, deletions and maintenance
           actions;

                      10. Generations and modifications affecting the
           security features of the system software.

           c. The ADP system security supervisor or designee shall
           review the audit trail logs at least weekly to assure that
           all pertinent activity is properly recorded and that
           appropriate action has been taken to correct any anomaly.
           The majority of ADP systems in use today can develop audit
           trail systems in accord with the above; however, special
           systems such as weapons, communications, communications
           security, and tactical data exchange and display systems,
           may not be able to comply with all aspects of the above and
           may require individualized consideration by the cognizant
           security office.

           d. Audit trail records shall be retained for a period of one
           inspection cycle."[11]

7.5  Criteria Control Objective for Assurance

     The control objective for assurance is: "Systems that are used to process
     or handle classified or other sensitive information must be designed to
     guarantee correct and accurate interpretation of the security policy and
     must not distort the intent of that policy.  Assurance must be provided
     that correct implementation and operation of the policy exists throughout
     the system's life-cycle."

     A basis for this objective can be found in the following sections of DoD
     Directive 5200.28:

     DoD Directive 5200.28 (IV.B.1) stipulates: "Generally, security of an ADP
     system is most effective and economical if the system is designed 
     originally to provide it.  Each Department of Defense Component 
     undertaking design of an ADP system which is expected to process, store,
     use, or produce classified material shall:  From the beginning of the 
     design process, consider the security policies, concepts, and measures
     prescribed in this Directive."[8]

     DoD Directive 5200.28 (IV.C.5.a) states: "Provision may be made to permit
     adjustment of ADP system area controls to the level of protection 
     required for the classification category and type(s) of material actually
     being handled by the system, provided change procedures are developed and
     implemented which will prevent both the unauthorized access to classified
     material handled by the system and the unauthorized manipulation of the
     system and its components.  Particular attention shall be given to the
     continuous protection of automated system security measures, techniques
     and procedures when the personnel security clearance level of users
     having access to the system changes."[8]

     DoD Directive 5200.28 (VI.A.2) states: "Environmental Control.  The ADP
     System shall be externally protected to minimize the likelihood of
     unauthorized access to system entry points, access to classified 
     information in the system, or damage to the system."[8]

     DoD Manual 5200.28-M (Section I 1-102b) states: 

        "Component's Designated Approving Authorities, or their designees
        for this purpose .  .  .  will assure:

                  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .

              (5) Supervision, monitoring, and testing, as appropriate, of
          changes in an approved ADP System which could affect the
          security features of the system, so that a secure system is
          maintained.

                  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .

              (7) Proper disposition and correction of security
          deficiencies in all approved ADP Systems, and the effective
          use and disposition of system housekeeping or audit records,
          records of security violations or security-related system
          malfunctions, and records of tests of the security features
          of an ADP System.

              (8) Conduct of competent system ST&E, timely review of
          system ST&E reports, and correction of deficiencies needed
          to support conditional or final approval or disapproval of
          an ADP System for the processing of classified information.

              (9) Establishment, where appropriate, of a central ST&E
          coordination point for the maintenance of records of
          selected techniques, procedures, standards, and tests used
          in the testing and evaluation of security features of ADP
          Systems which may be suitable for validation and use by
          other Department of Defense Components."[9]

     DoD Manual 5220.22-M (Section XIII 103a) requires: "the initial approval,
     in writing, of the cognizant security office prior to processing any
     classified information in an ADP system.  This section requires 
     reapproval by the cognizant security office for major system 
     modifications made subsequent to initial approval.  Reapprovals will be 
     required because of (i) major changes in personnel access requirements,
     (ii) relocation or structural modification of the central computer
     facility, (iii) additions, deletions or changes to main frame, storage or
     input/output devices, (iv) system software changes impacting security
     protection features, (v) any change in clearance, declassification, audit
     trail or hardware/software maintenance procedures, and (vi) other system
     changes as determined by the cognizant security office."[11]

     A major component of assurance, life-cycle assurance, is concerned with
     testing ADP systems both in the development phase as well as during 
     operation.  DoD Directive 5215.1 (Section F.2.C.(2)) requires 
     "evaluations of selected industry and government-developed trusted 
     computer systems against these criteria."[10]



8.0  A GUIDELINE ON COVERT CHANNELS

A covert channel is any communication channel that can be exploited by a
process to transfer information in a manner that violates the system's
security policy.  There are two types of covert channels: storage channels and
timing channels.  Covert storage channels include all vehicles that would
allow the direct or indirect writing of a storage location by one process and
the direct or indirect reading of it by another.  Covert timing channels
include all vehicles that would allow one process to signal information to
another process by modulating its own use of system resources in such a way
that the change in response time observed by the second process would provide
information.

From a security perspective, covert channels with low bandwidths represent a
lower threat than those with high bandwidths.  However, for many types of
covert channels, techniques used to reduce the bandwidth below a certain rate
(which depends on the specific channel mechanism and the system architecture)
also have the effect of degrading the performance provided to legitimate
system users.  Hence, a trade-off between system performance and covert
channel bandwidth must be made.  Because of the threat of compromise that
would be present in any multilevel computer system containing classified or
sensitive information, such systems should not contain covert channels with
high bandwidths.  This guideline is intended to provide system developers with
an idea of just how high a "high" covert channel bandwidth is.

A covert channel bandwidth that exceeds a rate of one hundred (100) bits per
second is considered "high" because 100 bits per second is the approximate
rate at which many computer terminals are run.  It does not seem appropriate
to call a computer system "secure" if information can be compromised at a rate
equal to the normal output rate of some commonly used device.

In any multilevel computer system there are a number of relatively
low-bandwidth covert channels whose existence is deeply ingrained in the
system design.  Faced with the large potential cost of reducing the bandwidths
of such covert channels, it is felt that those with maximum bandwidths of less
than one (1) bit per second are acceptable in most application environments.
Though maintaining acceptable performance in some systems may make it
impractical to eliminate all covert channels with bandwidths of 1 or more bits
per second, it is possible to audit their use without adversely affecting
system performance.  This audit capability provides the system administration
with a means of detecting -- and procedurally correcting -- significant
compromise.  Therefore, a Trusted Computing Base should provide, wherever
possible, the capability to audit the use of covert channel mechanisms with
bandwidths that may exceed a rate of one (1) bit in ten (10) seconds.

The covert channel problem has been addressed by a number of authors.  The
interested reader is referred to references [5], [6], [19], [21], [22], [23],
and [29].



9.0  A GUIDELINE ON CONFIGURING MANDATORY ACCESS CONTROL FEATURES

The Mandatory Access Control requirement includes a capability to support an
unspecified number of hierarchical classifications and an unspecified number
of non-hierarchical categories at each hierarchical level.  To encourage
consistency and portability in the design and development of the National
Security Establishment trusted computer systems, it is desirable for all such
systems to be able to support a minimum number of levels and categories.  The
following suggestions are provided for this purpose:

     * The number of hierarchical classifications should be greater than or
       equal to eight (8).

     * The number of non-hierarchical categories should be greater than or
       equal to twenty-nine (29).



10.0  A GUIDELINE ON SECURITY TESTING

These guidelines are provided to give an indication of the extent and
sophistication of testing undertaken by the DoD Computer Security Center
during the Formal Product Evaluation process.  Organizations wishing to use
"Department of Defense Trusted Computer System Evaluation Criteria" for
performing their own evaluations may find this section useful for planning
purposes.

As in Part I, highlighting is used to indicate changes in the guidelines from
the next lower division.

10.1  Testing for Division C

     10.1.1   Personnel

            The security testing team shall consist of at least two
            individuals with bachelor degrees in Computer Science or the
            equivalent.  Team members shall be able to follow test plans
            prepared by the system developer and suggest additions, shall
            be familiar with the "flaw hypothesis" or equivalent security
            testing methodology, and shall have assembly level programming
            experience.  Before testing begins, the team members shall have
            functional knowledge of, and shall have completed the system 
            developer's internals course for, the system being evaluated.

     10.1.2   Testing

            The team shall have "hands-on" involvement in an independent run
            of the tests used by the system developer.  The team shall 
            independently design and implement at least five system-specific
            tests in an attempt to circumvent the security mechanisms of the
            system.  The elapsed time devoted to testing shall be at least
            one month and need not exceed three months.  There shall be no
            fewer than twenty hands-on hours spent carrying out system
            developer-defined tests and test team-defined tests.

10.2  Testing for Division B

     10.2.1   Personnel

            The security testing team shall consist of at least two
            individuals with bachelor degrees in Computer Science or the 
            equivalent and at least one individual with a master's degree in
            Computer Science or equivalent.  Team members shall be able to
            follow test plans prepared by the system developer and suggest
            additions, shall be conversant with the "flaw hypothesis" or
            equivalent security testing methodology, shall be fluent in the
            TCB implementation language(s), and shall have assembly level 
            programming experience.  Before testing begins, the team members
            shall have functional knowledge of, and shall have completed the
            system developer's internals course for, the system being
            evaluated.  At least one team member shall have previously
            completed a security test on another system.

     10.2.2   Testing

            The team shall have "hands-on" involvement in an independent run
            of the test package used by the system developer to test 
            security-relevant hardware and software.  The team shall
            independently design and implement at least fifteen system-
            specific tests in an attempt to circumvent the security
            mechanisms of the system.  The elapsed time devoted to testing 
            shall be at least two months and need not exceed four months.  
            There shall be no fewer than thirty hands-on hours per team
            member spent carrying out system developer-defined tests and
            test team-defined tests.

10.3  Testing for Division A

     10.3.1   Personnel

            The security testing team shall consist of at least one
            individual with a bachelor's degree in Computer Science or the 
            equivalent and at least two individuals with masters' degrees in
            Computer Science or equivalent.  Team members shall be able to 
            follow test plans prepared by the system developer and suggest
            additions, shall be conversant with the "flaw hypothesis" or
            equivalent security testing methodology, shall be fluent in the
            TCB implementation language(s), and shall have assembly level 
            programming experience.  Before testing begins, the team members
            shall have functional knowledge of, and shall have completed the
            system developer's internals course for, the system being
            evaluated.  At least one team member shall be familiar enough
            with the system hardware to understand the maintenance diagnostic
            programs and supporting hardware documentation.  At least two 
            team members shall have previously completed a security test on
            another system.  At least one team member shall have 
            demonstrated system level programming competence on the system
            under test to a level of complexity equivalent to adding a device
            driver to the system.

     10.3.2   Testing

            The team shall have "hands-on" involvement in an independent run
            of the test package used by the system developer to test 
            security-relevant hardware and software.  The team shall 
            independently design and implement at least twenty-five system-
            specific tests in an attempt to circumvent the security
            mechanisms of the system.  The elapsed time devoted to testing 
            shall be at least three months and need not exceed six months.  
            There shall be no fewer than fifty hands-on hours per team 
            member spent carrying out system developer-defined tests and
            test team-defined tests.




                                    APPENDIX A

                     Commercial Product Evaluation Process


"Department of Defense Trusted Computer System Evaluation Criteria" forms the
basis upon which the Computer Security Center will carry out the commercial
computer security evaluation process.  This process is focused on commercially
produced and supported general-purpose operating system products that meet the
needs of government departments and agencies.  The formal evaluation is aimed
at "off-the-shelf" commercially supported products and is completely divorced
from any consideration of overall system performance, potential applications,
or particular processing environments.  The evaluation provides a key input to
a computer system security approval/accreditation.  However, it does not
constitute a complete computer system security evaluation.  A complete study
(e.g., as in reference [18]) must consider additional factors dealing with the
system in its unique environment, such as it's proposed security mode of
operation, specific users, applications, data sensitivity, physical and
personnel security, administrative and procedural security, TEMPEST, and
communications security.

The product evaluation process carried out by the Computer Security Center has
three distinct elements:

     * Preliminary Product Evaluation - An informal dialogue between a vendor
       and the Center in which technical information is exchanged to create a
       common understanding of the vendor's product, the criteria, and the 
       rating that may be expected to result from a formal product evaluation.

     * Formal Product Evaluation - A formal evaluation, by the Center, of a
       product that is available to the DoD, and that results in that product
       and its assigned rating being placed on the Evaluated Products List.

     * Evaluated Products List - A list of products that have been subjected
       to formal product evaluation and their assigned ratings.


PRELIMINARY PRODUCT EVALUATION

Since it is generally very difficult to add effective security measures late
in a product's life cycle, the Center is interested in working with system
vendors in the early stages of product design.  A preliminary product
evaluation allows the Center to consult with computer vendors on computer
security issues found in products that have not yet been formally announced.

A preliminary evaluation is typically initiated by computer system vendors who
are planning new computer products that feature security or major
security-related upgrades to existing products.  After an initial meeting
between the vendor and the Center, appropriate non-disclosure agreements are
executed that require the Center to maintain the confidentiality of any
proprietary information disclosed to it.  Technical exchange meetings follow
in which the vendor provides details about the proposed product (particularly
its internal designs and goals) and the Center provides expert feedback to the
vendor on potential computer security strengths and weaknesses of the vendor's
design choices, as well as relevant interpretation of the criteria.  The
preliminary evaluation is typically terminated when the product is completed
and ready for field release by the vendor.  Upon termination, the Center
prepares a wrap-up report for the vendor and for internal distribution within
the Center.  Those reports containing proprietary information are not
available to the public.

During preliminary evaluation, the vendor is under no obligation to actually
complete or market the potential product.  The Center is, likewise, not
committed to conduct a formal product evaluation.  A preliminary evaluation
may be terminated by either the Center or the vendor when one notifies the
other, in writing, that it is no longer advantageous to continue the
evaluation.


FORMAL PRODUCT EVALUATION

The formal product evaluation provides a key input to certification of a
computer system for use in National Security Establishment applications and is
the sole basis for a product being placed on the Evaluated Products List.

A formal product evaluation begins with a request by a vendor for the Center
to evaluate a product for which the product itself and accompanying
documentation needed to meet the requirements defined by this publication are
complete.  Non-disclosure agreements are executed and a formal product
evaluation team is formed by the Center.  An initial meeting is then held with
the vendor to work out the schedule for the formal evaluation.  Since testing
of the implemented product forms an important part of the evaluation process,
access by the evaluation team to a working version of the system is negotiated
with the vendor.  Additional support required from the vendor includes
complete design documentation, source code, and access to vendor personnel who
can answer detailed questions about specific portions of the product.  The
evaluation team tests the product against each requirement, making any
necessary interpretations of the criteria with respect to the product being
evaluated.

The evaluation team writes a two-part final report on their findings about the
system.  The first part is publicly available (containing no proprietary
information) and contains the overall class rating assigned to the system and
the details of the evaluation team's findings when comparing the product
against the evaluation criteria.  The second part of the evaluation report
contains vulnerability analyses and other detailed information supporting the
rating decision.  Since this part may contain proprietary or other sensitive
information it will be distributed only within the U.S.  Government on a
strict need-to-know and non- disclosure basis, and to the vendor.  No portion
of the evaluation results will be withheld from the vendor.







                                   APPENDIX B

                   Summary of Evaluation Criteria Divisions

The divisions of systems recognized under the trusted computer system
evaluation criteria are as follows.  Each division represents a major
improvement in the overall confidence one can place in the system to protect
classified and other sensitive information.

Division (D):  Minimal Protection

This division contains only one class.  It is reserved for those systems that
have been evaluated but that fail to meet the requirements for a higher
evaluation class.

Division (C):  Discretionary Protection

Classes in this division provide for discretionary (need-to-know) protection
and, through the inclusion of audit capabilities, for accountability of
subjects and the actions they initiate.

Division (B):  Mandatory Protection

The notion of a TCB that preserves the integrity of sensitivity labels and
uses them to enforce a set of mandatory access control rules is a major
requirement in this division.  Systems in this division must carry the
sensitivity labels with major data structures in the system.  The system
developer also provides the security policy model on which the TCB is based
and furnishes a specification of the TCB.  Evidence must be provided to
demonstrate that the reference monitor concept has been implemented.

Division (A):  Verified Protection

This division is characterized by the use of formal security verification
methods to assure that the mandatory and discretionary security controls
employed in the system can effectively protect classified or other sensitive
information stored or processed by the system.  Extensive documentation is
required to demonstrate that the TCB meets the security requirements in all
aspects of design, development and implementation.





                                   APPENDIX C

                    Summary of Evaluation Criteria Classes

The classes of systems recognized under the trusted computer system evaluation
criteria are as follows.  They are presented in the order of increasing
desirablity from a computer security point of view.

Class (D):  Minimal Protection

This class is reserved for those systems that have been evaluated but that
fail to meet the requirements for a higher evaluation class.

Class (C1):  Discretionary Security Protection

The Trusted Computing Base (TCB) of a class (C1) system nominally satisfies
the discretionary security requirements by providing separation of users and
data.  It incorporates some form of credible controls capable of enforcing
access limitations on an individual basis, i.e., ostensibly suitable for
allowing users to be able to protect project or private information and to
keep other users from accidentally reading or destroying their data.  The
class (C1) environment is expected to be one of cooperating users processing
data at the same level(s) of sensitivity.

Class (C2):  Controlled Access Protection

Systems in this class enforce a more finely grained discretionary access
control than (C1) systems, making users individually accountable for their
actions through login procedures, auditing of security-relevant events, and
resource isolation.

Class (B1):  Labeled Security Protection

Class (B1) systems require all the features required for class (C2).  In
addition, an informal statement of the security policy model, data labeling,
and mandatory access control over named subjects and objects must be present.
The capability must exist for accurately labeling exported information.  Any
flaws identified by testing must be removed.

Class (B2):  Structured Protection

In class (B2) systems, the TCB is based on a clearly defined and documented
formal security policy model that requires the discretionary and mandatory
access control enforcement found in class (B1) systems be extended to all
subjects and objects in the ADP system.  In addition, covert channels are
addressed.  The TCB must be carefully structured into protection-critical and
non- protection-critical elements.  The TCB interface is well-defined and the
TCB design and implementation enable it to be subjected to more thorough
testing and more complete review.  Authentication mechanisms are strengthened,
trusted facility management is provided in the form of support for system
administrator and operator functions, and stringent configuration management
controls are imposed.  The system is relatively resistant to penetration.

Class (B3):  Security Domains

The class (B3) TCB must satisfy the reference monitor requirements that it
mediate all accesses of subjects to objects, be tamperproof, and be small
enough to be subjected to analysis and tests.  To this end, the TCB is
structured to exclude code not essential to security policy enforcement, with
significant system engineering during TCB design and implementation directed
toward minimizing its complexity.  A security administrator is supported,
audit mechanisms are expanded to signal security- relevant events, and system
recovery procedures are required.  The system is highly resistant to
penetration.

Class (A1):  Verified Design

Systems in class (A1) are functionally equivalent to those in class (B3) in
that no additional architectural features or policy requirements are added.
The distinguishing feature of systems in this class is the analysis derived
from formal design specification and verification techniques and the resulting
high degree of assurance that the TCB is correctly implemented.  This
assurance is developmental in nature, starting with a formal model of the
security policy and a formal top-level specification (FTLS) of the design.  In
keeping with the extensive design and development analysis of the TCB required
of systems in class (A1), more stringent configuration management is required
and procedures are established for securely distributing the system to sites.
A system security administrator is supported.





                                   APPENDIX D

                              Requirement Directory

This appendix lists requirements defined in "Department of Defense Trusted
Computer System Evaluation Criteria" alphabetically rather than by class.  It
is provided to assist in following the evolution of a requirement through the
classes.  For each requirement, three types of criteria may be present.  Each
will be preceded by the word: NEW, CHANGE, or ADD to indicate the following:

              NEW: Any criteria appearing in a lower class are superseded
                   by the criteria that follow.

           CHANGE: The criteria that follow have appeared in a lower class
                   but are changed for this class.  Highlighting is used
                   to indicate the specific changes to previously stated
                   criteria.

              ADD: The criteria that follow have not been required for any
                   lower class, and are added in this class to the
                   previously stated criteria for this requirement.

Abbreviations are used as follows:

               NR: (No Requirement) This requirement is not included in
                   this class.

              NAR: (No Additional Requirements) This requirement does not
                   change from the previous class.

The reader is referred to Part I of this document when placing new criteria
for a requirement into the complete context for that class.

Figure 1 provides a pictorial summary of the evolution of requirements through
the classes.


Audit

     C1: NR.

     C2: NEW: The TCB shall be able to create, maintain, and protect from
         modification or unauthorized access or destruction an audit trail of
         accesses to the objects it protects.  The audit data shall be 
         protected by the TCB so that read access to it is limited to those 
         who are authorized for audit data.  The TCB shall be able to record
         the following types of events:  use of identification and
         authentication mechanisms, introduction of objects into a user's
         address space (e.g., file open, program initiation), deletion of
         objects, and actions taken by computer operators and system 
         administrators and/or system security officers.  For each recorded 
         event, the audit record shall identify: date and time of the event,
         user, type of event, and success or failure of the event.  For
         identification/authentication events the origin of request (e.g.,
         terminal ID) shall be included in the audit record.  For events that
         introduce an object into a user's address space and for object
         deletion events the audit record shall include the name of the object.
         The ADP system administrator shall be able to selectively audit the 
         actions of any one or more users based on individual identity.

     B1: CHANGE: For events that introduce an object into a user's address
         space and for object deletion events the audit record shall include
         the name of the object and the object's security level.  The ADP 
         system administrator shall be able to selectively audit the actions 
         of any one or more users based on individual identity and/or object
         security level.

         ADD: The TCB shall also be able to audit any override of
         human-readable output markings.

     B2: ADD: The TCB shall be able to audit the identified events that may be
         used in the exploitation of covert storage channels.

     B3: ADD: The TCB shall contain a mechanism that is able to monitor the
         occurrence or accumulation of security auditable events that may 
         indicate an imminent violation of security policy.  This mechanism 
         shall be able to immediately notify the security administrator when
         thresholds are exceeded.

     A1: NAR.

Configuration Management

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: During development and maintenance of the TCB, a configuration
         management system shall be in place that maintains control of changes
         to the descriptive top-level specification, other design data, 
         implementation documentation, source code, the running version of the
         object code, and test fixtures and documentation.  The configuration
         management system shall assure a consistent mapping among all
         documentation and code associated with the current version of the TCB.
         Tools shall be provided for generation of a new version of the TCB
         from source code.  Also available shall be tools for comparing a 
         newly generated version with the previous TCB version in order to
         ascertain that only the intended changes have been made in the code 
         that will actually be used as the new version of the TCB.

     B3: NAR.

     A1: CHANGE: During the entire life-cycle, i.e., during the design,
         development, and maintenance of the TCB, a configuration management
         system shall be in place for all security-relevant hardware, firmware,
         and software that maintains control of changes to the formal model, 
         the descriptive and formal top-level specifications, other design
         data, implementation documentation, source code, the running version
         of the object code, and test fixtures and documentation.  Also
         available shall be tools, maintained under strict configuration
         control, for comparing a newly generated version with the previous
         TCB version in order to ascertain that only the intended changes have
         been made in the code that will actually be used as the new version 
         of the TCB.

    ADD: A combination of technical, physical, and procedural safeguards
         shall be used to protect from unauthorized modification or 
         destruction the master copy or copies of all material used to 
         generate the TCB.

Covert Channel Analysis

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: The system developer shall conduct a thorough search for covert
         storage channels and make a determination (either by actual 
         measurement or by engineering estimation) of the maximum bandwidth of
         each identified channel.  (See the Covert Channels Guideline section.)

     B3: CHANGE: The system developer shall conduct a thorough search for
         covert channels and make a determination (either by actual 
         measurement or by engineering estimation) of the maximum bandwidth 
         of each identified channel.

     A1: ADD: Formal methods shall be used in the analysis.

Design Documentation

     C1: NEW: Documentation shall be available that provides a description of
         the manufacturer's philosophy of protection and an explanation of how
         this philosophy is translated into the TCB.  If the TCB is composed 
         of distinct modules, the interfaces between these modules shall be 
         described.

     C2: NAR.

     B1: ADD: An informal or formal description of the security policy model
         enforced by the TCB shall be available and an explanation provided to
         show that it is sufficient to enforce the security policy.  The 
         specific TCB protection mechanisms shall be identified and an 
         explanation given to show that they satisfy the model.

     B2: CHANGE: The interfaces between the TCB modules shall be described.  A
         formal description of the security policy model enforced by the TCB 
         shall be available and proven that it is sufficient to enforce the 
         security policy.

         ADD: The descriptive top-level specification (DTLS) shall be shown to
         be an accurate description of the TCB interface.  Documentation shall
         describe how the TCB implements the reference monitor concept and 
         give an explanation why it is tamperproof, cannot be bypassed, and is
         correctly implemented.  Documentation shall describe how the TCB is 
         structured to facilitate testing and to enforce least privilege.
         This documentation shall also present the results of the covert
         channel analysis and the tradeoffs involved in restricting the
         channels.  All auditable events that may be used in the exploitation
         of known covert storage channels shall be identified.  The bandwidths
         of known covert storage channels, the use of which is not detectable
         by the auditing mechanisms, shall be provided.  (See the Covert 
         Channel Guideline section.)

     B3: ADD: The TCB implementation (i.e., in hardware, firmware, and
         software) shall be informally shown to be consistent with the DTLS.
         The elements of the DTLS shall be shown, using informal techniques, 
         to correspond to the elements of the TCB.

     A1: CHANGE: The TCB implementation (i.e., in hardware, firmware, and
         software) shall be informally shown to be consistent with the formal
         top-level specification (FTLS).  The elements of the FTLS shall be 
         shown, using informal techniques, to correspond to the elements of 
         the TCB.

         ADD: Hardware, firmware, and software mechanisms not dealt with in
         the FTLS but strictly internal to the TCB (e.g., mapping registers,
         direct memory access I/O) shall be clearly described.

Design Specification and Verification

     C1: NR.

     C2: NR.

     B1: NEW: An informal or formal model of the security policy supported by
         the TCB shall be maintained that is shown to be consistent with its 
         axioms.

     B2: CHANGE: A formal model of the security policy supported by the TCB
         shall be maintained that is proven consistent with its axioms.

         ADD: A descriptive top-level specification (DTLS) of the TCB shall be
         maintained that completely and accurately describes the TCB in terms
         of exceptions, error messages, and effects.  It shall be shown to be
         an accurate description of the TCB interface.

     B3: ADD: A convincing argument shall be given that the DTLS is consistent
         with the model.

     A1: CHANGE: The FTLS shall be shown to be an accurate description of the
         TCB interface.  A convincing argument shall be given that the DTLS is
         consistent with the model and a combination of formal and informal 
         techniques shall be used to show that the FTLS is consistent with the
         model.

         ADD: A formal top-level specification (FTLS) of the TCB shall be
         maintained that accurately describes the TCB in terms of exceptions,
         error messages, and effects.  The DTLS and FTLS shall include those
         components of the TCB that are implemented as hardware and/or 
         firmware if their properties are visible at the TCB interface.  This
         verification evidence shall be consistent with that provided within
         the state-of-the-art of the particular Computer Security Center-
         endorsed formal specification and verification system used.  Manual
         or other mapping of the FTLS to the TCB source code shall be
         performed to provide evidence of correct implementation.

Device Labels

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: The TCB shall support the assignment of minimum and maximum
         security levels to all attached physical devices.  These security
         levels shall be used by the TCB to enforce constraints imposed by 
         the physical environments in which the devices are located.

     B3: NAR.

     A1: NAR.

Discretionary Access Control

     C1: NEW: The TCB shall define and control access between named users and
         named objects (e.g., files and programs) in the ADP system.  The 
         enforcement mechanism (e.g., self/group/public controls, access 
         control lists) shall allow users to specify and control sharing of
         those objects by named individuals or defined groups or both.

     C2: CHANGE: The enforcement mechanism (e.g., self/group/public controls,
         access control lists) shall allow users to specify and control 
         sharing of those objects by named individuals, or defined groups of
         individuals, or by both.

    ADD: The discretionary access control mechanism shall, either by explicit
         user action or by default, provide that objects are protected from
         unauthorized access.  These access controls shall be capable of 
         including or excluding access to the granularity of a single user.  
         Access permission to an object by users not already possessing access
         permission shall only be assigned by authorized users.

     B1: NAR.

     B2: NAR.

     B3: CHANGE: The enforcement mechanism (e.g., access control lists) shall
         allow users to specify and control sharing of those objects.  These 
         access controls shall be capable of specifying, for each named 
         object, a list of named individuals and a list of groups of named 
         individuals with their respective modes of access to that object.

    ADD: Furthermore, for each such named object, it shall be possible to
         specify a list of named individuals and a list of groups of named 
         individuals for which no access to the object is to be given.

     A1: NAR.

Exportation of Labeled Information

     C1: NR.

     C2: NR.

     B1: NEW: The TCB shall designate each communication channel and I/O
         device as either single-level or multilevel.  Any change in this 
         designation shall be done manually and shall be auditable by the 
         TCB.  The TCB shall maintain and be able to audit any change in the
         current security level associated with a single-level communication
         channel or I/O device.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Exportation to Multilevel Devices

     C1: NR.

     C2: NR.

     B1: NEW: When the TCB exports an object to a multilevel I/O device, the
         sensitivity label associated with that object shall also be exported
         and shall reside on the same physical medium as the exported 
         information and shall be in the same form (i.e., machine-readable or
         human-readable form).  When the TCB exports or imports an object over
         a multilevel communication channel, the protocol used on that channel
         shall provide for the unambiguous pairing between the sensitivity
         labels and the associated information that is sent or received.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Exportation to Single-Level Devices

     C1: NR.

     C2: NR.

     B1: NEW: Single-level I/O devices and single-level communication channels
         are not required to maintain the sensitivity labels of the 
         information they process.  However, the TCB shall include a mechanism
         by which the TCB and an authorized user reliably communicate to
         designate the single security level of information imported or 
         exported via single-level communication channels or I/O devices.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Identification and Authentication

     C1: NEW: The TCB shall require users to identify themselves to it before
         beginning to perform any other actions that the TCB is expected to 
         mediate.  Furthermore, the TCB shall use a protected mechanism (e.g.,
         passwords) to authenticate the user's identity.  The TCB shall 
         protect authentication data so that it cannot be accessed by any 
         unauthorized user.

     C2: ADD: The TCB shall be able to enforce individual accountability by
         providing the capability to uniquely identify each individual ADP 
         system user.  The TCB shall also provide the capability of 
         associating this identity with all auditable actions taken by that 
         individual.

     B1: CHANGE: Furthermore, the TCB shall maintain authentication data that
         includes information for verifying the identity of individual users
         (e.g., passwords) as well as information for determining the 
         clearance and authorizations of individual users.  This data shall be
         used by the TCB to authenticate the user's identity and to determine 
         the security level and authorizations of subjects that may be created
         to act on behalf of the individual user.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Label Integrity

     C1: NR.

     C2: NR.

     B1: NEW: Sensitivity labels shall accurately represent security levels of
         the specific subjects or objects with which they are associated.  When
         exported by the TCB, sensitivity labels shall accurately and 
         unambiguously represent the internal labels and shall be associated 
         with the information being exported.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Labeling Human-Readable Output

     C1: NR.

     C2: NR.

     B1: NEW: The ADP system administrator shall be able to specify the
         printable label names associated with exported sensitivity labels.
         The TCB shall mark the beginning and end of all human-readable, 
         paged, hardcopy output (e.g., line printer output) with human-
         readable sensitivity labels that properly* represent the sensitivity
         of the output.  The TCB shall, by default, mark the top and bottom of
         each page of human-readable, paged, hardcopy output (e.g., line
         printer output) with human-readable sensitivity labels that
         properly* represent the overall sensitivity of the output or that 
         properly* represent the sensitivity of the information on the page.
         The TCB shall, by default and in an appropriate manner, mark other 
         forms of human-readable output (e.g., maps, graphics) with human-
         readable sensitivity labels that properly* represent the sensitivity
         of the output.  Any override of these marking defaults shall be
         auditable by the TCB.

     B2: NAR.

     B3: NAR.

     A1: NAR.

           ____________________________________________________________
           * The hierarchical classification component in human-readable
           sensitivity labels shall be equal to the greatest
           hierarchical classification of any of the information in the
           output that the labels refer to;  the non-hierarchical
           category component shall include all of the non-hierarchical
           categories of the information in the output the labels refer
           to, but no other non-hierarchical categories.
           ____________________________________________________________


Labels

     C1: NR.

     C2: NR.

     B1: NEW: Sensitivity labels associated with each subject and storage
         object under its control (e.g., process, file, segment, device) shall
         be maintained by the TCB.  These labels shall be used as the basis 
         for mandatory access control decisions.  In order to import non-
         labeled data, the TCB shall request and receive from an authorized 
         user the security level of the data, and all such actions shall be
         auditable by the TCB.

     B2: CHANGE: Sensitivity labels associated with each ADP system resource
         (e.g., subject, storage object) that is directly or indirectly 
         accessible by subjects external to the TCB shall be maintained by 
         the TCB.

     B3: NAR.

     A1: NAR.

Mandatory Access Control

     C1: NR.

     C2: NR.

     B1: NEW: The TCB shall enforce a mandatory access control policy over all
         subjects and storage objects under its control (e.g., processes, 
         files, segments, devices).  These subjects and objects shall be 
         assigned sensitivity labels that are a combination of hierarchical 
         classification levels and non-hierarchical categories, and the labels
         shall be used as the basis for mandatory access control decisions.
         The TCB shall be able to support two or more such security levels.
         (See the Mandatory Access Control guidelines.)  The following
         requirements shall hold for all accesses between subjects and objects
         controlled by the TCB: A subject can read an object only if the
         hierarchical classification in the subject's security level is 
         greater than or equal to the hierarchical classification in the 
         object's security level and the non-hierarchical categories in the
         subject's security level include all the non-hierarchical categories
         in the object's security level.  A subject can write an object only
         if the hierarchical classification in the subject's security level is
         less than or equal to the hierarchical classification in the object's
         security level and all the non-hierarchical categories in the 
         subject's security level are included in the non-hierarchical 
         categories in the object's security level.

     B2: CHANGE: The TCB shall enforce a mandatory access control policy over
         all resources (i.e., subjects, storage objects, and I/O devices) that
         are directly or indirectly accessible by subjects external to the TCB.
         The following requirements shall hold for all accesses between all
         subjects external to the TCB and all objects directly or indirectly 
         accessible by these subjects:

     B3: NAR.

     A1: NAR.

Object Reuse

     C1: NR.

     C2: NEW: When a storage object is initially assigned, allocated, or
         reallocated to a subject from the TCB's pool of unused storage 
         objects, the TCB shall assure that the object contains no data for 
         which the subject is not authorized.

     B1: NAR.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Security Features User's Guide

     C1: NEW: A single summary, chapter, or manual in user documentation shall
         describe the protection mechanisms provided by the TCB, guidelines on
         their use, and how they interact with one another.

     C2: NAR.

     B1: NAR.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Security Testing

     C1: NEW: The security mechanisms of the ADP system shall be tested and
         found to work as claimed in the system documentation.  Testing shall 
         be done to assure that there are no obvious ways for an unauthorized
         user to bypass or otherwise defeat the security protection mechanisms
         of the TCB.  (See the Security Testing guidelines.)

     C2: ADD: Testing shall also include a search for obvious flaws that would
         allow violation of resource isolation, or that would permit 
         unauthorized access to the audit or authentication data.

     B1: NEW: The security mechanisms of the ADP system shall be tested and
         found to work as claimed in the system documentation.  A team of 
         individuals who thoroughly understand the specific implementation of
         the TCB shall subject its design documentation, source code, and 
         object code to thorough analysis and testing.  Their objectives shall
         be: to uncover all design and implementation flaws that would permit
         a subject external to the TCB to read, change, or delete data
         normally denied under the mandatory or discretionary security policy 
         enforced by the TCB; as well as to assure that no subject (without
         authorization to do so) is able to cause the TCB to enter a state
         such that it is unable to respond to communications initiated by 
         other users.  All discovered flaws shall be removed or neutralized 
         and the TCB retested to demonstrate that they have been eliminated 
         and that new flaws have not been introduced.  (See the Security 
         Testing Guidelines.)

     B2: CHANGE: All discovered flaws shall be corrected and the TCB retested
         to demonstrate that they have been eliminated and that new flaws have
         not been introduced.

         ADD: The TCB shall be found relatively resistant to penetration.
         Testing shall demonstrate that the TCB implementation is consistent 
         with the descriptive top-level specification.

     B3: CHANGE: The TCB shall be found resistant to penetration.

         ADD: No design flaws and no more than a few correctable
         implementation flaws may be found during testing and there shall be 
         reasonable confidence that few remain.

     A1: CHANGE: Testing shall demonstrate that the TCB implementation is
         consistent with the formal top-level specification.

         ADD: Manual or other mapping of the FTLS to the source code may form
         a basis for penetration testing.

Subject Sensitivity Labels

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: The TCB shall immediately notify a terminal user of each change
         in the security level associated with that user during an interactive
         session.  A terminal user shall be able to query the TCB as desired 
         for a display of the subject's complete sensitivity label.

     B3: NAR.

     A1: NAR.

System Architecture

     C1: NEW: The TCB shall maintain a domain for its own execution that
         protects it from external interference or tampering (e.g., by 
         modification of its code or data structures).  Resources controlled 
         by the TCB may be a defined subset of the subjects and objects in 
         the ADP system.

     C2: ADD: The TCB shall isolate the resources to be protected so that they
         are subject to the access control and auditing requirements.

     B1: ADD: The TCB shall maintain process isolation through the provision
         of distinct address spaces under its control.

     B2: NEW: The TCB shall maintain a domain for its own execution that
         protects it from external interference or tampering (e.g., by 
         modification of its code or data structures).  The TCB shall maintain
         process isolation through the provision of distinct address spaces 
         under its control.  The TCB shall be internally structured into well-
         defined largely independent modules.  It shall make effective use of
         available hardware to separate those elements that are protection-
         critical from those that are not.  The TCB modules shall be designed
         such that the principle of least privilege is enforced.  Features in
         hardware, such as segmentation, shall be used to support logically 
         distinct storage objects with separate attributes (namely: readable, 
         writeable).  The user interface to the TCB shall be completely 
         defined and all elements of the TCB identified.

     B3: ADD: The TCB shall be designed and structured to use a complete,
         conceptually simple protection mechanism with precisely defined 
         semantics.  This mechanism shall play a central role in enforcing the
         internal structuring of the TCB and the system.  The TCB shall
         incorporate significant use of layering, abstraction and data hiding.
         Significant system engineering shall be directed toward minimizing
         the complexity of the TCB and excluding from the TCB modules that are
         not protection-critical.

     A1: NAR.

System Integrity

     C1: NEW: Hardware and/or software features shall be provided that can be
         used to periodically validate the correct operation of the on-site 
         hardware and firmware elements of the TCB.

     C2: NAR.

     B1: NAR.

     B2: NAR.

     B3: NAR.

     A1: NAR.

Test Documentation

     C1: NEW: The system developer shall provide to the evaluators a document
         that describes the test plan and results of the security mechanisms'
         functional testing.

     C2: NAR.

     B1: NAR.

     B2: ADD: It shall include results of testing the effectiveness of the
         methods used to reduce covert channel bandwidths.

     B3: NAR.

     A1: ADD: The results of the mapping between the formal top-level
         specification and the TCB source code shall be given.

Trusted Distribution

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NR.

     B3: NR.

     A1: NEW: A trusted ADP system control and distribution facility shall be
         provided for maintaining the integrity of the mapping between the 
         master data describing the current version of the TCB and the on-site
         master copy of the code for the current version.  Procedures (e.g.,
         site security acceptance testing) shall exist for assuring that the
         TCB software, firmware, and hardware updates distributed to a
         customer are exactly as specified by the master copies.

Trusted Facility Management

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: The TCB shall support separate operator and administrator
         functions.

     B3: ADD: The functions performed in the role of a security administrator
         shall be identified.  The ADP system administrative personnel shall 
         only be able to perform security administrator functions after taking
         a distinct auditable action to assume the security administrator role
         on the ADP system.  Non-security functions that can be performed in
         the security administration role shall be limited strictly to those
         essential to performing the security role effectively.

     A1: NAR.

Trusted Facility Manual

     C1: NEW: A manual addressed to the ADP system administrator shall present
         cautions about functions and privileges that should be controlled 
         when running a secure facility.

     C2: ADD: The procedures for examining and maintaining the audit files as
         well as the detailed audit record structure for each type of audit 
         event shall be given.

     B1: ADD: The manual shall describe the operator and administrator
         functions related to security, to include changing the 
         characteristics of a user.  It shall provide guidelines on the 
         consistent and effective use of the protection features of the
         system, how they interact, how to securely generate a new TCB, and
         facility procedures, warnings, and privileges that need to be
         controlled in order to operate the facility in a secure manner.

     B2: ADD: The TCB modules that contain the reference validation mechanism
         shall be identified.  The procedures for secure generation of a new 
         TCB from source after modification of any modules in the TCB shall 
         be described.

     B3: ADD: It shall include the procedures to ensure that the system is
         initially started in a secure manner.  Procedures shall also be 
         included to resume secure system operation after any lapse in system
         operation.

     A1: NAR.

Trusted Path

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NEW: The TCB shall support a trusted communication path between
         itself and user for initial login and authentication.  Communications
         via this path shall be initiated exclusively by a user.

     B3: CHANGE: The TCB shall support a trusted communication path between
         itself and users for use when a positive TCB-to-user connection is 
         required (e.g., login, change subject security level).  
         Communications via this trusted path shall be activated exclusively
         by a user or the TCB and shall be logically isolated and unmistakably
         distinguishable from other paths.

     A1: NAR.

Trusted Recovery

     C1: NR.

     C2: NR.

     B1: NR.

     B2: NR.

     B3: NEW: Procedures and/or mechanisms shall be provided to assure that,
         after an ADP system failure or other discontinuity, recovery without a
         protection compromise is obtained.

     A1: NAR.





    (this page is reserved for Figure 1)




                                 GLOSSARY


Access - A specific type of interaction between a subject and an object 
     that results in the flow of information from one to the other.

Approval/Accreditation - The official authorization that is
     granted to an ADP system to process sensitive information in
     its operational environment, based upon comprehensive
     security evaluation of the system's hardware, firmware, and
     software security design, configuration, and implementation
     and of the other system procedural, administrative,
     physical, TEMPEST, personnel, and communications security
     controls.

Audit Trail - A set of records that collectively provide
     documentary evidence of processing used to aid in tracing
     from original transactions forward to related records and
     reports, and/or backwards from records and reports to their
     component source transactions.

Authenticate - To establish the validity of a claimed identity.

Automatic Data Processing (ADP) System - An assembly of computer
     hardware, firmware, and software configured for the purpose
     of classifying, sorting, calculating, computing,
     summarizing, transmitting and receiving, storing, and
     retrieving data with a minimum of human intervention.

Bandwidth - A characteristic of a communication channel that is
     the amount of information that can be passed through it in a
     given amount of time, usually expressed in bits per second.

Bell-LaPadula Model - A formal state transition model of computer
     security policy that describes a set of access control
     rules.  In this formal model, the entities in a computer
     system are divided into abstract sets of subjects and
     objects.  The notion of a secure state is defined and it is
     proven that each state transition preserves security by
     moving from secure state to secure state; thus, inductively
     proving that the system is secure.  A system state is
     defined to be "secure" if the only permitted access modes of
     subjects to objects are in accordance with a specific
     security policy.  In order to determine whether or not a
     specific access mode is allowed, the clearance of a subject
     is compared to the classification of the object and a
     determination is made as to whether the subject is
     authorized for the specific access mode.  The
     clearance/classification scheme is expressed in terms of a
     lattice.  See also: Lattice, Simple Security Property, *-
     Property.

Certification - The technical evaluation of a system's security
     features, made as part of and in support of the
     approval/accreditation process, that establishes the extent
     to which a particular computer system's design and
     implementation meet a set of specified security
     requirements.

Channel - An information transfer path within a system.  May also
     refer to the mechanism by which the path is effected.

Covert Channel - A communication channel that allows a process to
     transfer information in a manner that violates the system's
     security policy.  See also:  Covert Storage Channel, Covert
     Timing Channel.

Covert Storage Channel - A covert channel that involves the
     direct or indirect writing of a storage location by one
     process and the direct or indirect reading of the storage
     location by another process.  Covert storage channels
     typically involve a finite resource (e.g., sectors on a
     disk) that is shared by two subjects at different security
     levels.

Covert Timing Channel - A covert channel in which one process
     signals information to another by modulating its own use of
     system resources (e.g., CPU time) in such a way that this
     manipulation affects the real response time observed by the
     second process.

Data - Information with a specific physical representation.

Data Integrity - The state that exists when computerized data is
     the same as that in the source documents and has not been
     exposed to accidental or malicious alteration or
     destruction.

Descriptive Top-Level Specification (DTLS) - A top-level
     specification that is written in a natural language (e.g.,
     English), an informal program design notation, or a
     combination of the two.

Discretionary Access Control - A means of restricting access to
     objects based on the identity of subjects and/or groups to
     which they belong.  The controls are discretionary in the
     sense that a subject with a certain access permission is
     capable of passing that permission (perhaps indirectly) on
     to any other subject.

Domain - The set of objects that a subject has the ability to
     access.

Dominate - Security level S1 is said to dominate security level
     S2 if the hierarchical classification of S1 is greater than
     or equal to that of S2 and the non-hierarchical categories
     of S1 include all those of S2 as a subset.

Exploitable Channel - Any channel that is useable or detectable
     by subjects external to the Trusted Computing Base.

Flaw Hypothesis Methodology - A system analysis and penetration
     technique where specifications and documentation for the
     system are analyzed and then flaws in the system are
     hypothesized.  The list of hypothesized flaws is then
     prioritized on the basis of the estimated probability that a
     flaw actually exists and, assuming a flaw does exist, on the
     ease of exploiting it and on the extent of control or
     compromise it would provide.  The prioritized list is used
     to direct the actual testing of the system.

Flaw - An error of commission, omission, or oversight in a system
     that allows protection mechanisms to be bypassed.

Formal Proof - A complete and convincing mathematical argument,
     presenting the full logical justification for each proof
     step, for the truth of a theorem or set of theorems.  The
     formal verification process uses formal proofs to show the
     truth of certain properties of formal specification and for
     showing that computer programs satisfy their specifications.

Formal Security Policy Model - A mathematically precise statement
     of a security policy.  To be adequately precise, such a
     model must represent the initial state of a system, the way
     in which the system progresses from one state to another,
     and a definition of a "secure" state of the system.  To be
     acceptable as a basis for a TCB, the model must be supported
     by a formal proof that if the initial state of the system
     satisfies the definition of a "secure" state and if all
     assumptions required by the model hold, then all future
     states of the system will be secure.  Some formal modeling
     techniques include:  state transition models, temporal logic
     models, denotational semantics models, algebraic
     specification models.  An example is the model described by
     Bell and LaPadula in reference [2].  See also:  Bell-
     LaPadula Model, Security Policy Model.

Formal Top-Level Specification (FTLS) - A Top-Level Specification
     that is written in a formal mathematical language to allow
     theorems showing the correspondence of the system
     specification to its formal requirements to be hypothesized
     and formally proven.

Formal Verification - The process of using formal proofs to
     demonstrate the consistency (design verification) between a
     formal specification of a system and a formal security
     policy model or (implementation verification) between the
     formal specification and its program implementation.

Functional Testing - The portion of security testing in which the
     advertised features of a system are tested for correct
     operation.

General-Purpose System - A computer system that is designed to
     aid in solving a wide variety of problems.

Lattice - A partially ordered set for which every pair of
     elements has a greatest lower bound and a least upper bound.

Least Privilege - This principle requires that each subject in a
     system be granted the most restrictive set of privileges (or
     lowest clearance) needed for the performance of authorized
     tasks.  The application of this principle limits the damage
     that can result from accident, error, or unauthorized use.

Mandatory Access Control - A means of restricting access to
     objects based on the sensitivity (as represented by a label)
     of the information contained in the objects and the formal
     authorization (i.e., clearance) of subjects to access
     information of such sensitivity.

Multilevel Device - A device that is used in a manner that
     permits it to simultaneously process data of two or more
     security levels without risk of compromise.  To accomplish
     this, sensitivity labels are normally stored on the same
     physical medium and in the same form (i.e., machine-readable
     or human-readable) as the data being processed.

Multilevel Secure - A class of system containing information with
     different sensitivities that simultaneously permits access
     by users with different security clearances and needs-to-
     know, but prevents users from obtaining access to
     information for which they lack authorization.

Object - A passive entity that contains or receives information.
     Access to an object potentially implies access to the
     information it contains.  Examples of objects are:  records,
     blocks, pages, segments, files, directories, directory
     trees, and programs, as well as bits, bytes, words, fields,
     processors, video displays, keyboards, clocks, printers,
     network nodes, etc.

Object Reuse - The reassignment to some subject of a medium
     (e.g., page frame, disk sector, magnetic tape) that
     contained one or more objects.  To be securely reassigned,
     such media must contain no residual data from the previously
     contained object(s).

Output - Information that has been exported by a TCB.

Password - A private character string that is used to
     authenticate an identity.

Penetration Testing - The portion of security testing in which
     the penetrators attempt to circumvent the security features
     of a system.  The penetrators may be assumed to use all
     system design and implementation documentation, which may
     include listings of system source code, manuals, and circuit
     diagrams.  The penetrators work under no constraints other
     than those that would be applied to ordinary users.

Process - A program in execution.  It is completely characterized
     by a single current execution point (represented by the
     machine state) and address space.

Protection-Critical Portions of the TCB - Those portions of the
     TCB whose normal function is to deal with the control of
     access between subjects and objects.

Protection Philosophy - An informal description of the overall
     design of a system that delineates each of the protection
     mechanisms employed.  A combination (appropriate to the
     evaluation class) of formal and informal techniques is used
     to show that the mechanisms are adequate to enforce the
     security policy.

Read - A fundamental operation that results only in the flow of
     information from an object to a subject.

Read Access - Permission to read information.

Reference Monitor Concept - An access control concept that refers
     to an abstract machine that mediates all accesses to objects
     by subjects.

Resource - Anything used or consumed while performing a function.
     The categories of resources are: time, information, objects
     (information containers), or processors (the ability to use
     information).  Specific examples are: CPU time; terminal
     connect time; amount of directly-addressable memory; disk
     space; number of I/O requests per minute, etc.

Security Kernel - The hardware, firmware, and software elements
     of a Trusted Computing Base that implement the reference
     monitor concept.  It must mediate all accesses, be protected
     from modification, and be verifiable as correct.

Security Level - The combination of a hierarchical classification
     and a set of non-hierarchical categories that represents the
     sensitivity of information.

Security Policy - The set of laws, rules, and practices that
     regulate how an organization manages, protects, and
     distributes sensitive information.

Security Policy Model - An informal presentation of a formal
     security policy model.

Security Testing - A process used to determine that the security
     features of a system are implemented as designed and that
     they are adequate for a proposed application environment.
     This process includes hands-on functional testing,
     penetration testing, and verification.  See also: Functional
     Testing, Penetration Testing, Verification.

Sensitive Information - Information that, as determined by a
     competent authority, must be protected because its
     unauthorized disclosure, alteration, loss, or destruction
     will at least cause perceivable damage to someone or
     something.

Sensitivity Label - A piece of information that represents the
     security level of an object and that describes the
     sensitivity (e.g., classification) of the data in the
     object.   Sensitivity labels are used by the TCB as the basis
     for mandatory access control decisions.

Simple Security Property - A Bell-LaPadula security model rule
     allowing a subject read access to an object only if the
     security level of the subject dominates the security level
     of the object.

Single-Level Device - A device that is used to process data of a
     single security level at any one time.  Since the device
     need not be trusted to separate data of different security
     levels, sensitivity labels do not have to be stored with the
     data being processed.


     allowing a subject write access to an object only if the
     security level of the subject is dominated by the security
     level of the object.  Also known as the Confinement
     Property.

Storage Object - An object that supports both read and write
     accesses.

Subject - An active entity, generally in the form of a person,
     process, or device that causes information to flow among
     objects or changes the system state.  Technically, a
     process/domain pair.

Subject Security Level - A subject's security level is equal to
     the security level of the objects to which it has both read
     and write access.  A subject's security level must always be
     dominated by the clearance of the user the subject is
     associated with.

TEMPEST - The study and control of spurious electronic signals
     emitted from ADP equipment.

Top-Level Specification (TLS) - A non-procedural description of
     system behavior at the most abstract level.  Typically a
     functional specification that omits all implementation
     details.

Trap Door - A hidden software or hardware mechanism that permits
     system protection mechanisms to be circumvented.  It is
     activated in some non-apparent manner (e.g., special
     "random" key sequence at a terminal).

Trojan Horse - A computer program with an apparently or actually
     useful function that contains additional (hidden) functions
     that surreptitiously exploit the legitimate authorizations
     of the invoking process to the detriment of security.  For
     example, making a "blind copy" of a sensitive file for the
     creator of the Trojan Horse.

Trusted Computer System - A system that employs sufficient
     hardware and software integrity measures to allow its use
     for processing simultaneously a range of sensitive or
     classified information.

Trusted Computing Base (TCB) - The totality of protection
     mechanisms within a computer system -- including hardware,
     firmware, and software -- the combination of which is
     responsible for enforcing a security policy.  It creates a
     basic protection environment and provides additional user
     services required for a trusted computer system.  The
     ability of a trusted computing base to correctly enforce a
     security policy depends solely on the mechanisms within the
     TCB and on the correct input by system administrative
     personnel of parameters (e.g., a user's clearance) related
     to the security policy.

Trusted Path - A mechanism by which a person at a terminal can
     communicate directly with the Trusted Computing Base.  This
     mechanism can only be activated by the person or the Trusted
     Computing Base and cannot be imitated by untrusted software.

Trusted Software - The software portion of a Trusted Computing
     Base.

User - Any person who interacts directly with a computer system.

Verification - The process of comparing two levels of system
     specification for proper correspondence (e.g., security
     policy model with top-level specification, TLS with source
     code, or source code with object code).  This process may or
     may not be automated.

Write - A fundamental operation that results only in the flow of
     information from a subject to an object.

Write Access - Permission to write an object.





                              REFERENCES


1.  Anderson, J. P.  Computer Security Technology Planning
         Study, ESD-TR-73-51, vol. I, ESD/AFSC, Hanscom AFB,
         Bedford, Mass., October 1972 (NTIS AD-758 206).

2.  Bell, D. E. and LaPadula, L. J.  Secure Computer Systems:
         Unified Exposition and Multics Interpretation, MTR-2997
         Rev. 1, MITRE Corp., Bedford, Mass., March 1976.

3.  Brand, S. L.    "An Approach to Identification and Audit of
         Vulnerabilities and Control in Application Systems," in
         Audit and Evaluation of Computer Security II: System
         Vulnerabilities and Controls, Z. Ruthberg, ed., NBS
         Special Publication #500-57, MD78733, April 1980.

4.  Brand, S. L.    "Data Processing and A-123," in Proceedings of
         the Computer Performance Evaluation User's Group 18th
         Meeting, C. B. Wilson, ed., NBS Special Publication
         #500-95, October 1982.

5.  Denning, D. E.  "A Lattice Model of Secure Information
         Flow," in Communications of the ACM, vol. 19, no. 5
         (May 1976), pp. 236-243.

6.  Denning, D. E.  Secure Information Flow in Computer Systems,
         Ph.D. dissertation, Purdue Univ., West Lafayette, Ind.,
         May 1975.

7.  DoD 5200.1-R, Information Security Program Regulation,
         August 1982.

8.  DoD Directive 5200.28, Security Requirements for Automatic
         Data Processing (ADP) Systems, revised April 1978.

9.  DoD 5200.28-M, ADP Security Manual -- Techniques and
         Procedures for Implementing, Deactivating, Testing, and
         Evaluating Secure Resource-Sharing ADP Systems, revised
         June 1979.

10. DoD Directive 5215.1, Computer Security Evaluation Center,
         25 October 1982.

11. DoD 5220.22-M, Industrial Security Manual for Safeguarding
         Classified Information, January 1983.

12. DoD 5220.22-R, Industrial Security Regulation, January 1983.

13. DoD Directive 5400.11, Department of Defense Privacy
         Program, 9 June 1982.

14. Executive Order 12356, National Security Information,
         6 April 1982.

15. Faurer, L. D.    "Keeping the Secrets Secret," in Government
         Data Systems, November - December 1981, pp. 14-17.

16. Federal Information Processing Standards Publication (FIPS
         PUB) 39, Glossary for Computer Systems Security,
         15 February 1976.

17. Federal Information Processing Standards Publication (FIPS
         PUB) 73, Guidelines for Security of Computer
         Applications, 30 June 1980.

18. Federal Information Processing Standards Publication (FIPS
         PUB) 102, Guideline for Computer Security Certification
         and Accreditation.

19. Lampson, B. W.  "A Note on the Confinement Problem," in
         Communications of the ACM, vol. 16, no. 10 (October
         1973), pp. 613-615.

20. Lee, T. M. P., et al.     "Processors, Operating Systems and
         Nearby Peripherals: A Consensus Report," in Audit and
         Evaluation of Computer Security II: System
         Vulnerabilities and Controls, Z. Ruthberg, ed., NBS
         Special Publication #500-57, MD78733, April 1980.

21. Lipner, S. B.    A Comment on the Confinement Problem, MITRE
         Corp., Bedford, Mass.

22. Millen, J. K.    "An Example of a Formal Flow Violation," in
         Proceedings of the IEEE Computer Society 2nd
         International Computer Software and Applications
         Conference, November 1978, pp. 204-208.

23. Millen, J. K.    "Security Kernel Validation in Practice," in
         Communications of the ACM, vol. 19, no. 5 (May 1976),
         pp. 243-250.

24. Nibaldi, G. H.  Proposed Technical Evaluation Criteria for
         Trusted Computer Systems, MITRE Corp., Bedford, Mass.,
         M79-225, AD-A108-832, 25 October 1979.

25. Nibaldi, G. H.  Specification of A Trusted Computing Base,
         (TCB), MITRE Corp., Bedford, Mass., M79-228, AD-A108-
         831, 30 November 1979.

26. OMB Circular A-71, Transmittal Memorandum No. 1, Security of
         Federal Automated Information Systems, 27 July 1978.

27. OMB Circular A-123, Internal Control Systems, 5 November
         1981.

28. Ruthberg, Z. and McKenzie, R., eds.  Audit and Evaluation of
         Computer Security, in NBS Special Publication #500-19,
         October 1977.

29. Schaefer, M., Linde, R. R., et al.  "Program Confinement in
         KVM/370," in Proceedings of the ACM National
         Conference, October 1977, Seattle.

30. Schell, R. R.    "Security Kernels: A Methodical Design of
         System Security," in Technical Papers, USE Inc. Spring
         Conference, 5-9 March 1979, pp. 245-250.

31. Trotter, E. T. and Tasker, P. S.  Industry Trusted Computer
         Systems Evaluation Process, MITRE Corp., Bedford,
         Mass., MTR-3931, 1 May 1980.

32. Turn, R.  Trusted Computer Systems: Needs and Incentives for
         Use in government and Private Sector, (AD # A103399),
         Rand Corporation (R-28811-DR&E), June 1981.

33. Walker, S. T.    "The Advent of Trusted Computer Operating
         Systems," in National Computer Conference Proceedings,
         May 1980, pp. 655-665.

34. Ware, W. H., ed., Security Controls for Computer Systems:
         Report of Defense Science Board Task Force on Computer
         Security, AD # A076617/0, Rand Corporation, Santa
         Monica, Calif., February 1970, reissued October 1979.

   DoD STANDARD 5200.28:  SUMMARY OF THE DIFFERENCES 
                          BETWEEN IT AND CSC-STD-001-83


Note: Text which has been added or changed is indented and preceded by > sign.
Text which has been deleted is enclosed in slashes (/).  "Computer Security
Center" was changed to "National Computer Security Center" throughout the
document.

The FOREWORD Section was rewritten and signed by Mr. Don Latham on
26 Dec 85.  The ACKNOWLEDGEMENTS Section was updated.
                                     
The PREFACE was changed as follows: 

                                 PREFACE 


The trusted computer system evaluation criteria defined in this 
document classify systems into four broad hierarchical divisions 
of enhanced security protection.  The criteria provide a basis 
for the evaluation of effectiveness of security controls built 
into automatic data processing system products.  The criteria 
were developed with three objectives in mind:  (a) to provide 
users with a yardstick with which to assess the degree of trust 
that can be placed in computer systems for the secure processing 
of classified or other sensitive information; (b) to provide 
guidance to manufacturers as to what to build into their new, 
widely-available trusted commercial products in order to satisfy 
trust requirements for sensitive applications; and (c) to provide 
a basis for specifying security requirements in acquisition 
specifications.  Two types of requirements are delineated for 
secure processing: (a) specific security feature requirements and 
(b) assurance requirements.  Some of the latter requirements 
enable evaluation personnel to determine if the required features 
are present and functioning as intended.  

        >The scope of these criteria is to be applied to
        >the set of components comprising a trusted system, and is
        >not necessarily to be applied to each system component
        >individually.  Hence, some components of a system may be
        >completely untrusted, while others may be individually
        >evaluated to a lower or higher evaluation class than the
        >trusted product considered as a whole system.  In trusted
        >products at the high end of the range, the strength of the
        >reference monitor is such that most of the system
        >components can be completely untrusted.  

Though the criteria are 

        >intended to be

application-independent, /it is recognized that/ the
specific security feature requirements may have to be
interpreted when applying the criteria to specific 

        >systems with their own functional requirements,
        >applications or special environments (e.g., communications
        >processors, process control computers, and embedded systems
        >in general).

The underlying assurance requirements can be
applied across the entire spectrum of ADP system or
application processing environments without special
interpretation.

                                     
The SCOPE Section was changed as follows:

Scope

The trusted computer system evaluation criteria defined in this 
document apply 

        >primarily

to /both/ trusted, commercially available 
automatic data processing (ADP) systems.  

        >They are also applicable, as amplified below, to the
        >evaluation of existing systems and to the specification of
        >security requirements for ADP systems acquisition.

Included are two distinct sets of requirements: l) specific security
feature requirements; and 2) assurance requirements.  The specific 
feature requirements encompass the capabilities typically found 
in information processing systems employing general-purpose 
operating systems that are distinct from the applications programs
being supported.  

        >However, specific security feature requirements
        >may also apply to specific systems with their own functional
        >requirements, applications or special environments (e.g.,
        >communications processors, process control computers, and embedded
        >systems in general).  

The assurance requirements, on the other hand,
apply to systems that cover the full range of computing environments
from dedicated controllers to full range multilevel secure resource
sharing systems.

                                     
Changed the Purpose Section as follows:  

Purpose

As outlined in the Preface, the criteria have been developed to
serve a number of intended purposes: 

     To provide 

            >a standard 

     to manufacturers as to what security features to build
     into their new and planned, ... trust requirements      

           >(with particular emphasis on preventing the       
         >disclosure of data)

     for sensitive applications.

     To provide 

                >DoD components 

     with a metric with which to evaluate 
     the degree of trust that can be placed in ...

     To provide a basis for specifying security requirements in 
     acquisition specifications.

With respect to the 

        >second

purpose for development of the criteria, i.e., providing

        >DoD components 

with a security evaluation metric, evaluations can be
delineated into two types: (a) an evaluation can be
performed on a computer product from a perspective that
excludes the application environment; or, (b) it can be
done to assess whether appropriate security measures ...

The latter type of evaluation, i.e., those done for the purpose 
of assessing a system's security attributes with respect to a 
specific operational mission, is known as a certification 
evaluation.  It must be understood that the completion of a 
formal product evaluation does not constitute certification or 
accreditation for the system to be used in any specific 
application environment.  On the contrary, the evaluation report 
only provides a trusted computer system's evaluation rating along 
with supporting data describing the product system's strengths 
and weaknesses from a computer security point of view.  The 
system security certification and the formal 
approval/accreditation procedure, done in accordance with the 
applicable policies of the issuing agencies, must still be 
followed before a system can be approved for use in processing or 
handling classified information.,8;9.  

        >Designated Approving Authorities (DAAs) remain ultimately
        >responsible for specifying security of systems they
        >accredit.      

The trusted computer system evaluation criteria will be used 
directly and indirectly in the certification process.  Along with 
applicable policy, it will be used directly as 

        >technical guidance

for evaluation of the total system and for specifying system
security and certification requirements for new acquisitions.  Where
a system being evaluated for certification employs a product that 
has undergone a Commercial Product Evaluation, reports from that 
process will be used as input to the certification evaluation. 
Technical data will be furnished to designers, evaluators and the 
Designated Approving Authorities to support their needs for 
making decisions.


                                     
     2.1.4.3  Test Documentation

          The system developer will provide to the evaluators a 
          document that describes the test plan, 

            >test procedures that show how the security mechanisms were tested,

          and results of the security mechanisms' functional testing.




Changed Section 2.2.1.1 as follows:  

     2.2.1.1  Discretionary Access Control

          The TCB shall define and control access between named 
          users and named objects (e.g., files and programs) in 
          the ADP system.  The enforcement mechanism (e.g., 
          self/group/public controls, access control lists) shall 
          allow users to specify and control sharing of those 
          objects by named individuals, or defined groups of 
          individuals, or by both, 

                >and shall provide controls to 
                >limit propagation of access rights.  

          The discretionary access control mechanism shall,
          either by explicit user action or by default, provide that
        objects are protected from unauthorized access.  These
        access controls shall be capable of including or excluding
        access to the granularity of a single user.  Access
        permission to an object by users not already possessing
        access permission shall only be assigned by authorized
        users.

                                     

Completely Reworded Section 2.2.1.2 as follows:  

     2.2.1.2  Object Reuse


          All authorizations to the information contained within 
          a storage object shall be revoked prior to initial 
          assignment, allocation or reallocation to a subject 
          from the TCB's pool of unused storage objects.  No 
          information, including encrypted representations of 
          information, produced by a prior subject's actions is 
          to be available to any subject that obtains access to 
          an object that has been released back to the system.  


                                     

Reworded Section 2.2.2.2 as follows:  

     2.2.2.2  Audit

          The TCB shall be able to create, maintain, and protect 
          from modification or unauthorized access or destruction 
          an audit trail of accesses to the objects it protects. 
          The audit data shall be protected by the TCB so that 
          read access to it is limited to those who are 
          authorized for audit data.  The TCB shall be able to 
          record the following types of events:  use of 
          identification and authentication mechanisms, 
          introduction of objects into a user's address space 
          (e.g., file open, program initiation), deletion of 
          objects, actions taken by computer operators and system 
          administrators and/or system security officers, 

                >and other security relevant events.

          For each recorded event, the audit record shall
        identify: date and time of the event, user, type of event,
        and success or failure of the event.  For
        identification/authentication events the origin of request
        (e.g., terminal ID) shall be included in the audit record.
        For events that introduce an object into a user's address
        space and for object deletion events the audit record shall
        include the name of the object.  The ADP system
        administrator shall be able to selectively audit the
        actions of any one or more users based on individual
        identity.

                                     



Changed Section 2.2.4.3 as follows: 

    2.2.4.3  Test Documentation

          The system developer will provide to the evaluators a 
          document that describes the test plan, 

                >test procedures that show how the
                >security mechanisms were tested, 

          and results of the security mechanisms' functional testing.



Changed Section 3.1.1.1 as follows: 

     3.1.1.1  Discretionary Access Control

          The TCB shall define and control access between named 
          users and named objects (e.g., files and programs) in 
          the ADP system.  The enforcement mechanism (e.g., 
          self/group/public controls, access control lists) shall 
          allow users to specify and control sharing of those 
          objects by named individuals, or defined groups of 
          individuals, or by both, 

                >and shall provide controls to 
                  >limit propagation of access rights.

          The discretionary access control mechanism shall,
        either by explicit user action or by default, provide that
        objects are protected from unauthorized access.  These
        access controls shall be capable of including or excluding
        access to the granularity of a single user.  Access
        permission to an object by users not already possessing
        access permission shall only be assigned by authorized
        users.

                                     

Completely reworded Section 3.1.1.2 as follows:  

     3.1.1.2  Object Reuse

          All authorizations to the information contained within 
          a storage object shall be revoked prior to initial 
          assignment, allocation or reallocation to a subject 
          from the TCB's pool of unused storage objects.  No 
          information, including encrypted representations of 
          information, produced by a prior subject's actions is 
          to be available to any subject that obtains access to 
          an object that has been released back to the system.  




Changed Section 3.1.1.3.2 as follows: 

          3.1.1.3.2  Exportation of Labeled Information

               The TCB shall designate each communication channel 
               and I/O device as either single-level or 
               multilevel.  Any change in this designation shall 
               be done manually and shall be auditable by the 
               TCB.  The TCB shall maintain and be able to audit 
               any change in the /current/ security level or 
               levels associated with a /single-level/ communication 
               channel or I/O device.


Appended a sentence to Section 3.1.1.4 as follows:

                3.1.1.4  Mandatory Access Control

                ... Identification and authentication data shall be used
                    by the TCB to authenticate the user's identity 
                and to ensure that the security level and authorization
                of subjects external to the TCB that may be created to
                act on behalf of the individual user are dominated by
                the clearance and authorization of that user.


Changed one sentence in Section 3.1.2.1 as follows:

                3.1.2.1.  Identification and Authentication

                ... This data shall be used by the TCB to authenticate
                the user's identity and /to determine/ 

                        >to ensure that

                the security level and authorizations of subjects

                        >external to the TCB 

                that may be created to act on
                behalf of the individual user 

                        >are dominated by the clearance 
                        >and authorization of that user.                 
                   
                                     
Reworded Section 3.1.2.2 as follows: 

     3.1.2.2  Audit

          The TCB shall be able to create, maintain, and protect 
          from modification or unauthorized access or destruction 
          an audit trail of accesses to the objects it protects. 
          The audit data shall be protected by the TCB so that 
          read access to it is limited to those who are 
          authorized for audit data.  The TCB shall be able to 
          record the following types of events:  use of 
          identification and authentication mechanisms, 
          introduction of objects into a user's address space 
          (e.g., file open, program initiation), deletion of 
          objects, actions taken by computer operators and system 
          administrators and/or system security officers,

                > and other security relevant events. 

        The TCB shall also be able to audit any override
        of human-readable output markings.  For each recorded
        event, the audit record shall identify: date and time of
        the event, user, type of event, and success or failure of
        the event.  For identification/authentication events the
        origin of request (e.g., terminal ID) shall be included in
        the audit record.  For events that introduce an object into
        a user's address space and for object deletion events the
        audit record shall include the name of the object and the
        object's security level.  The ADP system administrator
        shall be able to selectively audit the actions of any one
        or more users based on individual identity and/or object
        security level.


'Unbolded' the first sentence of Section 3.1.3.2.1.


Reworded Section 3.1.3.2.2 as follows: 

          3.1.3.2.2  Design Specification and Verification

               An informal or formal model of the security policy 
               supported by the TCB shall be maintained  

                >over the life cycle of the ADP system and demonstrated 

             to be consistent with its axioms.


Changed sentence as follows: 

     3.1.4.3  Test Documentation

          The system developer will provide to the evaluators a 
          document that describes the test plan, 

                >test procedures that show how the security 
                >mechanisms were tested, 

        and results of the security mechanisms' functional testing.


Changed Section 3.2.1.1 as follows: 

     3.2.1.1  Discretionary Access Control

          The TCB shall define and control access between named 
          users and named objects (e.g., files and programs) in 
          the ADP system.  The enforcement mechanism (e.g., 
          self/group/public controls, access control lists) shall 
          allow users to specify and control sharing of those 
          objects by named individuals, or defined groups of 
          individuals, or by both, 

                >and shall provide controls to 
                >limit propagation of access rights.  

        The discretionary access control mechanism shall,
        either by explicit user action or by default, provide that
        objects are protected from unauthorized access.  These
        access controls shall be capable of including or excluding
        access to the granularity of a single user.  Access
        permission to an object by users not already possessing
        access permission shall only be assigned by authorized
        users.

                                     
Completely reworded Section 3.2.1.2 as follows: 

     3.2.1.2  Object Reuse

          All authorizations to the information contained within 
          a storage object shall be revoked prior to initial 
          assignment, allocation or reallocation to a subject 
          from the TCB's pool of unused storage objects.  No 
          information, including encrypted representations of 
          information, produced by a prior subject's actions is 
          to be available to any subject that obtains access to 
          an object that has been released back to the system.  




Changed Section 3.2.1.3 as follows: 

     3.2.1.3  Labels

          Sensitivity labels associated with each ADP system 
          resource (e.g., subject, storage object, ROM) that is 
          directly or indirectly accessible by subjects external 
          to the TCB shall be maintained by the TCB.  These 
          labels shall be used as the basis for mandatory access 
          control decisions.  In order to import non-labeled 
          data, the TCB shall request and receive from an 
          authorized user the security level of the data, and all 
          such actions shall be auditable by the TCB.

                                     

Changed Section 3.2.1.3.2 as follows: 

          3.2.1.3.2  Exportation of Labeled Information

               The TCB shall designate each communication channel 
               and I/O device as either single-level or 
               multilevel.  Any change in this designation shall 
               be done manually and shall be auditable by the 
               TCB.  The TCB shall maintain and be able to audit 
               any change in the /current/ security level or 
               levels associated with a /single-level/ 
               communication channel or I/O device.


Appended Sectence to Section 3.2.1.4 as follows:

                3.2.1.4  Mandatory Access Control

                ... Identification and authentication data shall be
                used by the TCB to authenticate the user's identity
                and to ensure that the security level and authorization
                of subjects external to the TCB that may be created to
                act on behalf of the individual user are dominated by
                the clearance and authorization of that user.

Changed Section 3.2.2.1 as follows:

                3.2.2.1  Identification and Authentication

                ... This data shall be used by the TCB to authenticate
                the user's identity and /to determine/

                        >to ensure that

                the security level and authorizations of subjects

                        >external to the TCB 

                that may be created to act on
                behalf of the individual user 

                        >are dominated by the clearance
                        >and authorization of that user.                 
            

                                     
Reworded section 3.2.2.2 as follows:  

     3.2.2.2  Audit

          The TCB shall be able to create, maintain, and protect 
          from modification or unauthorized access or destruction 
          an audit trail of accesses to the objects it protects. 
          The audit data shall be protected by the TCB so that 
          read access to it is limited to those who are 
          authorized for audit data.  The TCB shall be able to 
          record the following types of events:  use of 
          identification and authentication mechanisms, 
          introduction of objects into a user's address space 
          (e.g., file open, program initiation), deletion of 
          objects, actions taken by computer operators and system 
          administrators and/or system security officers, 

                >and other security relevant events. 

        The TCB shall also be able to audit any override
        of human-readable output markings.  For each recorded
        event, the audit record shall identify: date and time of
        the event, user, type of event, and success or failure of
        the event.  For identification/authentication events the
        origin of request (e.g., terminal ID) shall be included in
        the audit record.  For events that introduce an object into
        a user's address space and for object deletion events the
        audit record shall include the name of the object and the
        object's security level.  The ADP system administrator
        shall be able to selectively audit the actions of any one
        or more users based on individual identity and/or object
        security level.  The TCB shall be able to audit the
        identified events that may be used in the exploitation of
        covert storage channels.

                                     

Changed Section 3.2.3.2.2 as follows: 

          3.2.3.2.2  Design Specification and Verification

               A formal model of the security policy supported by 
               the TCB shall be maintained 

                >over the life cycle of the ADP system 

               that is proven consistent with its 
               axioms.  A descriptive top-level specification 
               (DTLS) of the TCB shall be maintained that 
               completely and accurately describes the TCB in 
               terms of exceptions, error messages, and effects. 
               It shall be shown to be an accurate description of 
               the TCB interface.



Changed Section 3.2.4.3 as follows: 

     3.2.4.3  Test Documentation

          The system developer shall provide to the evaluators a 
          document that describes the test plan, 

                >test procedures that show how the 
                >security mechanisms were tested, 

        and results of the security mechanisms' functional testing. 
          It shall include results of testing the effectiveness 
          of the methods used to reduce covert channel 
          bandwidths.

                                     

Replaced "tamperproof" with "tamper resistant":  

     3.2.4.4  Design Documentation

          Documentation shall be available that provides a 
          description of the manufacturer's philosophy of 
          protection and an explanation of how this philosophy is 
          translated into the TCB.  The interfaces between the 
          TCB modules shall be described.  A formal description 
          of the security policy model enforced by the TCB shall 
          be available and proven that it is sufficient to 
          enforce the security policy.  The specific TCB 
          protection mechanisms shall be identified and an 
          explanation given to show that they satisfy the model. 
          The descriptive top-level specification (DTLS) shall be 
          shown to be an accurate description of the TCB 
          interface.  Documentation shall describe how the TCB 
          implements the reference monitor concept and give an 
          explanation why it is 

                >tamper resistant, 

        cannot be bypassed, and is correctly implemented.
        Documentation shall describe how the TCB is structured to
        facilitate testing and to enforce least privilege.  This
        documentation shall also present the results of the covert
        channel analysis and the tradeoffs involved in restricting
        the channels.  All auditable events that may be used in the
        exploitation of known covert storage channels shall be
        identified.  The bandwidths of known covert storage
        channels, the use of which is not detectable by the
        auditing mechanisms, shall be provided.  (See the Covert
        Channel Guideline section.)

                                     

Changed Section 3.3.1.1 as follows: 

     3.3.1.1  Discretionary Access Control

          The TCB shall define and control access between named 
          users and named objects (e.g., files and programs) in 
          the ADP system.  The enforcement mechanism (e.g., 
          access control lists) shall allow users to specify and 
          control sharing of those objects, 

                >and shall provide controls to limit 
                >propagation of access rights.  

        The discretionary access control mechanism shall, either by 
          explicit user action or by default, provide that 
          objects are protected from unauthorized access.  These 
          access controls shall be capable of specifying, for 
          each named object, a list of named individuals and a 
          list of groups of named individuals with their 
          respective modes of access to that object. 
          Furthermore, for each such named object, it shall be 
          possible to specify a list of named individuals and a 
          list of groups of named individuals for which no access 
          to the object is to be given.  Access permission to an 
          object by users not already possessing access 
          permission shall only be assigned by authorized users.



Completely reworded Section 3.3.1.2 as follows:  

     3.3.1.2  Object Reuse

          All authorizations to the information contained within 
          a storage object shall be revoked prior to initial 
          assignment, allocation or reallocation to a subject 
          from the TCB's pool of unused storage objects.  No 
          information, including encrypted representations of 
          information, produced by a prior subject's actions is 
          to be available to any subject that obtains access to 
          an object that has been released back to the system.  




Changed Section 3.3.1.3 as follows: 

     3.3.1.3  Labels

          Sensitivity labels associated with each ADP system 
          resource (e.g., subject, storage object, ROM) that is 
          directly or indirectly accessible by subjects external 
          to the TCB shall be maintained by the TCB.  These 
          labels shall be used as the basis for mandatory access 
          control decisions.  In order to import non-labeled 
          data, the TCB shall request and receive from an 
          authorized user the security level of the data, and all 
          such actions shall be auditable by the TCB.


                                     
Changed Section 3.3.1.3.2 as follows: 

          3.3.1.3.2  Exportation of Labeled Information

               The TCB shall designate each communication channel 
               and I/O device as either single-level or 
               multilevel.  Any change in this designation shall 
               be done manually and shall be auditable by the 
               TCB.  The TCB shall maintain and be able to audit 
               any change in the /current/ security level or 
               levels associated with a /single-level/ 
               communication channel or I/O device.
                                     

Appended Sentence to Section 3.3.1.4 as follows:

                3.3.1.4  Mandatory Access Control

                ... Identification and authentication data shall be used
                    by the TCB to authenticate the user's identity 
                and to ensure that the security level and authorization
                of subjects external to the TCB that may be created to
                act on behalf of the individual user are dominated by
                the clearance and authorization of that user.



Changed Section 3.3.2.1 as follows:

                3.3.2.1  Identification and Authentication

                ... This data shall be used by the TCB to authenticate
                the user's identity and /to determine/ 

                        >to ensure that

                the security level and authorizations of subjects

                        >external to the TCB 

                that may be created to act on
                behalf of the individual user 

                        >are dominated by the clearance 
                        >and authorization of that user.                 
            


                                     
Changed Section 3.3.2.2 as follows: 

     3.3.2.2  Audit

          The TCB shall be able to create, maintain, and protect 
          from modification or unauthorized access or destruction 
          an audit trail of accesses to the objects it protects. 
          The audit data shall be protected by the TCB so that 
          read access to it is limited to those who are 
          authorized for audit data.  The TCB shall be able to 
          record the following types of events:  use of 
          identification and authentication mechanisms, 
          introduction of objects into a user's address space 
          (e.g., file open, program initiation), deletion of 
          objects, actions taken by computer operators and system 
          administrators and/or system security officers, 
        
                >and other security relevant events.  
        
        The TCB shall also be able to audit any override
        of human-readable output markings.  For each recorded
        event, the audit record shall identify: date and time of
        the event, user, type of event, and success or failure of
        the event.  For identification/authentication events the
        origin of request (e.g., terminal ID) shall be included in
        the audit record.  For events that introduce an object into
        a user's address space and for object deletion events the
        audit record shall include the name of the object and the
        object's security level.  The ADP system administrator
        shall be able to selectively audit the actions of any one
        or more users based on individual identity and/or object
        security level.  The TCB shall be able to audit the
        identified events that may be used in the exploitation of
        covert storage channels.  The TCB shall contain a mechanism
        that is able to monitor the occurrence or accumulation of
        security auditable events that may indicate an imminent
        violation of security policy.  This mechanism shall be able
        to immediately notify the security administrator when
        thresholds are exceeded, 

                >and if the occurrence or accumulation
                >of these security relevant events continues, 
                >the system shall take the least disruptive 
                >action to terminate the event.


Changed the first sentence of Section 3.3.3.2.2 as follows:

        3.3.3.2.2  Design Specification and Verification

                A formal model of the security policy supported by
                the TCB shall be maintained 

                        >over the life cycle of
                        >the ADP system 

                that is proven consistent with its axioms. ...

Changed Section 3.3.4.3 as follows:  

     3.3.4.3  Test Documentation

          The system developer shall provide to the evaluators a 
          document that describes the test plan, 

                >test procedures that show how the 
                >security mechanisms were tested, 

        and results of the security mechanisms' functional testing. 
          It shall include results of testing the effectiveness 
          of the methods used to reduce covert channel 
          bandwidths.

Replaced "tamperproof" with "tamper resistant" in Section 3.3.4.4.

                                     

Changed Section 4.1.1.1 as follows:  

     4.1.1.1  Discretionary Access Control

          The TCB shall define and control access between named 
          users and named objects (e.g., files and programs) in 
          the ADP system.  The enforcement mechanism (e.g., 
          access control lists) shall allow users to specify and 
          control sharing of those objects, 

                >and shall provide controls to 
                >limit propagation of access rights.  

        The discretionary access control mechanism shall, either by 
          explicit user action or by default, provide that 
          objects are protected from unauthorized access.  These 
          access controls shall be capable of specifying, for 
          each named object, a list of named individuals and a 
          list of groups of named individuals with their 
          respective modes of access to that object. 
          Furthermore, for each such named object, it shall be 
          possible to specify a list of named individuals and a 
          list of groups of named individuals for which no access 
          to the object is to be given.  Access permission to an 
          object by users not already possessing access 
          permission shall only be assigned by authorized users.
                                     


Completely reworded Section 4.1.1.2 as follows:  

     4.1.1.2  Object Reuse

          All authorizations to the information contained within 
          a storage object shall be revoked prior to initial 
          assignment, allocation or reallocation to a subject 
          from the TCB's pool of unused storage objects.  No 
          information, including encrypted representations of 
          information, produced by a prior subject's actions is 
          to be available to any subject that obtains access to 
          an object that has been released back to the system.  




Changed Section 4.1.1.3 as follows:  

     4.1.1.3  Labels

          Sensitivity labels associated with each ADP system 
          resource (e.g., subject, storage object, 

                >ROM) 

        that is directly or indirectly accessible by subjects 
        external to the TCB shall be maintained by the TCB.  These 
          labels shall be used as the basis for mandatory access 
          control decisions.  In order to import non-labeled 
          data, the TCB shall request and receive from an 
          authorized user the security level of the data, and all 
          such actions shall be auditable by the TCB.

                                     

Changed Section 4.1.1.3.2 as follows: 

          4.1.1.3.2  Exportation of Labeled Information

               The TCB shall designate each communication channel 
               and I/O device as either single-level or 
               multilevel.  Any change in this designation shall 
               be done manually and shall be auditable by the 
               TCB.  The TCB shall maintain and be able to audit 
               any change in the /current/ security level 

                >or levels 

             associated with a /single-level/ 
               communication channel or I/O device.


Appended Sentence to Section 4.1.1.4 as follows:

                4.1.1.4  Mandatory Access Control

                ... Identification and authentication data shall be used
                by the TCB to authenticate the user's identity 
                and to ensure that the security level and authorization 
                of subjects external to the TCB that may be created to 
                act on behalf of the individual user are dominated by 
                the clearance and authorization of that user.



Changed Section 4.1.2.1 as follows:

                4.1.2.1  Identification and Authentication

                ... This data shall be used by the TCB to authenticate
                the user's identity and /to determine/ 

                        >to ensure that

                the security level and authorizations of subjects

                        >external to the TCB 

                that may be created to act on
                behalf of the individual user 

                        >are dominated by the clearance 
                        >and authorization of that user.                 
               


Changed Section 4.1.2.2 as follows: 


     4.1.2.2  Audit

          The TCB shall be able to create, maintain, and protect 
          from modification or unauthorized access or destruction 
          an audit trail of accesses to the objects it protects. 
          The audit data shall be protected by the TCB so that 
          read access to it is limited to those who are 
          authorized for audit data.  The TCB shall be able to 
          record the following types of events:  use of 
          identification and authentication mechanisms, 
          introduction of objects into a user's address space 
          (e.g., file open, program initiation), deletion of 
          objects, actions taken by computer operators and system 
          administrators and/or system security officers, 

                >and other security relevant events.  

        The TCB shall also be able to audit any override
        of human-readable output markings.  For each recorded
        event, the audit record shall identify: date and time of
        the event, user, type of event, and success or failure of
        the event.  For identification/authentication events the
        origin of request (e.g., terminal ID) shall be included in
        the audit record.  For events that introduce an object into
        a user's address space and for object deletion events the
        audit record shall include the name of the object and the
        object's security level.  The ADP system administrator
        shall be able to selectively audit the actions of any one
        or more users based on individual identity and/or object
        security level.  The TCB shall be able to audit the
        identified events that may be used in the exploitation of
        covert storage channels.  The TCB shall contain a mechanism
        that is able to monitor the occurrence or accumulation of
        security auditable events that may indicate an imminent
        violation of security policy.  This mechanism shall be able
        to immediately notify the security administrator when
        thresholds are exceeded, 

                >and, if the occurrence or accumulation of these 
                >security relevant events continues, the system 
                >shall take the least disruptive action to
                >terminate the event.

                                     
'Unbolded' the words "covert channels" in Section 4.1.3.1.3.


Changed the first sentence of Section 4.1.3.2.2 as follows:

        4.1.3.2.2  Design Specification and Verification

                A formal model of the security policy supported by
                the TCB shall be maintained 

                        >over the life cycle of the ADP system 

                that is proven consistent with its axioms. ...



Changed Section 4.1.4.3 as follows: 

     4.1.4.3  Test Documentation

          The system developer shall provide to the evaluators a 
          document that describes the test plan, 

                >test procedures that show how the security 
                >mechanisms were tested, and 

          results of the security mechanisms' functional testing. 
          It shall include results of testing the effectiveness 
          of the methods used to reduce covert channel 
          bandwidths.  The results of the mapping between the 
          formal top-level specification and the TCB source code 
          shall be given.



Replaced "tamperproof" with "tamper resistant" in Section 4.1.4.4.


Changed the last paragraph of Section 5.1 as follows:

                                     
5.1  A Need for Consensus

     A major goal of ... 

     As described ... 

        >The Purpose of this section is to describe in detail the 
        >fundamental control objectives.  These objectives lay the 
        >foundation for the requirements outlined in the criteria. 

     The goal is to explain the foundations so that those outside 
     the National Security Establishment can assess their 
     universality and, by extension, the universal applicability 
     of the criteria requirements to processing all types of 
     sensitive applications whether they be for National Security 
     or the private sector.



Changed the second paragraph of Section 6.2 as follows:

6.2  A Formal Policy Model

        Following the publication of ...

                >A subject can act on behalf of a user or another 
                >subject.  The subject is created as a surrogate 
                >for the cleared user and is assigned a formal 
                >security level based on their classification.
                >The state transitions and invariants of the formal 
                >policy model define the invariant relationships 
                >that must hold between the clearance of the user, 
                >the formal security level of any process that can 
                >act on the user's behalf, and the formal security 
                >level of the devices and other objects to which any 
                >process can obtain specific modes of access.  

        The Bell and LaPadula model, 

                >for example, 

        defines a relationship between 

                >formal security levels of subjects and objects, 

        now referenced as the "dominance relation."  From this definition ...
        ... Both the Simple Security Condition and the *-Property 
        include mandatory security provisions based on the dominance
        relation between the 

                >formal security levels of subjects and objects.  

        The Discretionary Security Property ...

                                     


Added a sentence to the end of Section 7.0: 


7.0  THE RELATIONSHIP BETWEEN POLICY AND THE CRITERIA

     Section 1 presents fundamental computer security 
     requirements and Section 5 presents the control objectives 
     for Trusted Computer Systems.  They are general 
     requirements, useful and necessary, for the development of 
     all secure systems.  However, when designing systems that 
     will be used to process classified or other sensitive 
     information, functional requirements for meeting the Control 
     Objectives become more specific.  There is a large body of 
     policy laid down in the form of Regulations, Directives, 
     Presidential Executive Orders, and OMB Circulars that form 
     the basis of the procedures for the handling and processing 
     of Federal information in general and classified information 
     specifically.  This section presents pertinent excerpts from 
     these policy statements and discusses their relationship to 
     the Control Objectives.  

        >These excerpts are examples to illustrate the relationship 
        >of the policies to criteria and may not be complete.



                                     
Inserted the following 

        >as the next to last paragraph 

of Section 7.2:    

        >DoD Directive 5200.28 provides the security requirements for 
        >ADP systems.  For some types of information, such as 
        >Sensitive Compartmented Information (SCI), DoD Directive 
        >5200.28 states that other minimum security requirements also 
        >apply.  These minima are found in DCID 1/16 (new reference 
        >number 5) which is implemented in DIAM 50-4 (new reference 
        >number 6) for DoD and DoD contractor ADP systems.

     From requirements imposed by ... 


Changed Footnote #1 referenced by Section 7.2 as follows:

        Replaced "Health and Human Services Department" with "U.S. 
        Information Agency."



Changed (updated) the quote from DoD 5220.22-M, Section 7.3.1, as 
follows:
                                     
7.3  Criteria Control Objective for Security Policy

     7.3.1  Marking

          The control objective for marking ... 

          DoD 5220.22-M, "Industrial Security ... 

                  >"a.  General.  Classification designation by physical 
                  >marking, notation or other means serves to warn and to 
                  >inform the holder what degree of protection against 
                  >unauthorized disclosure is required for that 
                  >information or material." (14)



Changed the 

        >last paragraph 

of Section 7.5 as follows:

        A major component of assurance, life-cycle assurance, 

                >as described in DoD Directive 7920.1, 

is concerned with testing ADP systems both in the
development phase as well as during operation.

        >(17) 

DoD Directive 5215.1 ...



Changed Section 9.0 as follows:
                                     

9.0  A GUIDELINE ON CONFIGURING MANDATORY ACCESS CONTROL FEATURES

     The Mandatory Access Control requirement ... 

     *    The number of hierarchical classifications should be 
          greater than or equal to 

                >sixteen (16).

     *    The number of non-hierarchical categories should be 
          greater than or equal to 

                >sixty-four (64)..



Completely reworded the third paragraph of Formal Product
Evaluation, in Appendix A, as follows:
                                     
Formal Product Evaluation

The formal product evaluation provides ... 

A formal product evaluation begins with ...   

        >The evaluation team writes a final report on their findings about 
        >the system.  The report is publicly available (containing no 
        >proprietary or sensitive information) and contains the overall 
        >class rating assigned to the system and the details of the 
        >evaluation team's findings when comparing the product against the 
        >evaluation criteria.  Detailed information concerning 
        >vulnerabilities found by the evaluation team is furnished to the 
        >system developers and designers as each is found so that the 
        >vendor has a chance to eliminate as many of them as possible 
        >prior to the completion of the Formal Product Evaluation. 
        >Vulnerability analyses and other proprietary or sensitive 
        >information are controlled within the Center through the 
        >Vulnerability Reporting Program and are distributed only within 
        >the U.S. Government on a strict need-to-know and non-disclosure 
        >basis, and to the vendor.



Changed two paragraphs in Audit (Appendix D) as follows: 


 C2: NEW: The TCB shall be able to create, maintain, and protect 
     from modification or unauthorized access or destruction an 
     audit trail of accesses to the objects it protects.  The 
     audit data shall be protected by the TCB so that read access 
     to it is limited to those who are authorized for audit data. 
     The TCB shall be able to record the following types of 
     events: use of identification and authentication mechanisms, 
     introduction of objects into a user's address space (e.g., 
     file open, program initiation), deletion of objects, actions 
     taken by computer operators and system administrators and/or 
     system security officers, 

        >and other security relevant events.  

     or each recorded event, the audit record shall 
     identify:  date and time of the event, user, type of event, 
     and success or failure of the event.  For 
     identification/authentication events the origin of request 
     (e.g., terminal ID) shall be included in the audit record. 
     For events that introduce an object into a user's  address 
     space and for object deletion events the audit record shall 
     include the name of the object.  The ADP system 
     administrator shall be able to selectively audit the actions 
     of any one or more users based on individual identity.

 B3: ADD: ...when thresholds are exceeded, 

                >and, if the occurrence or accumulation of these 
                >security relevant events continues, the system 
                >shall take the least disruptive action to terminate
                >the event.


Changed one paragraph in Design Documentation (Appendix D):

 B2: ADD: Change "tamperproof" to "tamper resistant." 


Changed two paragraphs in Design Specification and Verification:

 B1: NEW: An informal or formal model of the security policy
        supported by the TCB shall be maintained 

              >over the life cycle of the ADP system and demonstrated 

        to be consistent with its axioms.

 B2: CHANGE: A formal model of the security policy supported by
        the TCB shall be maintained 

                >over the life cycle of the ADP system 

          that is proven consistent with its axioms.



Changed two paragraphs in Discretionary Access Control as follows:  

 C2: CHANGE: The enforcement mechanism (e.g., self/group/public 
     controls, access control lists) shall allow users to specify 
     and control sharing of those objects by named individuals, 
     or defined groups of individuals, or by both, 

        >and shall provide controls to limit propagation of access rights.  

 B3: CHANGE: The enforcement mechanism (e.g., access control 
     lists) shall allow users to specify and control sharing of 
     those objects, 

        >and shall provide controls to limit propagation of access rights.  

     These access controls shall be capable of specifying, for each 
     named object, a list of named individuals and a list of groups of
     named individuals with their respective modes of access to that object.

                                     
Changed 1 paragraph in Exportation of Labeled Information:


 B1: NEW: The TCB shall designate each communication channel and 
     I/O device as either single-level or multilevel.  Any change 
     in this designation shall be done manually and shall be 
     auditable by the TCB.  The TCB shall maintain and be able to 
     audit any change in the /current/ security level 

        >or levels 

     associated with a /single-level/ communication channel or 
     I/O device.


Changed 1 paragraph in Identification and Authorization:

 B1: CHANGE: ... This data shall be used by the TCB to authenticate
        the user's identity and 

                >to ensure that 

        the security level and authorizations of subjects external to 
        the TCB that may be     created to act on behalf of the individual 
        user 

                >are dominated by the clearance and authorization 
                >of that user.


Changed 1 paragraph in Labels:

 B2: CHANGE: ... (e.g., subject, storage object, ROM) ...


Changed 1 paragraph in Mandatory Access Control:

 B1: NEW: ... Identification and authentication data shall be used

        >by the TCB to authenticate the user's identity and to ensure
        >that the security level and authorization of subjects external
        >to the TCB that may be created to act on behalf of the
        >individual user are dominated by the clearance and authoriza-
        >tion of that user.


Rewrote 1 paragraph in Object Reuse:

 C2: NEW: 
        >All authorizations to the information contained 
     >within a storage object shall be revoked prior to initial 
     >assignment, allocation or reallocation to a subject from the 
     >TCB's pool of unused storage objects.  No information, 
     >including encrypted representations of information, produced 
     >by a prior subject's actions is to be available to any 
     >subject that obtains access to an object that has been 
     >released back to the system.


Changed l paragraph in Test Documentation:

 C1: NEW: The system developer shall provide to the evaluators a
        document that describes the test plan, 

                >test procedures that show how the security 
                >mechanisms were tested, 

        and results of the security mechanisms' functional testing.


                                     
                                 GLOSSARY 



Changed Discretionary Access Control: 

Discretionary Access Control - A means of restricting access to 
     objects based on the identity of subjects and/or groups to 
     which they belong.  The controls are discretionary in the 
     sense that a subject with a certain access permission is 
     capable of passing that permission (perhaps indirectly) on 
     to any other subject 

        (unless restrained by mandatory access control).

Added:

Front-End Security Filter - A process that is invoked to process 
     data according to a specified security policy prior to 
     releasing the data outside the processing environment or 
     upon receiving data from an external source.


Granularity - The relative fineness or coarseness by which a 
     mechanism can be adjusted.  The phrase "the granularity of 
     a single user" means the access control mechanism can be 
     adjusted to include or exclude any single user. 
 

Read-Only Memory (ROM) - A storage area in which the contents 
     can be read but not altered during normal computer 
     processing.

                                    
Security Relevant Event - Any event that attempts to change the 
     security state of the system, (e.g., change discretionary 
     access controls, change the security level of the subject, 
     change user password, etc.).  Also, any event that attempts 
     to violate the security policy of the system, (e.g., too 
     many attempts to login, attempts to violate the mandatory 
     access control limits of a device, attempts to downgrade a 
     file, etc.).


Changed the name of the term:

Simple Security /Property/ 

        >Condition 

- A Bell-LaPadula security model rule allowing a subject
read access to an object only if the security level of the
subject dominates the security level of the object.


Changed definition:  

 Trusted Computing Base (TCB) - The totality of protection 
     mechanisms within a computer system --including hardware, 
     firmware, and software -- the combination of which is 
     responsible for enforcing a security policy.  

        >A TCB consists of one or more components that together enforce 
        >a unified security policy over a product or system.  

     The ability of a TCB to correctly enforce a security
     policy depends solely on the mechanisms within the TCB and
     on the correct input by system administrative personnel of
     parameters (e.g., a user's clearance) related to the
     security policy.

                                     
                                REFERENCES 


Added:  (References were renumbered as necessary)

5.   DCID 1/16, Security of Foreign Intelligence in Automated 
     Data Processing Systems and Networks (U), 4 January 1983. 

6.   DIAM 50-4, Security of Compartmented Computer Operations (U),  
     24 June 1980. 

9.   DoD Directive 5000.29, Management of Computer Resources in     
     Major Defense Systems, 26 April 1976.

17.  DoD Directive 7920.1, Life Cycle Management of Automated 
     Information Systems (AIS), 17 October 1978.


Corrected dates on the following References:

14.  DoD 5220.22-M, Industrial Security Manual for Safeguarding 
     Classified Information, March 1984.

15.  DoD 5220.22-R, Industrial Security Regulation, February 
     1984.


%