Term
A security administrator is supported |
|
Definition
|
|
Term
Automated imminent intrusion detection, notification, and response |
|
Definition
|
|
Term
Covert timing channels are analyzed for occurrence and bandwidth |
|
Definition
|
|
Term
DAC and MAC enforcement extended to all subjects and objects |
|
Definition
|
|
Term
Discretionary Access Control |
|
Definition
|
|
Term
|
Definition
|
|
Term
First security level to require trusted recovery |
|
Definition
|
|
Term
Trusted system recovery procedure |
|
Definition
|
|
Term
The minimum TCSEC level that requires protection against covert timing channels |
|
Definition
|
|
Term
Formal management and distribution procedures |
|
Definition
|
|
Term
Controlled Access Protection |
|
Definition
|
|
Term
The system must protect against covert storage channels (but not necessarily covert timing channels) |
|
Definition
|
|
Term
Informal statement of the security policy model |
|
Definition
|
|
Term
Audit security-relevant events |
|
Definition
|
|
Term
|
Definition
|
|
Term
Mandatory Access Control (MAC) over select subjects and objects |
|
Definition
|
|
Term
|
Definition
|
|
Term
Functionally identical to B3 |
|
Definition
|
|
Term
Requires the system to clearly identify functions of the security administrator to perform security-related functions |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Deals with discretionary protection (need-to-know) |
|
Definition
|
|
Term
Formal design and verification techniques including a formal top-level specification |
|
Definition
|
|
Term
Separation of users and data |
|
Definition
|
|
Term
Strict configuration management controls are imposed |
|
Definition
|
|
Term
Structured to exclude code not essential to security policy enforcement |
|
Definition
|
|
Term
Authentication mechanisms are strengthened |
|
Definition
|
|
Term
The first evaluation class of the Trusted Network Interpretation (TNI) or TCSEC that offers labeled security protection |
|
Definition
|
|
Term
Trusted facility management is provided with administrator and operator segregation |
|
Definition
|
|
Term
Covert storage channels are analyzed for occurrence and bandwidth |
|
Definition
|
|
Term
First TCSEC level that addresses object reuse |
|
Definition
|
|
Term
|
Definition
|
|
Term
Design and implementation enable more comprehensive testing and review |
|
Definition
|
|
Term
Lowest Orange Book evaluation level requiring Security Domains |
|
Definition
|
|
Term
Security policy model clearly defined and formally documented |
|
Definition
|
|
Term
Design specification and verification required starting at this level |
|
Definition
|
|
Term
Discretionary Security Protection |
|
Definition
|
|
Term
First security rating to be concerned with covert channels |
|
Definition
|
|
Term
Satisfies reference monitor requirements |
|
Definition
|
|
Term
Individual accountability through login procedures |
|
Definition
|
|
Term
|
Definition
|
|
Term
Label exportation capabilities |
|
Definition
|
|
Term
All levels from this level and above require Auditing mechanisms |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Most similar to Compartmented Mode Workstations (CMW) |
|
Definition
|
|
Term
All discovered flaws must be removed or otherwise mitigated |
|
Definition
|
|
Term
The first security level to require a system to support separate operator and system administrator roles |
|
Definition
|
|
Term
Carefully structured into protection-critical and non-protection-critical elements |
|
Definition
|
|
Term
Requires the system to clearly identify functions of the security administrator to perform security-related functions |
|
Definition
|
|
Term
The minimum TCSEC level that requires the support of a separate operation and administrator function |
|
Definition
|
|
Term
System design covers not only the data but also the storage devices to protect against covert channels. |
|
Definition
|
|
Term
Significant system engineering directed toward minimizing complexity |
|
Definition
|
|
Term
Reserved for systems that were evaluated under the TCSEC but did not meet the requirements for a higher trust level. |
|
Definition
|
|
Term
The minimum TCSEC level that requires protection against covert storage channels |
|
Definition
|
|
Term
Trusted facility management (the assignment of a specific individual to administer the security-related functions of a system) is an assurance requirement only for this level and above |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|