(Orange Book)
|
DoD
Trusted Computer System Evaluation Criteria, 26 December
1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). |
5200.28-STD |
(Green
Book) |
DoD
Password Management Guideline, 12 April 1985 |
CSC-STD-002-85 |
(Light
Yellow Book) |
Computer
Security Requirements -- Guidance for Applying the DoD TCSEC
in Specific Environments, 25 June 1985 |
CSC-STD-003-85 |
(Yellow
Book) |
Technical
Rational Behind CSC-STD-003-85: Computer Security
Requirements -- Guidance for Applying the DoD TCSEC in
Specific Environments, 25 June 1985. |
CSC-STD-004-85 |
|
Advisory
Memorandum on Office Automation Security Guidelines |
NTISSAM
COMPUSEC/1-87 |
(Tan
Book) |
A
Guide to Understanding Audit in Trusted Systems 1 June 1988,
Version 2. |
NCSC-TG-001
Ver. 2 |
(Bright
Blue Book) |
Trusted
Product Evaluations - A Guide for Vendors, 22 June 1990. |
NCSC-TG-002 |
(Neon
Orange Book) |
A
Guide to Understanding Discretionary Access Control in
Trusted Systems, 30 September 1987. |
NCSC-TG-003 |
(Teal
Green Book) |
Glossary
of Computer Security Terms, 21 October 1988. (NCSC-WA-001-85
is obsolete) |
NCSC-TG-004 |
(Red
Book) |
Trusted
Network Interpretation of the TCSEC (TNI), 31 July 1987 |
NCSC-TG-005 |
(Amber
Book) |
A
Guide to Understanding Configuration Management in Trusted
Systems, 28 March 1988. |
NCSC-TG-006 |
(Burgundy
Book) |
A
Guide to Understanding Design Documentation in Trusted
Systems, 6 October 1988. |
NCSC-TG-007 |
(Dark
Lavender Book) |
A
Guide to Understanding Trusted Distribution in Trusted
Systems 15 December 1988. |
NCSC-TG-008 |
(Venice
Blue Book) |
Computer
Security Subsystem Interpretation of the TCSEC 16 September
1988. |
NCSC-TG-009 |
(Aqua
Book) |
A
Guide to Understanding Security Modeling in Trusted Systems,
October 1992. |
- NCSC-TG-010
|
(Red
Book) |
Trusted
Network Interpretation Environments Guideline - Guidance for
Applying the TNI, 1 August 1990. |
NCSC-TG-011 |
(Pink
Book) |
RAMP
Program Document, 1 March 1995, Version 2 |
NCSC-TG-013
Ver.2 |
(Purple
Book) |
Guidelines
for Formal Verification Systems, 1 April 1989. |
NCSC-TG-014 |
(Brown
Book) |
A
Guide to Understanding Trusted Facility Management, 18
October 1989 |
NCSC-TG-015 |
(Yellow-Green
Book) |
Guidelines
for Writing Trusted Facility Manuals, October 1992. |
NCSC-TG-016 |
(Light
Blue Book) |
A
Guide to Understanding Identification and Authentication in
Trusted Systems, September 1991. |
NCSC-TG-017 |
(Light
Blue Book) |
A
Guide to Understanding Object Reuse in Trusted Systems, July
1992. |
NCSC-TG-018 |
(Blue
Book) |
Trusted
Product Evaluation Questionaire, 2 May 1992, Version 2. |
NCSC-TG-019
Ver. 2 |
(Silver
Book) |
Trusted
UNIX Working Group (TRUSIX) Rationale for Selecting Access
Control List Features for the UNIX® System, 7 July 1989. |
NCSC-TG-020-A |
(Purple
Book) |
Trusted
Database Management System Interpretation of the TCSEC (TDI),
April 1991. |
NCSC-TG-021 |
(Yellow
Book) |
A
Guide to Understanding Trusted Recovery in Trusted Systems,
30 December 1991. |
NCSC-TG-022 |
(Bright
Orange Book) |
A
Guide to Understanding Security Testing and Test
Documentation in Trusted Systems |
NCSC-TG-023 |
(Purple
Book) |
A
Guide to Procurement of Trusted Systems: An Introduction to
Procurement Initiators on Computer Security Requirements,
December 1992. |
NCSC-TG-024
Vol. 1/4 |
(Purple
Book) |
A
Guide to Procurement of Trusted Systems: Language for RFP
Specifications and Statements of Work - An Aid to
Procurement Initiators, 30 June 1993 |
NCSC-TG-024
Vol. 2/4 |
(Purple
Book) |
A
Guide to Procurement of Trusted Systems: Computer Security
Contract Data Requirements List and Data Item Description
Tutorial, 28 February 1994. |
NCSC-TG-024
Vol. 3/4 |
(Purple
Book) |
A
Guide to Procurement of Trusted Systems: How to Evaluate a
Bidder's Proposal Document - An Aid to Procurement
Initiators and Contractors (publication TBA) |
NCSC-TG-024
Vol. 4/4 |
(Forest
Green Book) |
A
Guide to Understanding Data Remanence in Automated
Information Systems, September 1991, Version 2, (Supercedes
CSC-STD-005-85). |
NCSC-TG-025
Ver. 2 |
(Hot
Peach Book) |
A
Guide to Writing the Security Features User's Guide for
Trusted Systems, September 1991. |
NCSC-TG-026 |
(Turquiose
Book) |
A
Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems, May
1992. |
NCSC-TG-027 |
(Violet
Book) |
Assessing
Controlled Access Protection, 25 May 1992. |
NCSC-TG-028 |
(Blue
Book) |
Introduction
to Certification and Accreditation Concepts, January 1994. |
NCSC-TG-029 |
(Light
Pink Book) |
A
Guide to Understanding Covert Channel Analysis of Trusted
Systems, November 1993. |
NCSC-TG-030 |