Loading…
A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators
The National Security Agency (NSA) wants to clarify the computer security aspects of the Department of Defense (DoD) automated information system (AIS) acquisition process. Therefore, it is producing a four volume guideline series (referenced in Table 1-1 and more complete titles in the Bibliography...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Report |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The National Security Agency (NSA) wants to clarify the computer security aspects of the Department of Defense (DoD) automated information system (AIS) acquisition process. Therefore, it is producing a four volume guideline series (referenced in Table 1-1 and more complete titles in the Bibliography). This document is the second volume. These guidelines are intended for Federal agency use in acquiring trusted systems. DoD Directive 5200.28, Security Requirements for Automated Information Systems (AISs), provides security requirements concerning all protection aspects of automated information systems. It specifies DoD 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC), as the requirement source for trusted computer systems. The second page of DoD 5200.28-STD states: 'This document is used to provide a basis for specifying security requirements in acquisition specifications' |
---|