2
Table of Contents
1 Executive Summary ................................................................................................................ 3
2 Identification of the TOE ........................................................................................................ 4
3 Interpretations ......................................................................................................................... 5
4 Security Policy ........................................................................................................................ 5
5 TOE Security Environment .................................................................................................... 6
5.1 Secure Usage Assumptions .............................................................................................. 6
5.2 Threats Countered and Not Countered ............................................................................. 6
5.3 Organizational Security Policies ...................................................................................... 7
6 Architectural Information ....................................................................................................... 7
6.1.1 Data Separation ......................................................................................................... 7
6.1.2 Switch Management.................................................................................................. 7
6.2 TOE Boundaries ............................................................................................................... 7
7 Documentation ........................................................................................................................ 9
7.1 Design Documentation ..................................................................................................... 9
7.2 Guidance Documentation ............................................................................................... 10
7.3 Configuration Management and Lifecycle ..................................................................... 10
7.4 Test Documentation ....................................................................................................... 10
7.5 Vulnerability Assessment Documentation ..................................................................... 10
7.6 Security Target ............................................................................................................... 11
7.7 Site Audit........................................................................................................................ 11
8 IT Product Testing ................................................................................................................ 11
8.1 Developer Testing .......................................................................................................... 11
8.2 Evaluation Team Independent Testing ........................................................................... 11
8.3 Vulnerability Analysis.................................................................................................... 12
9 Evaluated Configuration ....................................................................................................... 12
10 Results of the Evaluation ...................................................................................................... 12
11 Validator Comments/Recommendations .............................................................................. 12
12 Annexes ................................................................................................................................ 13
13 Security Target ...................................................................................................................... 13
14 Glossary ................................................................................................................................ 13
15 Bibliography ......................................................................................................................... 14
Komentáře k této Příručce