ACKNOWLEDGMENTS Special recognition is extended to James N. Menendez, National Computer Security Center (NCSC), as project manager and co-author of this document. Recognition is also extended to Don Brinkley and Rick Dedrick, Unisys, as co-authors of this document. Special acknowledgment is given to Barbara Mayer, NCSC, for her invaluable input and review of this document, which has resulted in its current form. Acknowledgment is also given to all those members of the computer security community who contributed their time and expertise by actively participating in the review of this document. TABLE OF CONTENTS FOREWORD i ACKNOWLEDGMENTS ii 1. INTRODUCTION 1 1.1 PURPOSE 1 1.2 SCOPE 1 1.3 CONTROL OBJECTIVE 2 2. OVERVIEW OF DESIGN DOCUMENTATION PRINCIPLES 3 2.1 PURPOSE OF DESIGN DOCUMENTATION 3 2.2 DESIGN DOCUMENTATION DEVELOPMENT FOR EVALUATION 3 2.3 LEVEL OF DETAIL OF DESIGN DOCUMENTATION 4 2.4 LEVEL OF EFFORT FOR MEETING THE REQUIREMENTS 4 2.5 FORMAT OF DESIGN DOCUMENTATION 5 3. MEETING THE CRITERIA REQUIREMENTS 7 3.1 THE C1 DESIGN DOCUMENTATION REQUIREMENTS 7 3.2 THE C2 DESIGN DOCUMENTATION REQUIREMENTS 7 3.3 THE B1 DESIGN DOCUMENTATION REQUIREMENTS 7 3.4 THE B2 DESIGN DOCUMENTATION REQUIREMENTS 8 3.5 THE B3 DESIGN DOCUMENTATION REQUIREMENTS 9 3.6 THE A1 DESIGN DOCUMENTATION REQUIREMENTS 9 4. COMPONENTS OF DESIGN DOCUMENTATION 11 4.1 DOCUMENTING THE SECURITY POLICY 11 4.2 DOCUMENTING TCB PROTECTION MECHANISMS 14 4.3 DOCUMENTATION OF COVERT CHANNELS 16 5. OTHER TOPICS 19 5.1 MODULARITY 19 5.2 HARDWARE DESIGN DOCUMENTATION 19 5.3 CONFIGURATION MANAGEMENT 20 6. SUMMARY OF DESIGN DOCUMENTATION 23 APPENDIX A SUMMARY OF DESIGN DOCUMENTATION REQUIREMENTS 25 APPENDIX B EXCERPTS FROM FINAL EVALUATION REPORTS 29 B.1 CLASS C2 29 B.1.1 UTX/32S 29 B.2 CLASS B2 30 B.2.1 Multics 30 B.3 CLASS A1 31 B.3.1 SCOMP 31 GLOSSARY 33 REFERENCES 36 1. INTRODUCTION 1.1 Purpose The Trusted Computer System Evaluation Criteria (TCSEC) is the standard used for evaluating the effectiveness of security controls built into Automated Data Processing (ADP) systems. The TCSEC is divided into four divisions: D, C, B, and A, ordered in a hierarchical manner, with the highest division (A) being reserved for those systems providing the best available level of assurance. Within Divisions C through A are a number of subdivisions known as classes, which are also ordered in a hierarchical manner to represent different levels of trust in these classes. Design Documentation is a TCSEC requirement for classes C1 and above. The purpose of this guideline is to provide developers of trusted computer systems with guidance in understanding and meeting the design documentation requirements contained in the TCSEC. To accomplish this, the guideline addresses two goals. First, the guideline increases the vendors' awareness of the importance of design documentation to the security of their system throughout the system life-cycle. Second, the guideline forms an initial basis of understanding between the vendor and evaluator communities concerning what is expected by the evaluation team in the review process and deliverables for design documentation. Any examples in this document are not to be construed as the only implementation that will satisfy the TCSEC requirement. The examples are merely suggested implementations. The recommendations in this document are also not to be construed as supplementary requirements to the TCSEC. The TCSEC is the only metric against which systems will be evaluated. This guideline is part of the Technical Guidelines Program to provide helpful guidance on TCSEC issues and the features they address. 1.2 Scope Design Documentation is a TCSEC requirement for classes C1 through A1. It is one of the four types of documentation required by the TCSEC. The other three documentation requirements are for a Trusted Facility Manual (TFM), Security Features Users Guide (SFUG), and Test Plan Documentation. The role of Design Documentation is to identify and describe the Trusted Computing Base (TCB) and its security features. Only Design Documentation for the TCB is required to meet the TCSEC requirements, but it is strongly recommended that design documentation exist for the entire system. Throughout this document, the word system will be used as the object of design documentation to include the TCB and the untrusted portions of the system. However, it should be emphasized that the TCSEC requirements are based solely on the design documentation of the TCB. Design Documentation assists vendors during the system life-cycle by thoroughly defining the policies that the system enforces. It also provides the material by which the evaluator can assess whether, and to what degree, the design intent was carried into the implementation. The design documentation is intended to guide the implementation of the product; it is not intended merely as an abstract philosophical exercise completely divorced from the "real" product. Design documentation also increases the developer's level of understanding of the system. It should facilitate the correct implementation of the intended behavior and features of the system. This guideline will discuss design documentation and its features as they apply to computer systems and products that are being built with the intention of meeting the requirements of the TCSEC. 1.3 Control Objective Each of the TCSEC requirements serves to ensure that one of the three basic control objectives for trusted computing - security policy, accountability, and assurance - are satisfied. Throughout the system life-cycle, design documentation aids in attaining the third objective, assurance, by helping to "substantiate claims for the completeness of access mediation and degree of tamper resistance." [5] The TCSEC gives the following as the Assurance Control Objective: "Systems that are used to process or handle classified or other sensitive information must be designed to guarantee correct and accurate interpretation of the security policy and must not distort the intent of that policy. Assurance must be provided that correct implementation and operation of the policy exists throughout the system's life-cycle."[5] Design documentation plays an important role in providing this life-cycle assurance. It demonstrates that correct implementation and enforcement of the system's security policy exists throughout the system's life-cycle. As it relates to this control objective, design documentation facilitates the efforts of vendors and system developers in modifying and maintaining the system throughout its life-cycle, without compromising the trustworthiness of the system. In addition, design documentation serves as a useful training tool. Design documentation presents a technical history of the system, containing documentation on past changes to the system as well as the current system. It can be used in the training of new systems programmers and hardware engineers to familiarize them with the system. 2. OVERVIEW OF DESIGN DOCUMENTATION PRINCIPLES Design documentation is a requirement for TCSEC classes C1 and above. It provides a means of communicating the design of a system to developers that enables them to comprehend the design principles of the system and to make changes or upgrades to the system without compromising the trustworthiness of the system. The information contained in the design documentation provides a rationale as to why a system is designed as it is and whether changes to the system will alter the intent of the design. Design documentation plays an important role in the life-cycle maintenance of a system and should not be viewed as a burden to system development. This document should help developers understand the importance of design documentation in the life-cycle of computer systems, as well as to the maintenance of trust in these systems. Developers should recognize the importance of meeting the purpose and intent of the TCSEC design documentation requirements as opposed to meeting them in a strictly mechanical fashion. 2.1 Purpose of Design Documentation The primary purpose of design documentation is to define and describe the properties of a system. As it relates to the TCSEC, design documentation provides an explanation of how the security policy of a system is translated into a technical solution through the TCB hardware, software, and firmware. Design documentation explains the system's protection mechanisms so that the effect a change may have on the security of the system can be evaluated prior to a change being performed. It relates the TCSEC requirements to the architecture of a system and guides the implementation of the system under development. Complete documentation ensures that the vendor has an understanding of what elements of the system are protection critical. Design documentation explains the system design to the vendor's development team and enables the developers to understand the design of the system well enough to maintain the system and to perform any necessary changes to it without adversely affecting the trustworthiness of the system. In addition, the design documentation assists the evaluators by providing them with a vehicle by which the completeness and correctness of the implementation can be assessed. 2.2 Design Documentation Development for Evaluation Developers should incorporate the design documentation requirements into the system development process. A plan that addresses each design documentation requirement should be developed early in the development phase and shared with the National Computer Security Center evaluators to ensure the thoroughness of the documentation. 3 Iterative development of the design documentation is the key to minimizing vendor and evaluator efforts during the evaluation process. Vendors should precede their design documentation with the submittal of an outline of the design documentation to the evaluators. This outline should contain, among other things, a statement of purpose and the intended audience of the design documentation. Then, through a process of draft submittal, evaluator comments and requests for additional information, and draft revision the design documentation requirements will be met. This guideline should expedite this process by bringing the vendor's first drafts closer to evaluator expectations and by facilitating convergence between vendor product and evaluator expectations. If vendors establish a dialogue with evaluators early in the design documentation development and solicit their comments on early and subsequent drafts of the design documentation, both vendors and evaluators will save a great deal of time and effort in completing the evaluation process. 2.3 Level of Detail of Design Documentation The level of detail of design documentation will determine its usefulness and adequacy in meeting the TCSEC requirements, as well as its usefulness to the vendor in the development and maintenance of the system. For evaluators, the level of detail of the design documentation is reviewed to ensure that the system developer understands the design of the system well enough to make changes or upgrades to the system without compromising the trustworthiness of the system. Design documentation also ensures that the developer understands the overall security concepts that are required to be part of the system design. How well the security properties of the system are documented, and how this information is integrated into the design documentation will determine whether or not the level of detail of the design documentation is sufficient in meeting the TCSEC requirements. The design documentation shall be detailed enough to serve as a useful tool for vendor maintenance of the system and shall clearly indicate what elements of the design impact the trustworthiness of the system. One purpose behind design documentation is to assist vendors in maintaining the system and should not present a burden to the vendor in terms of quantity or detail. A good rule of thumb is that the level of detail of design documentation should be sufficient to permit an individual with a degree in Computer Science, Electrical Engineering, or the equivalent with knowledge and skills in programming, hardware, or firmware development to understand the system design and be able to design system modifications without adversely affecting trustworthiness of the system. 2.4 Level of Effort for Meeting the Requirements The level of effort necessary for developing satisfactory design documentation has historically been underestimated because the intent and implications of the TCSEC requirements for design documentation have seldom been completely understood. An important factor to consider when deciding on an appropriate level of effort is the importance of the design documentation throughout the system life-cycle. Well structured design documentation that is carefully planned and developed will make it easier to understand the design of the system. 5 The level of effort necessary for a vendor to meet the design documentation requirements varies from system to system. The level of effort generally will depend upon the necessary level of detail, which depends upon the class of evaluation and the complexity of the system being evaluated. The requirements for TCSEC classes C1 and C2 may be met by simply following good engineering documentation practices, but as the TCSEC class level increases, so does the level of detail and effort necessary for meeting the TCSEC requirements. In terms of quantity, the length of design documentation at the higher classes has been found to be roughly comparable in bulk to the source listings of the overall system. In general, producing the design documentation may require several man months to a man year of system development time at Classes C1 and C2, and up to several man years at the higher classes. Although developing design documentation for a system may be time consuming, this time will be amply rewarded by the ease of system maintainability during its life-cycle. 2.5 Format of Design Documentation The format and style for each vendor's design documentation is specific to that vendor, and to suggest a specific format would restrict vendors in developing their design documentation. Although this guideline addresses distinct requirements for design documentation, it should not be assumed that separate documents are necessary to meet each requirement. Indeed, the design documentation shall address each of the requirements, but it is acceptable for evaluators to be pointed to a number of documents to address a specific requirement. Also, graphics serve as a useful adjunct to design documentation, although not sufficient alone to meet the TCSEC requirement for design documentation. Developers may choose to use graphics to describe a system in addition to other design documentation. Differences among computer system architectures, designs, and implementation approaches make developing a standard format for design documentation inadvisable. In addition, the format of design documentation for one system may be totally inappropriate for meeting another system's needs. The format chosen by the vendor for presenting the design documentation may be influenced by business concerns other than expeditious security evaluation. Different design documentation formats present different advantages and challenges to evaluators and different advantages and costs to vendors that should be weighed. A system's design may be evolutionary, resulting from improvements that build upon an initial version. Maintaining documentation on a system in a release/update form may be convenient for a developer. However, it is difficult for new developers and life-cycle personnel to gain an understanding of the overall system architecture from documentation that describes the system in chronological terms through system releases and updates. To be useful, these updates shall be incorporated into the design documentation, and the design documentation shall be presented as a complete description of the system, and not the initial description plus supplemental sections describing changes. 5 3. MEETING THE CRITERIA REQUIREMENTS This section lists the TCSEC requirements for design documentation at each class. All of these requirements have been extracted from the TCSEC design documentation requirements and include explicit and implicit design documentation requirements, where necessary. Each numbered requirement is referenced in the discussions that follow in Sections 6 and 7 of this document. This section serves as a quick reference for TCSEC class requirements. As the TCSEC evaluation class level increases, it is implicitly required that the design documentation be more detailed. This is due to an increase in assurance required at the higher classes, as well as the introduction of new features at the higher classes that need to be documented, for example, labeling, auditing. 3.1 The C1 Design Documentation Requirements?? Requirement 1 - Describe the philosophy of protection. Requirement 2 - Describe how the philosophy of protection is translated into the TCB. Requirement 3 - Describe how the TCB is modularized (if modular). Requirement 4 - Describe all interfaces between the TCB modules (if modular). Requirement 5 - Describe how the TCB protects itself. Requirement 6 - Provide a statement of the system security policy. 3.2 The C2 Design Documentation Requirements No new requirements have been added at the C2 class. 3.3 The B1 Design Documentation Requirements?? Requirement 7 - Provide an informal or a formal description of the security policy model enforced by the TCB. Requirement 8 - Explain the sufficiency of the security policy model to enforce the security policy. Requirement 9 - Identify and describe the TCB protection mechanisms. Requirement 10 - Explain how the TCB mechanisms satisfy the security policy model. 7 3.4 The B2 Design Documentation Requirements Requirement 11 - Describe how the TCB is modularized. Requirement 12 - Describe all of the interfaces between the TCB modules. Requirement 13 - Provide a formal description of the security policy model. Requirement 14 - Prove the sufficiency of the security policy model to enforce the security policy. Requirement 15 - Show that the Descriptive Top Level Specification (DTLS) is an accurate description of the TCB interface. Requirement 16 - Describe how the TCB implements the Reference Monitor Concept. Requirement 17 - Describe why the reference monitor is tamper resistant. Requirement 18 - Describe why the reference monitor cannot be bypassed. Requirement 19 - Describe why the reference monitor is correctly implemented. Requirement 20 - Describe how the TCB is structured to facilitate testing. Requirement 21 - Describe how the TCB is structured to enforce least privilege. Requirement 22 - Present the results and methodology of the covert channel analysis. Requirement 23 - Describe the tradeoffs involved in restricting covert channels. Requirement 24 - Identify all auditable events that may be used in exploitation of known covert storage channels. Requirement 25 - Provide the bandwidths of known covert storage channels whose use is not detectable by auditing mechanisms. 8 3.5 The B3 Design Documentation Requirements Requirement 26 - Identify all auditable events that may be used in exploitation of known covert timing channels. Requirement 27 - Provide the bandwidths of known covert timing channels whose use is not detectable by auditing mechanisms. Requirement 28 - Describe how the system complies with additional B3 system architecture requirements, for example, minimal TCB and layering. Requirement 29 - Informally show consistency of the TCB implementation (in hardware, firmware, and software) with the DTLS. Requirement 30 - Informally show correspondence between elements of the DTLS and elements of the TCB. Requirement 31 - Informally show consistency of the DTLS with the model. 9 3.6 The A1 Design Documentation Requirements Requirement 32 - Informally show consistency of the TCB implementation with the Formal Top Level Specification (FTLS). Requirement 33 - Informally show correspondence between elements of the FTLS and elements of the TCB. Requirement 34 - Clearly describe hardware, software, and firmware internal to the TCB that is not dealt with in the FTLS. Requirement 35 - Informally or formally show consistency of the FTLS with the model. Requirement 36 - Informally show correspondence between the FTLS and the DTLS. 9 4. COMPONENTS OF DESIGN DOCUMENTATION? Design documentation describes why a system is trusted, how this trust is achieved, the mechanisms which provide the trust, and the relevant information that makes proper maintenance of a system possible. Design documentation at TCSEC class C1 lays the foundation for trusted systems by defining the philosophy of protection of a system. As the TCSEC classes increase, the level of detail and the quantity of information contained in the design documentation shall also increase. The following sections discuss design documentation and its role in describing the security policy of the system, the protection mechanisms of the system, and the specific requirements concerning covert channels. 4.1 Documenting The Security Policy The design and development of any trusted system, from TCSEC class C1 to A1, is based upon a philosophy of protection that shall be described in the design documentation (Requirement 1). Design documentation explains and defines the philosophy of protection by describing how a system provides trust. Trust in computer systems is provided by the protection mechanisms contained within the TCB, such as discretionary access controls and identification and authentication mechanisms. These and all of the TCB mechanisms and their functions shall be described in the design documentation. In addition, the system security policy, i.e., what is being accessed by whom or from what, shall also be described in the design documentation (Requirement 6). In order to describe how a system is trustworthy, the design documentation shall describe how the philosophy of protection is translated into the TCB (Requirement 2) and how it is supported by the TCB protection mechanisms. The design documentation shall first define the boundaries of the system and shall describe the parts of the system that are security relevant and the parts that are not. Rationale shall be presented that those portions of the system which are claimed to be outside of the TCB, are really outside. The proper identification of these parts is important to the maintenance of security in the system because it is necessary to know when a change to the system will affect the TCB implementation, and possibly violate the security policy of the system. At the higher TCSEC classes, the description of the philosophy of protection evolves into a more structured description of how a system provides trust. At TCSEC class B1, this philosophy of protection shall be presented as an informal or formal security policy model in the design documentation (Requirement 7). This security policy model shall informally or formally define the subjects, objects, modes of access, and the security properties of the system. In addition, the model shall define the initial state of the system, a secure state of the system, and the way in which the system progresses from one state to the next. An informal security policy model may be presented in a natural language, for example, English. An explanation shall be provided demonstrating that the informal model is sufficient to enforce the security policy (Requirement 8). 11 At TCSEC class B2, a formal security policy model shall exist (Requirement 13). In addition to the B1 requirements, the formal security policy model shall contain: a set of security properties that captures the security policy, an abstract description of the operations performed by the TCB, and a rigorous argument through the use of predicate calculus that the description is consistent - internally consistent, that is, is not self-contradictory. The model shall include a proof that if the initial state of the system satisfies the definition of a "secure" state and if all assumptions of the model are satisfied, then all future states of the system will be secure. A security policy model provides assurance that the system has been designed to enforce the security policy and provides a basis for the TCB implementation. As a means of increasing assurance, the design documentation shall show that the security policy model is sufficient to enforce the security policy of the system (Requirement 8). At TCSEC class B1, it shall be sufficient to show this in a natural language, e.g., English, but at class B2, this sufficiency of the security policy model shall be shown through a formal proof (Requirement 14). The design documentation shall provide a mapping of the security properties to the security policy. This sufficiency shall be demonstrated by describing how all aspects of the security policy are addressed by the security policy model. An example of a formal security policy that enforces the DoD security policy is the Bell-La Padula model [1]. Although the Bell-La Padula security policy model supports the DoD security policy, it is important to realize that this does not mean that the Bell-La Padula model model can be directly used for all systems. The Bell-La Padula model, when used with different systems, will need to be representative of the system. At TCSEC class B2, the TCSEC design specification and verification requirement calls for a descriptive top level specification (DTLS) of the TCB to be maintained to provide documentary evidence of how the formal security policy model is implemented through the TCB interface. The DTLS provides evaluators with a better understanding of the implementation of the reference monitor and provides maintenance personnel with the necessary documentation to correct, modify, or augment the TCB without destroying the TCB's cohesiveness and internal consistency. The description of the TCB should contain a description of the services and functions provided by the TCB and how they are invoked. For example, for UNIX1-based systems, the DTLS may be based upon enhanced manual pages. The manual pages shall include enough information to satisfy the design specification and verification requirement that the TCB be described in "terms of exceptions, error messages, and effects."[5] These individual manual sections should be accompanied by detailed section headers which clearly explain the security concepts and entities referenced within each section. The design documentation shall demonstrate that the DTLS is an accurate description of the TCB interface (Requirement 15). It should do this by accurately and completely describing the DTLS in relation to the TCB interface. The design documentation shall be used to test against the TCB to, "demonstrate that the TCB implementation is consistent with the descriptive top level specification." [5] The design documentation shall describe how the TCB is structured to facilitate this testing (Requirement 20). ------------------------------------ 1 UNIX is a trademark of AT&T Bell Labs 12 At TCSEC class B3, the design documentation shall informally show consistency of the TCB hardware, firmware, and software implementation with the DTLS as well as showing correspondence between elements of the DTLS and elements of the TCB (Requirements 29, 30). The goal of these two requirements is to ensure that the mapping between the TCB and DTLS is complete, easily understandable, unambiguous, and one-to-one between elements of the TCB implementation and elements of the DTLS. The level of detail of this mapping should be sufficient for any inconsistency to be obvious to members of the vendor's development team throughout the system life-cycle. Also at TCSEC class B3, the design documentation shall provide a mapping from the DTLS to the TCB implementation (Requirement 30). This mapping should demonstrate that all elements that were specified were, in fact, implemented, and that any code that appears which is not specified directly merely reflects implementation detail; that there are no new, unspecified, user interfaces implemented. With this mapping, the design documentation shall describe all areas of correspondence between elements of the DTLS and elements of the TCB. For example, the mapping may be pointers in the DTLS description to source code modules of the TCB implementation. The addition of the design specification and verification requirement of a mapping between the DTLS and the formal security policy model completes the evidence from the security policy to implementation. The entities of the model shall be shown to correspond to the elements of the DTLS (Requirement 31). This correspondence provides assurance that the security properties that are proven in the formal model are accurately reflected in the implementation. At TCSEC class A1, the mapping shall be from the formal top level specification (FTLS) to the TCB (Requirements 32, 33). In addition, the mapping to the model shall be from the FTLS (Requirement 35). These changes reflect the introduction of an FTLS requirement in the design specification and verification requirements at A1. The design documentation shall describe how the FTLS accurately represents the TCB interface. The hardware/firmware components of the TCB, such as mapping registers and direct memory access input/output (I/O) components, that are directly or indirectly visible at the TCB interface shall be described in the design documentation. As stated previously, the goal of these requirements is to ensure that the mapping between the elements of the TCB implementation and the FTLS are complete, easily understandable, unambiguous, and one-to-one. Although the TCSEC design documentation requirement changes at class A1 to require a mapping from the FTLS to the TCB, a DTLS is still required for class A1 systems. At TCSEC class A1, the DTLS serves to augment the FTLS by completing the description of the TCB in an informal language and by providing the conceptual glue to the specification of the reference monitor mechanism and the other TCB components. Since there is an explicit requirement at class A1 that both the FTLS and DTLS correspond to the formal security policy model, the DTLS and the FTLS must correspond (Requirement 36). At TCSEC class A1, "the FTLS and DTLS may be two separate documents, or they may be combined into a Complete Top Level Specification (CTLS). In a CTLS, the FTLS and DTLS portions (shall) be separately identifiable. The CTLS (shall) be a complete and accurate description of the TCB, and it (shall) be sufficiently well commented/annotated so that it can be easily understood with little or no knowledge of formal specifications."[8] 13 It is recognized that not all of the TCB internals are able to be specified within the FTLS. For the hardware, firmware, and software internal to the TCB, but not dealt with in the FTLS, the design documentation shall describe them in complete, clear, and careful detail (Requirement 34). 4.2 Documenting TCB Protection Mechanisms?? As part of the description of the philosophy of protection and how it translates into the TCB, the design documentation shall include explanations of the security services offered by the TCB software, hardware, and firmware mechanisms from a system level view (Requirement 2). At TCSEC class C1, the design documentation for these protection mechanisms shall include how the mechanisms protect the TCB from tampering (Requirements 5). The description of why the TCB is tamper resistant is an important requirement for all of the TCSEC classes. This design documentation requirement supports the TCSEC class C1 system architecture requirement which calls for the TCB to maintain a domain that implements the reference monitor concept that, "protects it from external interference or tampering"[5]. The mechanisms described in this section of the design documentation include things such as Discretionary Access Control (DAC) and identification and authentication (I&A) mechanisms. For example, the design documentation shall describe the DAC enforcement mechanism and how it controls discretionary access between named users or groups and named objects within the ADP system. As it relates to identification and authentication, the design documentation shall describe how users are identified to the TCB and the mechanism that authenticates the user's identity. Furthermore, the design documentation shall describe how the TCB protects the authentication data. To ensure that these mechanisms have not failed in any way, hardware and software mechanisms shall exist to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB. These system integrity mechanisms shall also be described in the design documentation. At TCSEC class B1, the design documentation shall identify and provide descriptions of the TCB protection mechanisms (Requirement 9). This documentation is required to provide the additional assurance required at TCSEC class B1. In most cases, these TCB protection mechanisms at TCSEC class B1 may be the same protection mechanisms that were described in TCSEC class C1, but at class B1, the description of these mechanisms shall describe how they support the additional system architecture requirement for process isolation. Process isolation mechanisms that prevent untrusted subjects from directly accessing separate address spaces are introduced at TCSEC class B1 and shall be described in the design documentation. The design documentation shall also show that all of the security services required by the security policy model are provided by the TCB mechanisms (Requirement 10). 14 At TCSEC class B2, the design documentation shall describe how the TCB protection mechanisms implement the reference monitor concept, i.e., is nonbypassable, always invoked, and small enough to be analyzed (Requirement 16). The design documentation requirement should demonstrate how the reference validation mechanism is tamper resistant, cannot be bypassed, is correctly implemented, and is structured to enforce least privilege (Requirements 17, 18, 19, 21). Although a reference monitor has been in place since TCSEC class C1, the system architecture requirements at TCSEC class B2 require that the TCB be protected, "from external interference and tampering," maintain process isolation, and be "internally structured into well defined largely independent modules."[5] These additional requirements shall be reflected in the design documentation. One position for how the reference monitor hardware should be documented is presented in the following paragraphs: "For microprograms (firmware), design documentation is needed for common routines, that is, documentation which fully describes the functionality and what is done to implement that functionality. At the least, a high level view of major operations, e.g., interrupts, I/O instruction interpretations is needed if the microcode is not modular enough to be described in terms of microroutines. For items inside the TCB, but outside of the reference monitor (such as most disk controllers, printers, and other peripherals), the interface must be described, but not the internals. In the case of systems that do not use microcode, convincing arguments must be provided as to what elements of the hardware are security critical and why."[2] The design documentation for the TCB firmware should parallel the documentation that is written for the TCB software, that is, it should fully describe the functionality and what is done to implement the functionality of the security kernel. Assurance needs to be provided that the TCB is protected from modification. At TCSEC class B2, the design documentation shall provide this assurance through a description of why the reference monitor is tamper resistant (Requirement 17). This description shall include the methods and mechanisms by which the TCB protects itself from illicit modification. Any hardware mechanisms used by the TCB to separate protection critical elements from those that are not protection critical shall be described. The mechanisms used by the TCB to help support logically distinct storage objects with separate attributes shall also be described. The mechanisms used to protect against illicit modification may include some of the same mechanisms used to mediate accesses of objects by subjects that were introduced at TCSEC class C1. These mechanisms shall be described again at TCSEC class B2, but in greater detail as to how they apply to the reference validation mechanism. 15 The previous paragraph explained how the design documentation describes protection mechanisms, but more importantly, at TCSEC class B2, the design documentation shall show that all of the TCB software, firmware, and hardware mechanisms have been implemented as described and that the implementation functions correctly (Requirement 19). The design documentation shall justify the correctness of the entire TCB. Also, at TCSEC class B2, the design documentation shall describe how the TCB is structured to enforce least privilege (Requirement 21). This description shall relate to the hardware, firmware, and software modules of the TCB, as well as to the enforcement of least privilege both within the TCB and upon trusted subjects. Least privilege ensures that any TCB module or trusted process has only those privileges and capabilities needed for it to perform the specific function for which it was designed. For example, if the hardware architecture implements protection rings, a description shall be given of the ring mechanisms. This description shall show how access to the innermost ring provides a means of running highly privileged processes, while the outermost ring provides a means of running unprivileged processes. Likewise, the description shall justify placement of functions within the higher privileged rings and the conferring of special privileges to trusted processes. Thus, the hardware is shown as a means of enforcing least privilege. Similarly, firmware and software mechanisms may provide a means of enforcing least privilege. For example, a labeling mechanism may be implemented in software or firmware. Because labels may be used to enforce least privilege, the software or firmware modules enforcing the labeling and label based access control shall be shown as a means of enforcing least privilege. The separation of administrative roles in the system is one more way in which least privilege may be exercised. In this case, the roles of system administrator, security administrator, and/or system auditor may be performed by separate individuals. This is to ensure that the security functions of the system are not able to be performed by a single person. The way these roles are carried out in the system shall be described in the design documentation. At TCSEC class B3, the system architecture requirements call for the TCB to be minimized, i.e., only security relevant functions appear within the TCB. The TCB at this class, "shall incorporate significant use of layering, abstraction, and data hiding," and shall have minimal complexity. The design documentation shall describe how the system complies with these additional architectural requirements in (Requirement 28). As stated previously, as the TCSEC classes increase and the implementation of the reference monitor concept becomes more defined, the amount of design documentation shall also increase. 4.3 Documentation of Covert Channels A portion of the B2 requirements for design documentation addresses covert channels. The results of all covert channel analysis need to be in the design documentation to aid in the design and development of TCB mechanisms. For this reason, the design documentation shall present the results of the covert channel analysis and the methodology used (Requirement 22). The design documentation shall provide an overview of the covert storage channel analysis and testing procedures. It shall document the results of these tests and all of the covert channels identified. All auditable events shall be identified and described for all covert storage channels that are not removed from the system (Requirement 24). 16 When covert channels are identified, actions are sometimes taken to restrict the bandwidth of those channels. The design documentation shall describe and discuss these actions and the resulting degree of covert channel restriction in light of performance degradation, operational utility, or other considerations (Requirement 23). Processing delays resulting from reducing the number and bandwidth of covert channels shall be identified and characterized. The design documentation shall also note whether the exploitation of known covert channels is auditable. There will be some covert storage channels whose use will not be detectable by auditing mechanisms. The design documentation shall document the worst case and expected case bandwidths of these storage channels whose exploitation is not auditable (Requirement 25). At TCSEC class B3, the design documentation shall recognize the introduction of covert timing channels into the requirements and shall consider them in all covert channel related descriptions as stated above (Requirements 26, 27). The covert timing channel analysis and testing procedures, and the results obtained from the tests shall be described in the design documentation. Additionally at TCSEC class A1, formal methods shall be used in the covert channel analysis and shall be described in the design documentation. 19 5. OTHER TOPICS? 5.1 Modularity An important architectural feature of trusted systems for TCSEC class B2 and above is that the TCB be modular. The modularity of the TCB is important for ease of understanding, ease of analysis, and ease of maintenance. Modularity ensures that interfaces are well defined and errors are contained. It also provides a basis for enforcing least privilege. The content of hardware and software modules should be selected based on the following criteria: a module performs exactly one well defined action, a module has a well defined interface, a module interacts with other modules only in well defined ways, and a module is called upon to perform a function whenever that function is required. Although TCB modularity is not a requirement until class B2 (Requirements 11, 12), it is possible that vendors would want to build systems with modular TCBs at the lower classes. Regardless of class, if the TCB is modular, the design documentation shall describe how the TCB is modular and the interfaces between the TCB modules (Requirement 3, 4). As with all design documentation, the level of detail shall permit the description of the interfaces between the modules to be a useful description. Specifically, the design documentation shall include identification of the TCB hardware, software, and firmware modules, why the modules are considered as such, the interfaces between them, and the implementation of the modules. A mapping of the security services and mechanisms to the modules should also be described. The level of detail of the design documentation increases the amount of assurance to be gained by the developers and evaluators. The description of the interfaces between the modules, whether hardware, firmware, or software, shall describe the types and sources of information passing between them (Requirement 4). In addition, the interfaces between these TCB modules and other system modules external to the TCB shall be described. This description is necessary to show that no breach of security can occur through the interfaces. In some cases, software modules may depend upon hardware or firmware modules to perform correctly and these dependencies should also be included in the design documentation. 5.2 Hardware Design Documentation Hardware design documentation for a system shall be provided at all levels of trust. Specifically, at TCSEC classes B2 and above, it is felt that the hardware design documentation is critical to the security of a system. At this class, systems "shall make effective use of available hardware to separate those elements that are protection critical from those that are not."[5] To meet this TCSEC requirement, developers should know the hardware base they are building on top of. Also, evaluators will need the hardware design documentation in order to evaluate that the vendor is making "effective use" of the hardware. 19 The hardware design documentation includes descriptive information about the system's Central Processing Unit(s) (CPU), Memory Management Unit(s) (MMU), and all other additional processors, for example, I/O Processors, channel devices. The hardware design documentation is intended to discuss what the hardware is meant to do, but does not need to include details of implementation, such as the flow of control to perform a specific action. The hardware design documentation for every logical module in the hardware base should include a functional name, functional description, and a functional interface of that module. The hardware design documentation defines the hardware portion of the TCB interface. The information on the hardware interface is important to correctly develop TCB routines and device drivers. Additionally, the hardware design documentation provides sufficient information that the TCB meets the System Architecture requirements of the TCSEC. The information contained in the hardware design documentation shall be complete, specifying all possible interfaces to the system hardware, including the user-to-hardware interface as well as the TCB software-to-hardware interface. The hardware design documentation should include unprivileged instructions, privileged instructions, unpublished instructions, and all CPU-to-MMU, CPU-to-Channel, CPU-to-I/O bus, and additional processor interactions. Also, the software interface visible registers that exist on the CPU, MMU, and other processors shall be described in the hardware design documentation. The design documentation for some hardware modules may require internal detail down to a bit level functional description of the module. The modules that fall into this category are those that make up the reference monitor, such as the address translation module, process isolation support module, fault handling module, I/O control module, and the diagnostic module. These hardware modules of the reference monitor directly support security and will require an explanation of why the reference monitor is "tamper resistant, cannot be bypassed, and is correctly implemented."[5] 5.3 Configuration Management The design documentation for the system shall be under configuration management for the entire life-cycle of the system. Design documentation is only useful if it is complete and accurate. This means that any change to the system should also result in a change to the design documentation for the system. The design documentation for a system should be treated as a configuration item for the system and should be subject to the identification, control, accounting, and audit functions of configuration management. "Initial phases of configuration control are directed towards control of the system configuration as defined primarily in design documents. Often a change to one area of a system may necessitate a change to another area. It is not acceptable to only write documentation for new code or newly modified code, but rather documentation for all parts of the TCB that were affected by the addition or change shall be updated accordingly. Although documentation may be available, unless it is kept under configuration management and updated properly it will be of little, if any use. In the event that the system is found to be deficient in documentation, efforts should be made to create new documentation for areas of the system where it is presently inadequate or nonexistent."[7] 20 The TCSEC requirements for configuration management do not begin until TCSEC class B2, but this should not mean that the design documentation for TCSEC class C1 to B1 systems not be under some type of control. At these lower classes, the control process for the design documentation may be less formal than that required by the configuration management requirements, but it should still provide assurance that the design documentation accurately describes the current system. The National Computer Security Center has recently developed the Ratings Maintenance Program (RAMP) which requires configuration management at these lower classes of trust. "By training vendor personnel to recognize which changes may adversely affect the implementation of the security policy of the system, and to track these changes to the evaluated product through the use of configuration management, RAMP will permit a vendor to maintain the rating of the evaluated product without having to reevaluate the new version." [7] For further information about the RAMP program and about the configuration management requirements for RAMP, contact: National Computer Security Center 9800 Savage Road Fort George G. Meade, MD 20755 6000 Attention: C12 23 6. SUMMARY OF DESIGN DOCUMENTATION Design documentation is responsible for describing systems at all levels of trust. During the life-cycle of a system, it describes the system to facilitate changes and maintenance of the system. As it relates to the security of a system, design documentation provides assurance by describing how a system provides trust and shows that all of the protection mechanisms of a system are correctly implemented and sufficiently provide the needed trust. At the lower classes, design documentation begins to describe how security is provided in a system by stating the philosophy of protection of the system. At TCSEC class B1, the design documentation describes the security policy model of a system, and at TCSEC class B2 the security policy model is required to be formal. Many of the other requirements in the TCSEC are related to design documentation. Design documentation shall describe how these requirements are satisfied. Covert channels are specifically addressed in the design documentation requirement. The assurance provided by design documentation is dependent upon its thoroughness and accuracy. When design documentation is written, the role that it plays in the system life-cycle should be kept in mind. A new employee should be able to look at the design documentation and get an understanding of what the current system is and how it works. The key word in design documentation is current. When a system changes, the design documentation shall change accordingly. By accurately describing a system, design documentation provides assurance that there is an understanding of how and why the system provides trust. In addition, it provides information that will enable developers to analyze changes to the system to ensure that they do not adversely affect the trustworthiness of the system. APPENDIX B EXCERPTS FROM FINAL EVALUATION REPORTS This appendix reproduces excerpts from Final Evaluation Reports for products currently on the Evaluated Products List. The excerpts are reproduced from the "Applicable Features" portion of the section describing how the product met the requirements for Design Documentation. The Final Evaluation Reports are available from the National Computer Security Center. However, most of the vendor documents mentioned in this appendix contain proprietary information, and therefore are not publicly available. Please do not request copies of the vendor documents from the National Computer Security Center. B.1 CLASS C2 B.1.1 UTX/32S [6] The following documents were provided to the evaluation team in fulfillment of the Design Documentation criterion: "Security Policy Model" "Program Maintenance Manual UTX/32S, Release 1.0 (DRAFT)". "System Calls" and "Maintenance" in the "System Administrator's Reference Manual". "4.2BSD and UTX-32 Differences Study for Gould UTX/32S" "Memory Management for Gould UTX/32S" "Object Reuse Study for Gould UTX/32S" The "Gould UTX/32S 1.0 Security Policy Model" describes Gould's philosophy of protection and explains how this philosophy is translated into the TCB. It identifies all elements comprising the TCB, including the kernel, programs, data files, and processes. Subjects and objects are identified, and the mediation of accesses between them is described. A mapping from the TCB to the security philosophy is provided, and the discretionary access control, identification and authentication, and audit features and mechanisms are described. Additionally, the document discusses the role of secure sockets in interprocess communications. The "Gould UTX/32S 1.0 Security Policy Model" identifies all programs comprising the TCB. The kernel interface is described by the "System Calls" section of the "System Administrator's Reference Manual". The "Maintenance" section of the reference manual comprises manual pages useful for systems programmers in maintaining UTX/32S. "4.2BSD and UTX-32 Differences Study for Gould UTX/32S" describes differences between 4.2BSD UNIX and Gould UTX/32 1.2. Using "4.2BSD and 4.3BSD as Examples of the UNIX System," by J.S. Quarterman, A. Silberschatz, and J.L. Peterson (Computing Surveys, Vol. 17, No. 4, December 1985, pp. 379-418), as a baseline, the document identifies all instances where Gould UTX/32 differs from the described UNIX system. 29 The "UTX/32S Program Maintenance Manual" describes code modifications made to UTX/32 to meet the requirements of the "Gould UTX/32S 1.0 Security Policy Model". The document includes an overview of the mechanisms implemented in UTX/32S to strengthen security and to correct problems found in UTX/32 and other UNIX systems, and detailed descriptions for: the implementation of trusted servers to replace the functionality of the eliminated setuid and setgid bits; kernel modifications; auditing mechanisms; and additions, deletions, and modifications to utilities and libraries. Each module description includes an overview, a functional specification, and a design specification. Pointers to source code, which Gould made available to the evaluation team are provided. Security critical features of the Gould PowerNode hardware used by UTX/32S are described in "UTX/32S Traps and Interrupts and Memory Management for Gould UTX/32S." "UTX/32S Traps and Interrupts" describes how UTX/32S makes use of the trap and interrupt facilities to interface with the hardware and process environments. "Memory Management for Gould UTX/32S" describes how UTX/32S uses the memory management facilities of the PowerNode hardware to provide the process environment. Both documents include applicable material from "Gould SS 6 (Virtual Mode), V6, and V9 Central Processing Unit Reference Manual". "Object Reuse Study for Gould UTX/32S" provides details regarding how UTX/32S hardware and software manage system objects. This study identifies the system resources which can be allocated and deallocated, and details the strategies used to ensure that one process cannot gain access to the resources or data previously allocated to another process. This study, along with "Memory Management for Gould UTX/32S", provides a good description of UTX/32S design features which are used to meet the Object Reuse criterion. B.2 CLASS B2 B.2.1 Multics [3] The following documents satisfy the Design Documentation requirement: Applicable Features The "Computer Security Model: Unified Exposition and MULTICS Interpretation" provides a description of Honeywell's philosophy for protection and how this is translated into the TCB. The security model enforced by the TCB is the Bell-La Padula model. Multics has a set of Multics Design Documents (MDDs) that describe the TCB. (These documents are Honeywell Internal Documentation and are available only through the vendor by request. Honeywell reserves the right to deny such requests.) The MDDs are organized by major TCB service or function. These design documents describe the interfaces between TCB modules, how the TCB implements the reference monitor, and how the TCB is structured to facilitate testing and enforce least privilege. These documents coupled with the Honeywell produced "Multics Interpretation," referenced in the previous paragraph identify the security protection mechanisms and explain how they satisfy the model. 30 The DTLS is an accurate description of the TCB interface. The "Covert Channel Analysis" describes all identified covert channels, how they can and cannot be restricted, how they are audited, and their bandwidths. B.3 CLASS A1 B.3.1 SCOMP [4] The following documents satisfy the Design Documentation requirement: The manufacturer's philosophy of protection is documented in "SCOMP: A Solution to the Multilevel Security Problem" and its translation into the TCB given in "SCOMP Trusted Computing Base." The interfaces between the TCB modules are described in the several Part II specifications, "Detail Specification for SCOMP Kernel Part I, Release 2.1" "Detail Specification for SCOMP Kernel Part II, Release 2.1" A formal description of the security policy model (Bell-La Padula) that is enforced by the TCB is given in "Secure Computer Systems", for the general case and Multics in particular in "Computer Security Model: Unified Exposition and MULTICS Interpretation". The Bell-La Padula Model has been accepted by the National Computer Security Center to model security policy "Security Requirements for Automatic Data Processing Systems" and to be consistent with its axioms. An interpretation of the model for the SCOMP system is given in "SCOMP Interpretation of the Bell-La Padula Model." The specific TCB protection mechanisms are 1) protection rings, 2) SPM mediation of per user virtual memory, 3) minimum privilege for each TCB function, 4) integrity levels for users, operators, administrators, and security administrators, 5) individual trusted software processes for separate functions, and 6) ring gates and checks on parameter passing. The Part II Specifications previously referenced provide the necessary documentation for satisfaction of this requirement. The explanation given to show that the TCB protection mechanisms satisfy the model appears in "SCOMP Interpretation of the Bell-La Padula Model." Section 3 of "SCOMP Trusted Computing Base" describes the SCOMP TCB reference monitor implementation. An analysis of the Reference Monitor appears in Appendix C and concludes that the informal proofs that the SCOMP system implements the reference monitor concept are adequate. 31 The TCB implementation was shown to be consistent with the FTLS by specification to source code mappings "FTLS to Code Mapping for the SCOMP Kernel Software" "FTLS to Code Mapping for SCOMP Trusted Software" "Justification for Unspecified Code for the SCOMP Kernel Software, Release 2.1" "Justification for Unspecified Code for SCOMP Trusted Software" TCB testing is documented in: "SCOMP Kernel Test Procedures" "SCOMP Kernel Functional Test Summary" "Kernel Software Test Report for the SCOMP, Release 2.1" "Trusted Software Test Plan for the SCOMP" "Trusted Software Test Report for the SCOMP, STOP Release 2.0" "Trusted Software Test Report for the SCOMP, Appendix A:Test Programs, Appendix B: Test Results" "SCOMP Test and Verification Software Description, Rev. 3" The TCB structure provided added assurance of the validity of the testing and helped to demonstrate the implementation of least privilege. The results of the covert channel analysis including conservative bandwidth estimates are presented in "Covert Channels in the SCOMP Kernel" and "Flow and Covert Channel Analysis for SCOMP Trusted Software, Release 2.1." 61 Auditable events, identified in Section 13 of "SCOMP Trusted Facility Manual, STOP Release 2.1", and the scheme of randomly selected delays on exception returns appear to satisfactorily limit the utility of the identified covert channels. Finally, the internal TCB mechanisms that are not security related and hence not dealt with in the FTLS are described in the commercial Honeywell Level 6 documentation ("Honeywell Level 6 Minicomputer Systems Handbook, CC71" and "Honeywell Level 6 Communications Handbook, AT97-02D"), and the SCOMP system unique specifications: "Detail Specification for SCOMP Kernel Part I, Release 2.1" "Detail Specification for SCOMP Kernel Part II, Release 2.1". 32 GLOSSARY Access A specific type of interaction between a subject and an object that results in the flow of information from one to the other.[9] Access Attribute Characteristic of an access of an object that specifies possible results of the access. Four example access attributes follow: execute (processing based upon the object accessed, but neither altering nor viewing capability); read (viewing but not altering capability); append (altering but not viewing capability); and write (both altering and viewing capabilities).[1] Audit Trail A chronological record of system activities that is sufficient to enable the reconstruction, reviewing, and examination of the sequence of environments and activities surrounding or leading to an operation, a procedure, or an event transaction from its inception to final results.[9] Covert Channel A communication channel that allows two cooperating processes to transfer information in a manner that violates the system's security policy. Also called confinement channel.[9] Covert Storage Channel A covert channel that involves the direct or indirect writing of a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a finite resource (e.g., sectors on a disk) that is shared by two subjects at different security levels.[5] Covert Timing Channel A covert channel in which one process signals information to another by modulating its own use of system resources (e.g., CPU time) in such a way that this manipulation affects the real response time observed by the second process.[5] Descriptive Top Level Specification (DTLS) A top level specification that is written in a natural language (e.g., English), an informal program design notation, or a combination of the two.[5] 33 Formal Security Policy Model A mathematically precise statement of a security policy. To be adequately precise, such a model must represent the initial state of a system, the way in which the system progresses from one state to another, and a definition of a "secure" state of the system. To be acceptable as a basis for a TCB, the model must be supported by a formal proof that if the initial state of the system satisfies the definition of a "secure" state and if all assumptions required by the model hold, then all future states of the system will be secure. Some formal modeling techniques include: state transition models, temporal logic models, denotational semantics models, algebraic specification models. An example is the model described by Bell-La Padula.[9] Formal Top Level Specification (FTLS) A top level specification that is written in a formal mathematical language to allow theorems showing the correspondence of the system specification to its formal requirements to be hypothesized and formally proven.[9] Least Privilege This principle requires that each subject in a system be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.[9] Object A passive entity that contains or receives information. Access to an object potentially implies access to the information it contains. Examples of objects are: records, blocks, pages, segments, files, directories, directory trees, and programs, as well as bits, bytes, words, fields, processors, video displays, keyboards, clocks, printers, and network nodes.[9] Reference Monitor Concept An access control concept that refers to an abstract machine that mediates all accesses to objects by subjects.[9] Security Kernel The hardware, firmware, and software elements of the Trusted Computing Base that implement the reference monitor concept. It must mediate all accesses, be protected from modification, and be verifiable as correct.[9] Security Level The combination of hierarchical classification and a set of nonhierarchical categories that represents the sensitivity of information.[9] Security Mechanism A system or means of implementing a security service within a system. 34 Security Policy The set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information.[9] Security Policy Model A formal presentation of the security policy enforced by the system. It must identify the set of rules and practices that regulate how a system manages, protects, and distributes sensitive information.[9] Security Service A system or method of providing a security relevant feature in the system. Sensitivity Label A piece of information that represents the security level of an object. Sensitivity labels are used by the TCB as the basis for mandatory access control decisions.[9] Subject An active entity, generally in the form of a person, process, or device that causes information to flow among objects or changes the system state. Technically, a process/domain pair.[9] Trusted Computing Base (TCB) The totality of protection mechanisms within a computer system -- including hardware, firmware, and software -- the combination of which is responsible for enforcing a security policy. It creates a basic protection environment and provides additional user services required for a trusted computer system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the Trusted Computing Base and on the correct input by system administrative personnel of parameters (e.g., a user's clearance level) related to the security policy.[9] 36 REFERENCES 1. Bell, D.E., and L.J. La Padula, "Secure Computer System: Unified Exposition and Multics Interpretation," MTR-2997, Mitre Corp., Bedford, MA, July 1975. 2. Gabriele, Mark D., Excerpts from the Criteria Discussions Forum on the Dockmaster computer system at the National Computer Security Center, Forum entry #0680, Hardware Design Documentation at B2 and Above, May 9, 1987. 3. National Computer Security Center, Final Evaluation Report of Honeywell Multics MR11.0, CSC-EPL-85/003, June 1, 1986. 4. Department of Defense Computer Security Center, Final Evaluation of SCOMP, Secure Communications Processor, STOP Release 2.1, CSC-EPL-85/001, September 23, 1985. 5. Department of Defense Standard, Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28- STD, December 1985. 6. National Computer Security Center, Final Evaluation Report of Gould, Inc., Computer Systems Division, UTX/32S, Release 1.0, CSC-EPL-86/007, December 31, 1986. 7. National Computer Security Center, A Guide to Understanding Configuration Management in Trusted Systems, NCSC-TG-006, March 28, 1988. 8. National Computer Security Center, Criterion Interpretation, Report No. C1-CI-01-87, 1987. 9. National Computer Security Center, Glossary of Computer Security Terms, NCSC-TG-004-88, October 1988.