What’s In a PP
Security Environment Defined
- The TOE will be used in environments in which no higher than sensitive but unclassified information is processed, or the sensitivity level of information in both the internal and external networks is the same. Firewalls compliant provide access control policies, extensive auditing and a low level of assurance.
Secure Usage Assumptions
- Connectivity Assumptions
- Physical Assumptions
- Control of physical access
- Personnel Assumptions
- Trustworthy Administrator