What’s In a PP
Organizational Security Policies
Threats to Security
- Threats Addressed by the TOE
- An unauthorized person may gain logical access to TOE
- Lack of audit trail
- Undetected penetration attempts
- Threats to be Addressed by Operating Environment
- Hostile system administrator
- Sophisticated attacks on higher-level protocols
Functional Security Requirements and Assurance