Name |
Description |
Download |
5200.28-STD - Orange Book |
DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). |
|
|
|
|
CSC-STD-002-85 - Green Book |
DoD Password Management Guideline, 12 April 1985. |
|
|
|
|
CSC-STD-003-85 - Light Yellow Book |
Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985 |
|
|
|
|
CSC-STD-004-85 - Yellow Book |
Technical Rational Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985. |
|
|
|
|
N-C-1-87 - NTISSAM COMPUSEC/1-87 |
Advisory Memorandum on Office Automation Security Guidelines |
|
|
|
|
NCSC-TG-001-2 - Tan Book |
Guide to Understanding Audit in Trusted Systems 1 June 1988, Version 2. |
|
|
|
|
NCSC-TG-002 - Bright Blue Book |
Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. |
|
|
|
|
NCSC-TG-003 - Neon Orange Book |
A Guide to Understanding Discretionary Access Control in Trusted Systems, 30 September 1987. |
|
|
|
|
NCSC-TG-004 - Teal Green Book |
Glossary of Computer Security Terms, 21 October 1988. |
|
|
|
|
NCSC-TG-005 - Red Book |
Trusted Network Interpretation of the TCSEC (TNI), 31 July 1987. |
|
|
|
|
NCSC-TG-006 - Amber Book |
A Guide to Understanding Configuration Management in Trusted Systems, 28 March 1988. |
|
|
|
|
NCSC-TG-007 - Burgundy Book |
A Guide to Understanding Design Documentation in Trusted Systems, 6 October 1988. |
|
|
|
|
NCSC-TG-008 - Dark Lavender Book |
A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. |
|
|
|
|
NCSC-TG-009 - Venice Blue Book |
Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. |
|
|
|
|
NCSC-TG-010 - Aqua Book |
A Guide to Understanding Security Modeling in Trusted Systems, October 1992. |
|
|
|
|
NCSC-TG-011 - Red Book |
Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. |
|
|
|
|
NCSC-TG-013.2 - Pink Book |
RAMP Program Document, 1 March 1995, Version 2 |
|
|
|
|
NCSC-TG-014 - Purple Book |
Guidelines for Formal Verification Systems, 1 April 1989. |
|
|
|
|
NCSC-TG-015 - Brown Book |
A Guide to Understanding Trusted Facility Management, 18 October 1989 |
|
|
|
|
NCSC-TG-016 - Yellow-Green Book |
Guidelines for Writing Trusted Facility Manuals, October 1992. |
|
|
|
|
NCSC-TG-017 - Light Blue Book |
A Guide to Understanding Identification and Authentication in Trusted Systems, September 1991. |
|
|
|
|
NCSC-TG-018 - Light Blue Book |
A Guide to Understanding Object Reuse in Trusted Systems, July 1992. |
|
|
|
|
NCSC-TG-019.2 - Blue Book |
Trusted Product Evaluation Questionaire, 2 May 1992, Version 2. |
|
|
|
|
NCSC-TG-020-A - Silver Book |
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. |
|
|
|
|
NCSC-TG-021 - Purple Book |
Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991.
|
|
|
|
|
NCSC-TG-022 - Yellow Book |
A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991.
|
|
|
|
|
NCSC-TG-023 - Bright Orange Book |
A Guide to Understanding Security Testing and Test Documentation in Trusted Systems |
|
|
|
|
NCSC-TG-024-1 - Purple Book |
A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. |
|
|
|
|
NCSC-TG-024-2 - Purple Book |
A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. |
|
|
|
|
NCSC-TG-024-3 - Purple Book |
A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. |
|
|
|
|
NCSC-TG-024-4 - Purple Book |
A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors |
|
|
|
|
NCSC-TG-025.2 - Forest Green Book |
A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). |
|
|
|
|
NCSC-TG-026 - Hot Peach Book |
A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. |
|
|
|
|
NCSC-TG-027 - Turquoise Book |
A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. |
|
|
|
|
NCSC-TG-028 - Violet Book |
Assessing Controlled Access Protection, 25 May 1992. |
|
|
|
|
NCSC-TG-029 - Blue Book |
Introduction to Certification and Accreditation Concepts, January 1994. |
|
|
|
|
NCSC-TG-030 - Light Pink Book |
A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. |
|
|
|
|