Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.The level of the security documentation depends on whether the product is on the EPL (or under evaluation) or simply being acquired without prior EPL status as a requirement. Whether or not the product is on the EPL, generic user manualsanbsp;...
|Title||:||A Guide to Procurement of Trusted Systems|
|Publisher||:||DIANE Publishing - 1994-06-01|