99:
37:
169:
states of NCSC-TG-021 that he "can't even begin to describe the color of cover" and that some of the books in this series have "hideously colored covers." He then goes on to describe how to receive a copy of them, saying "Don't tell them I sent you."
211:
1240:
629:
604:
1225:
1293:
904:
59:
654:
507:
1054:
1271:
979:
954:
929:
804:
457:
127:
85:
1104:
1129:
532:
854:
754:
729:
704:
557:
143:
67:
63:
47:
123:
835:
Trusted UNIX Working Group (TRUSIX) Rationale for
Selecting Access Control List Features for the UNIX (R) System
1277:
879:
810:
Trusted UNIX Working Group (TRUSIX) Rationale for
Selecting Access Control List Features for the UNIX System
25:
1247:
985:
Procurement of
Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description
935:
Procurement of
Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements
282:
257:
232:
204:
1221:
779:
679:
482:
432:
407:
382:
357:
332:
307:
115:
151:
142:. In some cases, U.S. government entities (as well as private firms) would require formal
98:
1213:
1160:
1032:
166:
139:
1085:
Information System
Security Officer Responsibilities for Automated Information Systems
960:
Procurement of
Trusted Systems: Language for RFP Specifications and Statements of Work
1287:
119:
21:
150:
criteria. Many of these standards have influenced, and have been superseded by, the
17:
147:
1025:
829:
1154:
1079:
1008:
Procurement of
Trusted Systems: How to Evaluate a Bidder's Proposal Document
157:
The books have nicknames based on the color of its cover. For example, the
1201:
288:
Technical
Rationale Behind CSC-STD-003-85: Computer Security Requirements
122:
government in the 1980s and 1990s. They were originally published by the
102:
A complete set of the US DoD Rainbow Series computer security documents
1267:
860:
Trusted
Database Management System Interpretation of the TCSEC (TDI)
66:
external links, and converting useful links where appropriate into
158:
97:
488:
463:
A Guide to Understanding Design Documentation in Trusted Systems
1060:
Writing the Security Features User's Guide for Trusted Systems
30:
538:
A Guide to Understanding Security Modeling in Trusted Systems
563:
Trusted Network Interpretation Environments Guideline (TNI)
161:
was referred to as "The Orange Book." In the book entitled
146:
of computer technology using this process as part of their
910:
Security Testing and Test Documentation in Trusted Systems
1196:
Steve Lipner, "The Birth and Death of the Orange Book"
513:
Computer Security Subsystem Interpretation of the TCSEC
55:
50:
may not follow Knowledge (XXG)'s policies or guidelines
138:
These standards describe a process of evaluation for
735:
Identification and Authentication in Trusted Systems
263:
Guidance for Applying TCSEC in Specific Environments
196:
1220:(2nd ed.), New York, NY: John Wiley and Sons,
685:Guide to Understanding Trusted Facility Management
586:Trusted Database Management System Interpretation
313:A Guide to Understanding Audit in Trusted Systems
24:. For pre-Internet communications protocols, see
710:Guidelines for Writing Trusted Facility Manuals
363:Discretionary Access Control in Trusted Systems
8:
438:Configuration Management in Trusted Systems
338:Trusted Product Security Evaluation Program
212:Trusted Computer System Evaluation Criteria
159:Trusted Computer System Evaluation Criteria
660:Guidelines for Formal Verification Systems
177:
126:Computer Security Center, and then by the
118:standards and guidelines published by the
86:Learn how and when to remove this message
1135:Certification and Accreditation Concepts
785:Trusted Product Evaluation Questionnaire
191:
186:
183:
1198:IEEE Annals of the History of Computing
1189:
1110:Assessing Controlled Access Protection
1280:from Archive of Information Assurance
174:Most significant Rainbow Series books
7:
1246:. DoD. July 31, 2000. Archived from
885:Trusted Recovery in Trusted Systems
388:Glossary of Computer Security Terms
14:
1272:Federation of American Scientists
1035:in Automated Information Systems.
238:DoD Password Management Guideline
128:National Computer Security Center
35:
760:Object Reuse in Trusted Systems
635:RAMP Program Document version 2
413:Trusted Network Interpretation
1:
1241:"DITSCAP Application Manual"
1171:
1166:
1143:
1138:
1118:
1113:
1093:
1088:
1068:
1063:
1043:
1038:
1014:
1011:
993:
988:
968:
963:
943:
938:
918:
913:
893:
888:
868:
863:
843:
838:
818:
813:
793:
788:
768:
763:
743:
738:
718:
713:
693:
688:
668:
663:
643:
638:
618:
613:
594:
589:
571:
566:
546:
541:
521:
516:
496:
491:
471:
466:
446:
441:
421:
416:
396:
391:
371:
366:
346:
341:
321:
316:
296:
291:
271:
266:
246:
241:
221:
216:
1294:Computer security standards
1163:Analysis of Trusted Systems
1310:
1200:37 no. 2 (2015): 19-31 at
124:U.S. Department of Defense
15:
110:(sometimes known as the
1274:, with more explanation
1031:Guide to Understanding
26:Coloured Book protocols
103:
20:standards series, see
1004:NCSC-TG-024 Vol. 4/4
610:RAMP Program Document
101:
1218:Applied Cryptography
980:NCSC-TG-024 Vol. 3/4
955:NCSC-TG-024 Vol. 2/4
930:NCSC-TG-024 Vol. 1/4
179:NIST Rainbow Series
163:Applied Cryptography
56:improve this article
180:
68:footnote references
518:September 16, 1988
368:September 30, 1987
178:
165:, security expert
104:
1227:978-0-471-11709-4
1181:
1180:
990:February 28, 1994
890:December 30, 1991
493:December 15, 1988
116:computer security
114:) is a series of
96:
95:
88:
1301:
1255:
1254:
1253:on Aug 30, 2004.
1252:
1245:
1237:
1231:
1230:
1210:
1204:
1194:
1177:
1169:
1149:
1141:
1124:
1116:
1099:
1091:
1074:
1066:
1049:
1041:
1020:
1012:Publication TBA
999:
991:
974:
966:
949:
941:
924:
916:
899:
891:
874:
866:
849:
841:
824:
816:
799:
791:
774:
766:
749:
741:
724:
716:
699:
691:
690:October 18, 1989
674:
666:
649:
641:
624:
616:
599:
592:
577:
569:
552:
544:
527:
519:
502:
494:
477:
469:
452:
444:
427:
419:
402:
394:
393:October 21, 1988
377:
369:
352:
344:
327:
319:
302:
294:
277:
269:
252:
244:
227:
219:
181:
91:
84:
80:
77:
71:
39:
38:
31:
1309:
1308:
1304:
1303:
1302:
1300:
1299:
1298:
1284:
1283:
1264:
1259:
1258:
1250:
1243:
1239:
1238:
1234:
1228:
1214:Schneier, Bruce
1212:
1211:
1207:
1195:
1191:
1186:
1175:
1167:
1147:
1139:
1122:
1114:
1097:
1089:
1072:
1064:
1047:
1039:
1018:
997:
989:
972:
964:
947:
939:
922:
914:
897:
889:
872:
864:
847:
840:August 18, 1989
839:
822:
814:
797:
789:
772:
764:
747:
739:
722:
714:
697:
689:
672:
664:
647:
639:
622:
614:
597:
590:
575:
567:
550:
542:
525:
517:
500:
492:
475:
468:October 6, 1988
467:
450:
442:
425:
417:
400:
392:
375:
367:
350:
342:
325:
317:
300:
292:
275:
267:
250:
242:
225:
218:August 15, 1983
217:
176:
152:Common Criteria
140:trusted systems
136:
92:
81:
75:
72:
53:
44:This article's
40:
36:
29:
12:
11:
5:
1307:
1305:
1297:
1296:
1286:
1285:
1282:
1281:
1278:Rainbow Series
1275:
1268:Rainbow Series
1263:
1262:External links
1260:
1257:
1256:
1232:
1226:
1205:
1188:
1187:
1185:
1182:
1179:
1178:
1173:
1170:
1165:
1161:Covert Channel
1157:
1151:
1150:
1145:
1142:
1137:
1132:
1126:
1125:
1120:
1117:
1112:
1107:
1101:
1100:
1095:
1092:
1087:
1082:
1076:
1075:
1070:
1067:
1065:September 1991
1062:
1057:
1051:
1050:
1045:
1042:
1040:September 1991
1037:
1033:Data Remanence
1028:
1022:
1021:
1016:
1013:
1010:
1005:
1001:
1000:
995:
992:
987:
982:
976:
975:
970:
967:
962:
957:
951:
950:
945:
942:
937:
932:
926:
925:
920:
919:Bright Orange
917:
912:
907:
901:
900:
895:
892:
887:
882:
876:
875:
870:
867:
862:
857:
851:
850:
845:
842:
837:
832:
826:
825:
820:
817:
812:
807:
801:
800:
795:
792:
787:
782:
776:
775:
770:
767:
762:
757:
751:
750:
745:
742:
740:September 1991
737:
732:
726:
725:
720:
717:
712:
707:
701:
700:
695:
692:
687:
682:
676:
675:
670:
667:
662:
657:
651:
650:
645:
642:
637:
632:
630:NCSC-TG-013 V2
626:
625:
620:
617:
612:
607:
601:
600:
595:
593:
588:
583:
579:
578:
573:
570:
568:August 1, 1990
565:
560:
554:
553:
548:
545:
540:
535:
529:
528:
523:
520:
515:
510:
504:
503:
498:
497:Dark Lavender
495:
490:
485:
479:
478:
473:
470:
465:
460:
454:
453:
448:
445:
443:March 28, 1988
440:
435:
429:
428:
423:
420:
415:
410:
404:
403:
398:
395:
390:
385:
379:
378:
373:
370:
365:
360:
354:
353:
348:
345:
340:
335:
329:
328:
323:
320:
315:
310:
304:
303:
298:
295:
290:
285:
283:CSC-STD-004-85
279:
278:
273:
270:
265:
260:
258:CSC-STD-003-85
254:
253:
248:
245:
243:April 12, 1985
240:
235:
233:CSC-STD-002-85
229:
228:
223:
220:
215:
207:
201:
200:
195:
190:
185:
175:
172:
167:Bruce Schneier
135:
132:
108:Rainbow Series
94:
93:
48:external links
43:
41:
34:
13:
10:
9:
6:
4:
3:
2:
1306:
1295:
1292:
1291:
1289:
1279:
1276:
1273:
1269:
1266:
1265:
1261:
1249:
1242:
1236:
1233:
1229:
1223:
1219:
1215:
1209:
1206:
1203:
1199:
1193:
1190:
1183:
1174:
1168:November 1993
1164:
1162:
1158:
1156:
1153:
1152:
1146:
1136:
1133:
1131:
1128:
1127:
1121:
1111:
1108:
1106:
1103:
1102:
1096:
1086:
1083:
1081:
1078:
1077:
1071:
1061:
1058:
1056:
1053:
1052:
1046:
1044:Forest Green
1036:
1034:
1029:
1027:
1024:
1023:
1017:
1009:
1006:
1003:
1002:
996:
986:
983:
981:
978:
977:
971:
965:June 30, 1993
961:
958:
956:
953:
952:
946:
940:December 1992
936:
933:
931:
928:
927:
921:
911:
908:
906:
903:
902:
896:
886:
883:
881:
878:
877:
871:
861:
858:
856:
853:
852:
846:
836:
833:
831:
830:NCSC-TG-020-A
828:
827:
821:
811:
808:
806:
803:
802:
796:
786:
783:
781:
778:
777:
771:
761:
758:
756:
753:
752:
746:
736:
733:
731:
728:
727:
721:
719:Yellow-Green
711:
708:
706:
703:
702:
696:
686:
683:
681:
678:
677:
671:
665:April 1, 1989
661:
658:
656:
653:
652:
646:
640:March 1, 1995
636:
633:
631:
628:
627:
621:
611:
608:
606:
603:
602:
596:
587:
584:
581:
580:
574:
564:
561:
559:
556:
555:
549:
539:
536:
534:
531:
530:
524:
514:
511:
509:
506:
505:
499:
489:
486:
484:
481:
480:
474:
464:
461:
459:
456:
455:
449:
439:
436:
434:
431:
430:
424:
418:July 31, 1987
414:
411:
409:
406:
405:
399:
389:
386:
384:
381:
380:
374:
364:
361:
359:
356:
355:
349:
343:June 22, 1990
339:
336:
334:
331:
330:
324:
314:
311:
309:
306:
305:
299:
293:June 25, 1985
289:
286:
284:
281:
280:
274:
272:Light Yellow
268:June 25, 1985
264:
261:
259:
256:
255:
249:
239:
236:
234:
231:
230:
224:
214:
213:
208:
206:
203:
202:
199:
194:
189:
182:
173:
171:
168:
164:
160:
155:
153:
149:
145:
141:
133:
131:
129:
125:
121:
120:United States
117:
113:
112:Rainbow Books
109:
100:
90:
87:
79:
69:
65:
64:inappropriate
61:
57:
51:
49:
42:
33:
32:
27:
23:
22:Rainbow Books
19:
1248:the original
1235:
1217:
1208:
1197:
1192:
1159:
1140:January 1994
1134:
1115:May 25, 1992
1109:
1084:
1059:
1030:
1007:
984:
959:
934:
909:
884:
859:
844:Grey Silver
834:
815:July 7, 1989
809:
784:
759:
734:
715:October 1992
709:
684:
659:
634:
609:
585:
582:NCSC-TG-012
562:
543:October 1992
537:
522:Venice Blue
512:
487:
462:
437:
412:
387:
372:Neon Orange
362:
347:Bright Blue
337:
318:June 1, 1988
312:
287:
262:
237:
209:
197:
192:
187:
162:
156:
137:
111:
107:
105:
82:
76:October 2022
73:
58:by removing
45:
18:compact disc
1172:Light Pink
1155:NCSC-TG-030
1130:NCSC-TG-029
1105:NCSC-TG-028
1080:NCSC-TG-027
1055:NCSC-TG-026
1026:NCSC-TG-025
905:NCSC-TG-023
880:NCSC-TG-022
855:NCSC-TG-021
805:NCSC-TG-020
790:May 2, 1992
780:NCSC-TG-019
769:Light Blue
755:NCSC-TG-018
744:Light Blue
730:NCSC-TG-017
705:NCSC-TG-016
680:NCSC-TG-015
655:NCSC-TG-014
605:NCSC-TG-013
558:NCSC-TG-011
533:NCSC-TG-010
508:NCSC-TG-009
483:NCSC-TG-008
458:NCSC-TG-007
433:NCSC-TG-006
408:NCSC-TG-005
397:Teal Green
383:NCSC-TG-004
358:NCSC-TG-003
333:NCSC-TG-002
308:NCSC-TG-001
205:5200.28-STD
148:procurement
1184:References
1094:Turquoise
1069:Hot Peach
865:April 1991
591:April 1991
144:validation
915:July 1993
765:July 1992
472:Burgundy
184:Document
134:Objective
60:excessive
1288:Category
1216:(1996),
1090:May 1992
16:For the
1119:Violet
1015:Purple
994:Purple
969:Purple
944:Purple
894:Yellow
869:Purple
819:Silver
669:Purple
297:Yellow
222:Orange
54:Please
46:use of
1224:
1176:
1148:
1123:
1098:
1073:
1048:
1019:
998:
973:
948:
923:
898:
873:
848:
823:
798:
773:
748:
723:
698:
694:Brown
673:
648:
623:
598:
576:
551:
526:
501:
476:
451:
447:Amber
426:
401:
376:
351:
326:
301:
276:
251:
247:Green
226:
1270:from
1251:(PDF)
1244:(PDF)
1144:Blue
794:Blue
644:Pink
619:Pink
547:Aqua
198:Color
188:Title
1222:ISBN
615:1989
572:Red
422:Red
322:Tan
210:DoD
193:Date
106:The
1202:DOI
62:or
1290::
154:.
130:.
89:)
83:(
78:)
74:(
70:.
52:.
28:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.