Knowledge (XXG)

Rainbow Series

Source 📝

99: 37: 169:
states of NCSC-TG-021 that he "can't even begin to describe the color of cover" and that some of the books in this series have "hideously colored covers." He then goes on to describe how to receive a copy of them, saying "Don't tell them I sent you."
211: 1240: 629: 604: 1225: 1293: 904: 59: 654: 507: 1054: 1271: 979: 954: 929: 804: 457: 127: 85: 1104: 1129: 532: 854: 754: 729: 704: 557: 143: 67: 63: 47: 123: 835:
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System
1277: 879: 810:
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System
25: 1247: 985:
Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description
935:
Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements
282: 257: 232: 204: 1221: 779: 679: 482: 432: 407: 382: 357: 332: 307: 115: 151: 142:. In some cases, U.S. government entities (as well as private firms) would require formal 98: 1213: 1160: 1032: 166: 139: 1085:
Information System Security Officer Responsibilities for Automated Information Systems
960:
Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work
1287: 119: 21: 150:
criteria. Many of these standards have influenced, and have been superseded by, the
17: 147: 1025: 829: 1154: 1079: 1008:
Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document
157:
The books have nicknames based on the color of its cover. For example, the
1201: 288:
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements
122:
government in the 1980s and 1990s. They were originally published by the
102:
A complete set of the US DoD Rainbow Series computer security documents
1267: 860:
Trusted Database Management System Interpretation of the TCSEC (TDI)
66:
external links, and converting useful links where appropriate into
158: 97: 488:
A Guide to Understanding Trusted Distribution in Trusted Systems
463:
A Guide to Understanding Design Documentation in Trusted Systems
1060:
Writing the Security Features User's Guide for Trusted Systems
30: 538:
A Guide to Understanding Security Modeling in Trusted Systems
563:
Trusted Network Interpretation Environments Guideline (TNI)
161:
was referred to as "The Orange Book." In the book entitled
146:
of computer technology using this process as part of their
910:
Security Testing and Test Documentation in Trusted Systems
1196:
Steve Lipner, "The Birth and Death of the Orange Book"
513:
Computer Security Subsystem Interpretation of the TCSEC
55: 50:
may not follow Knowledge (XXG)'s policies or guidelines
138:
These standards describe a process of evaluation for
735:
Identification and Authentication in Trusted Systems
263:
Guidance for Applying TCSEC in Specific Environments
196: 1220:(2nd ed.), New York, NY: John Wiley and Sons, 685:Guide to Understanding Trusted Facility Management 586:Trusted Database Management System Interpretation 313:A Guide to Understanding Audit in Trusted Systems 24:. For pre-Internet communications protocols, see 710:Guidelines for Writing Trusted Facility Manuals 363:Discretionary Access Control in Trusted Systems 8: 438:Configuration Management in Trusted Systems 338:Trusted Product Security Evaluation Program 212:Trusted Computer System Evaluation Criteria 159:Trusted Computer System Evaluation Criteria 660:Guidelines for Formal Verification Systems 177: 126:Computer Security Center, and then by the 118:standards and guidelines published by the 86:Learn how and when to remove this message 1135:Certification and Accreditation Concepts 785:Trusted Product Evaluation Questionnaire 191: 186: 183: 1198:IEEE Annals of the History of Computing 1189: 1110:Assessing Controlled Access Protection 1280:from Archive of Information Assurance 174:Most significant Rainbow Series books 7: 1246:. DoD. July 31, 2000. Archived from 885:Trusted Recovery in Trusted Systems 388:Glossary of Computer Security Terms 14: 1272:Federation of American Scientists 1035:in Automated Information Systems. 238:DoD Password Management Guideline 128:National Computer Security Center 35: 760:Object Reuse in Trusted Systems 635:RAMP Program Document version 2 413:Trusted Network Interpretation 1: 1241:"DITSCAP Application Manual" 1171: 1166: 1143: 1138: 1118: 1113: 1093: 1088: 1068: 1063: 1043: 1038: 1014: 1011: 993: 988: 968: 963: 943: 938: 918: 913: 893: 888: 868: 863: 843: 838: 818: 813: 793: 788: 768: 763: 743: 738: 718: 713: 693: 688: 668: 663: 643: 638: 618: 613: 594: 589: 571: 566: 546: 541: 521: 516: 496: 491: 471: 466: 446: 441: 421: 416: 396: 391: 371: 366: 346: 341: 321: 316: 296: 291: 271: 266: 246: 241: 221: 216: 1294:Computer security standards 1163:Analysis of Trusted Systems 1310: 1200:37 no. 2 (2015): 19-31 at 124:U.S. Department of Defense 15: 110:(sometimes known as the 1274:, with more explanation 1031:Guide to Understanding 26:Coloured Book protocols 103: 20:standards series, see 1004:NCSC-TG-024 Vol. 4/4 610:RAMP Program Document 101: 1218:Applied Cryptography 980:NCSC-TG-024 Vol. 3/4 955:NCSC-TG-024 Vol. 2/4 930:NCSC-TG-024 Vol. 1/4 179:NIST Rainbow Series 163:Applied Cryptography 56:improve this article 180: 68:footnote references 518:September 16, 1988 368:September 30, 1987 178: 165:, security expert 104: 1227:978-0-471-11709-4 1181: 1180: 990:February 28, 1994 890:December 30, 1991 493:December 15, 1988 116:computer security 114:) is a series of 96: 95: 88: 1301: 1255: 1254: 1253:on Aug 30, 2004. 1252: 1245: 1237: 1231: 1230: 1210: 1204: 1194: 1177: 1169: 1149: 1141: 1124: 1116: 1099: 1091: 1074: 1066: 1049: 1041: 1020: 1012:Publication TBA 999: 991: 974: 966: 949: 941: 924: 916: 899: 891: 874: 866: 849: 841: 824: 816: 799: 791: 774: 766: 749: 741: 724: 716: 699: 691: 690:October 18, 1989 674: 666: 649: 641: 624: 616: 599: 592: 577: 569: 552: 544: 527: 519: 502: 494: 477: 469: 452: 444: 427: 419: 402: 394: 393:October 21, 1988 377: 369: 352: 344: 327: 319: 302: 294: 277: 269: 252: 244: 227: 219: 181: 91: 84: 80: 77: 71: 39: 38: 31: 1309: 1308: 1304: 1303: 1302: 1300: 1299: 1298: 1284: 1283: 1264: 1259: 1258: 1250: 1243: 1239: 1238: 1234: 1228: 1214:Schneier, Bruce 1212: 1211: 1207: 1195: 1191: 1186: 1175: 1167: 1147: 1139: 1122: 1114: 1097: 1089: 1072: 1064: 1047: 1039: 1018: 997: 989: 972: 964: 947: 939: 922: 914: 897: 889: 872: 864: 847: 840:August 18, 1989 839: 822: 814: 797: 789: 772: 764: 747: 739: 722: 714: 697: 689: 672: 664: 647: 639: 622: 614: 597: 590: 575: 567: 550: 542: 525: 517: 500: 492: 475: 468:October 6, 1988 467: 450: 442: 425: 417: 400: 392: 375: 367: 350: 342: 325: 317: 300: 292: 275: 267: 250: 242: 225: 218:August 15, 1983 217: 176: 152:Common Criteria 140:trusted systems 136: 92: 81: 75: 72: 53: 44:This article's 40: 36: 29: 12: 11: 5: 1307: 1305: 1297: 1296: 1286: 1285: 1282: 1281: 1278:Rainbow Series 1275: 1268:Rainbow Series 1263: 1262:External links 1260: 1257: 1256: 1232: 1226: 1205: 1188: 1187: 1185: 1182: 1179: 1178: 1173: 1170: 1165: 1161:Covert Channel 1157: 1151: 1150: 1145: 1142: 1137: 1132: 1126: 1125: 1120: 1117: 1112: 1107: 1101: 1100: 1095: 1092: 1087: 1082: 1076: 1075: 1070: 1067: 1065:September 1991 1062: 1057: 1051: 1050: 1045: 1042: 1040:September 1991 1037: 1033:Data Remanence 1028: 1022: 1021: 1016: 1013: 1010: 1005: 1001: 1000: 995: 992: 987: 982: 976: 975: 970: 967: 962: 957: 951: 950: 945: 942: 937: 932: 926: 925: 920: 919:Bright Orange 917: 912: 907: 901: 900: 895: 892: 887: 882: 876: 875: 870: 867: 862: 857: 851: 850: 845: 842: 837: 832: 826: 825: 820: 817: 812: 807: 801: 800: 795: 792: 787: 782: 776: 775: 770: 767: 762: 757: 751: 750: 745: 742: 740:September 1991 737: 732: 726: 725: 720: 717: 712: 707: 701: 700: 695: 692: 687: 682: 676: 675: 670: 667: 662: 657: 651: 650: 645: 642: 637: 632: 630:NCSC-TG-013 V2 626: 625: 620: 617: 612: 607: 601: 600: 595: 593: 588: 583: 579: 578: 573: 570: 568:August 1, 1990 565: 560: 554: 553: 548: 545: 540: 535: 529: 528: 523: 520: 515: 510: 504: 503: 498: 497:Dark Lavender 495: 490: 485: 479: 478: 473: 470: 465: 460: 454: 453: 448: 445: 443:March 28, 1988 440: 435: 429: 428: 423: 420: 415: 410: 404: 403: 398: 395: 390: 385: 379: 378: 373: 370: 365: 360: 354: 353: 348: 345: 340: 335: 329: 328: 323: 320: 315: 310: 304: 303: 298: 295: 290: 285: 283:CSC-STD-004-85 279: 278: 273: 270: 265: 260: 258:CSC-STD-003-85 254: 253: 248: 245: 243:April 12, 1985 240: 235: 233:CSC-STD-002-85 229: 228: 223: 220: 215: 207: 201: 200: 195: 190: 185: 175: 172: 167:Bruce Schneier 135: 132: 108:Rainbow Series 94: 93: 48:external links 43: 41: 34: 13: 10: 9: 6: 4: 3: 2: 1306: 1295: 1292: 1291: 1289: 1279: 1276: 1273: 1269: 1266: 1265: 1261: 1249: 1242: 1236: 1233: 1229: 1223: 1219: 1215: 1209: 1206: 1203: 1199: 1193: 1190: 1183: 1174: 1168:November 1993 1164: 1162: 1158: 1156: 1153: 1152: 1146: 1136: 1133: 1131: 1128: 1127: 1121: 1111: 1108: 1106: 1103: 1102: 1096: 1086: 1083: 1081: 1078: 1077: 1071: 1061: 1058: 1056: 1053: 1052: 1046: 1044:Forest Green 1036: 1034: 1029: 1027: 1024: 1023: 1017: 1009: 1006: 1003: 1002: 996: 986: 983: 981: 978: 977: 971: 965:June 30, 1993 961: 958: 956: 953: 952: 946: 940:December 1992 936: 933: 931: 928: 927: 921: 911: 908: 906: 903: 902: 896: 886: 883: 881: 878: 877: 871: 861: 858: 856: 853: 852: 846: 836: 833: 831: 830:NCSC-TG-020-A 828: 827: 821: 811: 808: 806: 803: 802: 796: 786: 783: 781: 778: 777: 771: 761: 758: 756: 753: 752: 746: 736: 733: 731: 728: 727: 721: 719:Yellow-Green 711: 708: 706: 703: 702: 696: 686: 683: 681: 678: 677: 671: 665:April 1, 1989 661: 658: 656: 653: 652: 646: 640:March 1, 1995 636: 633: 631: 628: 627: 621: 611: 608: 606: 603: 602: 596: 587: 584: 581: 580: 574: 564: 561: 559: 556: 555: 549: 539: 536: 534: 531: 530: 524: 514: 511: 509: 506: 505: 499: 489: 486: 484: 481: 480: 474: 464: 461: 459: 456: 455: 449: 439: 436: 434: 431: 430: 424: 418:July 31, 1987 414: 411: 409: 406: 405: 399: 389: 386: 384: 381: 380: 374: 364: 361: 359: 356: 355: 349: 343:June 22, 1990 339: 336: 334: 331: 330: 324: 314: 311: 309: 306: 305: 299: 293:June 25, 1985 289: 286: 284: 281: 280: 274: 272:Light Yellow 268:June 25, 1985 264: 261: 259: 256: 255: 249: 239: 236: 234: 231: 230: 224: 214: 213: 208: 206: 203: 202: 199: 194: 189: 182: 173: 171: 168: 164: 160: 155: 153: 149: 145: 141: 133: 131: 129: 125: 121: 120:United States 117: 113: 112:Rainbow Books 109: 100: 90: 87: 79: 69: 65: 64:inappropriate 61: 57: 51: 49: 42: 33: 32: 27: 23: 22:Rainbow Books 19: 1248:the original 1235: 1217: 1208: 1197: 1192: 1159: 1140:January 1994 1134: 1115:May 25, 1992 1109: 1084: 1059: 1030: 1007: 984: 959: 934: 909: 884: 859: 844:Grey Silver 834: 815:July 7, 1989 809: 784: 759: 734: 715:October 1992 709: 684: 659: 634: 609: 585: 582:NCSC-TG-012 562: 543:October 1992 537: 522:Venice Blue 512: 487: 462: 437: 412: 387: 372:Neon Orange 362: 347:Bright Blue 337: 318:June 1, 1988 312: 287: 262: 237: 209: 197: 192: 187: 162: 156: 137: 111: 107: 105: 82: 76:October 2022 73: 58:by removing 45: 18:compact disc 1172:Light Pink 1155:NCSC-TG-030 1130:NCSC-TG-029 1105:NCSC-TG-028 1080:NCSC-TG-027 1055:NCSC-TG-026 1026:NCSC-TG-025 905:NCSC-TG-023 880:NCSC-TG-022 855:NCSC-TG-021 805:NCSC-TG-020 790:May 2, 1992 780:NCSC-TG-019 769:Light Blue 755:NCSC-TG-018 744:Light Blue 730:NCSC-TG-017 705:NCSC-TG-016 680:NCSC-TG-015 655:NCSC-TG-014 605:NCSC-TG-013 558:NCSC-TG-011 533:NCSC-TG-010 508:NCSC-TG-009 483:NCSC-TG-008 458:NCSC-TG-007 433:NCSC-TG-006 408:NCSC-TG-005 397:Teal Green 383:NCSC-TG-004 358:NCSC-TG-003 333:NCSC-TG-002 308:NCSC-TG-001 205:5200.28-STD 148:procurement 1184:References 1094:Turquoise 1069:Hot Peach 865:April 1991 591:April 1991 144:validation 915:July 1993 765:July 1992 472:Burgundy 184:Document 134:Objective 60:excessive 1288:Category 1216:(1996), 1090:May 1992 16:For the 1119:Violet 1015:Purple 994:Purple 969:Purple 944:Purple 894:Yellow 869:Purple 819:Silver 669:Purple 297:Yellow 222:Orange 54:Please 46:use of 1224:  1176:  1148:  1123:  1098:  1073:  1048:  1019:  998:  973:  948:  923:  898:  873:  848:  823:  798:  773:  748:  723:  698:  694:Brown 673:  648:  623:  598:  576:  551:  526:  501:  476:  451:  447:Amber 426:  401:  376:  351:  326:  301:  276:  251:  247:Green 226:  1270:from 1251:(PDF) 1244:(PDF) 1144:Blue 794:Blue 644:Pink 619:Pink 547:Aqua 198:Color 188:Title 1222:ISBN 615:1989 572:Red 422:Red 322:Tan 210:DoD 193:Date 106:The 1202:DOI 62:or 1290:: 154:. 130:. 89:) 83:( 78:) 74:( 70:. 52:. 28:.

Index

compact disc
Rainbow Books
Coloured Book protocols
external links
improve this article
excessive
inappropriate
footnote references
Learn how and when to remove this message

computer security
United States
U.S. Department of Defense
National Computer Security Center
trusted systems
validation
procurement
Common Criteria
Trusted Computer System Evaluation Criteria
Bruce Schneier
5200.28-STD
Trusted Computer System Evaluation Criteria
CSC-STD-002-85
CSC-STD-003-85
CSC-STD-004-85
NCSC-TG-001
NCSC-TG-002
NCSC-TG-003
NCSC-TG-004
NCSC-TG-005

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.