ABSTRACT

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastruc

chapter 1|4 pages

Introduction

chapter 2|52 pages

What Are the Common Criteria?

chapter 6|4 pages

Postscript