This article is from the Computer Security Evaluation FAQ, by Trusted Product Evaluation Program TPEP@dockmaster.ncsc.mil.
A system does not require custom hardware to be successfully
evaluated against the Trusted Computer System Evaluation
Criteria (TCSEC). However, an evaluation does consider the
security of the system hardware as well as software. For every
evaluated product, there is an evaluated configuration. The
evaluated configuration lists the specific hardware and
software evaluated. A given evaluation may require hardware
with certain security features used by the software, and the
software may require certain optional features be enabled or
disabled. The Final Evaluation Report (FER) (see Section V,
Question 7) lists the evaluated hardware and software. The
Trusted Facility Manual (TFM) for the product will give
detailed guidance on configuring the hardware and software
securely.
 
Continue to: