lotus

previous page: 32  What are the requirements for a D/C1/C2/B1/B2/B3/A1 system? (Computer Security Evaluation)
  
page up: Computer Security Evaluation FAQ
  
next page: 34  What is the evaluation process? (Computer Security Evaluation)

33 How do I get my product evaluated? (Computer Security Evaluation)




Description

This article is from the Computer Security Evaluation FAQ, by Trusted Product Evaluation Program TPEP@dockmaster.ncsc.mil.

33 How do I get my product evaluated? (Computer Security Evaluation)

Product developers who have a product that they wish to have
evaluated need to request a proposal package from:

V24, TRUSTED PRODUCT EVALUATION PROGRAM
NATIONAL SECURITY AGENCY
9800 SAVAGE ROAD STE 6740
FT MEADE MD 20755-6740

The ultimate proposal for product evaluation will include
technical and marketing details for the product. Because the
Trusted Product Evaluation Program (TPEP) is legislatively
prohibited from directly evaluating products that are not
intended to protect classified information, the proposal
marketing information should include details about the market
potential within the United States Department of Defense and
intelligence communities. Additionally, the TPEP in general
does not accept products targeting the C1 and below evaluation
classes, as these are usually inappropriate for processing any
classified information. TPEP currently accepts for evaluation
at the C2 and higher levels, networked systems which meet the
market and technical criteria. The product technical details
will include descriptions of the product's documentation and how
that documentation's structure compares to that required by the
PGWG documents (see Section II, Question 11). Finally, the
proposed configuration of the product should be a configuration
likely to be used by the described potential market.

 

Continue to:













TOP
previous page: 32  What are the requirements for a D/C1/C2/B1/B2/B3/A1 system? (Computer Security Evaluation)
  
page up: Computer Security Evaluation FAQ
  
next page: 34  What is the evaluation process? (Computer Security Evaluation)