1 개요[ | ]
- Rainbow Series, Rainbow Books
- 레인보우 시리즈, 레인보우 북스
- 1980년대~1990년대 미국 정부에서 간행된 컴퓨터 보안 표준 및 가이드라인 시리즈
2 목록[ | ]
Document | 제목 | 일자 | 색상 | |
---|---|---|---|---|
5200.28-STD | DoD Trusted Computer System Evaluation Criteria | 1983-08-15 | Orange | |
CSC-STD-002-85 | DoD Password Management Guideline | 1985-04-12 | Green | |
CSC-STD-003-85 | Guidance for applying TCSEC in Specific Environments | 1985-06-25 | Light Yellow | |
CSC-STD-004-85 | Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements | 1985-06-25 | Yellow | |
NCSC-TG-001 | A Guide to Understanding Audit in Trusted Systems | 1988-06-01 | Tan | |
NCSC-TG-002 | Trusted Product Security Evaluation Program | 1990-06-22 | Bright Blue | |
NCSC-TG-003 | Discretionary Access Control in Trusted Systems | 1987-09-30 | Neon Orange | |
NCSC-TG-004 | Glossary of Computer Security Terms | 1988-10-21 | Teal Green | |
NCSC-TG-005 | Trusted Network Interpretation | 1987-07-31 | Red | |
NCSC-TG-006 | Configuration Management in Trusted Systems | 1988-03-28 | Amber | |
NCSC-TG-007 | A Guide to Understanding Design Documentation in Trusted Systems | 1988-10-06 | Burgundy | |
NCSC-TG-008 | A Guide to Understanding Trusted Distribution in Trusted Systems | 1988-12-15 | Dark Lavender | |
NCSC-TG-009 | Computer Security Subsystem Interpretation of the TCSEC | 1988-09-16 | Venice Blue | |
NCSC-TG-010 | A Guide to Understanding Security Modeling in Trusted Systems | 1992-10 | Aqua | |
NCSC-TG-011 | Trusted Network Interpretation Environments Guideline (TNI) | 1990-08-01 | Red | |
NCSC-TG-013 | RAMP Program Document | 1989 | Pink | |
NCSC-TG-013 V2 | RAMP Program Document version 2 | 1995-03-01 | Pink | |
NCSC-TG-014 | Guidelines for Formal Verification Systems | 1989-04-01 | Purple | |
NCSC-TG-015 | Guide to Understanding Trusted Facility Management | 1989-10-18 | Brown | |
NCSC-TG-016 | Guidelines for Writing Trusted Facility Manuals | 1992-10 | Yellow-Green | |
NCSC-TG-017 | Identification and Authentication in Trusted Systems | 1991-09 | Light Blue | |
NCSC-TG-018 | Object Reuse in Trusted Systems | 1992-07 | Light Blue | |
NCSC-TG-019 | Trusted Product Evaluation Questionnaire | 1992-05-02 | Blue | |
NCSC-TG-020 | Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System | 1989-07-07 | Silver | |
NCSC-TG-020-A | Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System | 1989-08-18 | Grey Silver | |
NCSC-TG-021 | Trusted Database Management System Interpretation of the TCSEC (TDI) | 1991-04 | Purple | |
NCSC-TG-022 | Trusted Recovery in Trusted Systems | 1991-12-30 | Yellow | |
NCSC-TG-023 | Security Testing and Test Documentation in Trusted Systems | 1993-07 | Bright Orange | |
NCSC-TG-024 Vol. 1/4 | Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements | 1992-12 | Purple | |
NCSC-TG-024 Vol. 2/4 | Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work | 1993-06-30 | Purple | |
NCSC-TG-024 Vol. 3/4 | Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description | 1994-02-28 | Purple | |
NCSC-TG-024 Vol. 4/4 | Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document | Publication TBA | Purple | |
NCSC-TG-025 | Guide to Understanding Data Remanence in Automated Information Systems. | 1991-09 | Forest Green | |
NCSC-TG-026 | Writing the Security Features User's Guide for Trusted Systems | 1991-09 | Hot Peach | |
NCSC-TG-027 | Information System Security Officer Responsibilities for Automated Information Systems | 1992-05 | Turquoise | |
NCSC-TG-028 | Assessing Controlled Access Protection | 1992-05-25 | Violet | |
NCSC-TG-029 | Certification and Accreditation Concepts | 1994-01 | Blue | |
NCSC-TG-030 | Covert Channel Analysis of Trusted Systems | 1993-11 | Light Pink |