This section describes the requirements for a C2 system and
explains the documentation that the OpenVMS product provides to
support such a system.
Definition of the C2 Environment A C2 environment is one that meets the United States Defense
Department's criteria for trusted computer systems and that contains
only those hardware and software components of the trusted computing
base (TCB) that were included in the government's evaluation of
the OpenVMS operating system.
The criteria for C2 systems are defined in the Department
of Defense Trusted Computer System Evaluation Criteria,
published by the Department of Defense Computer Security Center
(DOD 5200.28-STD). They include the following:
Access controls, which if used, can
identify individual users as well as groups of users
User accountability through login procedures that
clearly identify a user
Auditing of security-relevant events
Resource isolation so objects are erased before
being reallocated
Documentation The trusted facility manual is intended for the system administrator.
The C2 trusted facility manual includes the following:
Chapters 5--13 and the appendixes
of this manual
HP OpenVMS System Management Utilities
Reference Manual
, Audit Analysis utility section
OpenVMS AXP Version 6.1 Upgrade and Installation
Manual
OpenVMS VAX Version 6.1 Upgrade and Installation
Manual
OpenVMS AXP Version 6.1 Release Notes
OpenVMS AXP Version 6.1 Release Notes
Addendum
OpenVMS VAX Version 6.1 Release Notes
OpenVMS VAX Version 6.1 Release Notes
Addendum
Security OverviewSee "Security
Overview" on page 25 and
Security for the User"Security for the User" on
page 39 of this guide constitute the security features
user's guide and should be made available to all users.