skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of appendix: Running an OpenVMS System in a C2 Environment Running an OpenVMS System in a C2 Environment
 
go to next page: Trusted Computing Base (TCB) for C2 SystemsTrusted Computing Base (TCB) for C2 Systems
end of book navigation links

Introduction to C2 Systems  



This section describes the requirements for a C2 system and explains the documentation that the OpenVMS product provides to support such a system.

Definition of the C2 Environment  

A C2 environment is one that meets the United States Defense Department's criteria for trusted computer systems and that contains only those hardware and software components of the trusted computing base (TCB) that were included in the government's evaluation of the OpenVMS operating system.

The criteria for C2 systems are defined in the Department of Defense Trusted Computer System Evaluation Criteria, published by the Department of Defense Computer Security Center (DOD 5200.28-STD). They include the following:

Documentation  

The trusted facility manual is intended for the system administrator. The C2 trusted facility manual includes the following:

Security OverviewSee "Security Overview" on page 25 and Security for the User"Security for the User" on page 39 of this guide constitute the security features user's guide and should be made available to all users.


 
go to next page: Trusted Computing Base (TCB) for C2 SystemsTrusted Computing Base (TCB) for C2 Systems