skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System Security HP OpenVMS Guide to System Security
go to beginning of part: Security for the System Administrator Security for the System Administrator
go to beginning of appendix: Running an OpenVMS System in a C2 Environment Running an OpenVMS System in a C2 Environment
go to previous page: Trusted Computing Base (TCB) for C2 Systems Trusted Computing Base (TCB) for C2 Systems
go to next page: Alarm MessagesAlarm Messages
end of book navigation links

Checklist for Generating a C2 System  



The previous sections of this appendix describe the U.S. government requirements for running the OpenVMS operating system in a C2 environment. The following list reviews the government's security requirements:

Installing the System

Using Evaluated Components

Making Individuals Accountable

Managing the Audit Reporting System

Reusing Disks, Tapes, and Terminals

Building a Single Security Domain

Starting the System


go to previous page: Trusted Computing Base (TCB) for C2 Systems Trusted Computing Base (TCB) for C2 Systems
go to next page: Alarm MessagesAlarm Messages