"A Guide to Understanding Trusted Distribution in Trusted Systems," is the
latest in the series of technical guidelines that are being published by the National
Computer Security Center. These publications are designed to provide insi ht to the
Trusted Computer Systems Evaluation Criteria requirements and guiance for
meeting each requirement.
The specific guidelines in this document provide a set of good practices related to
trusted distribution of the hardware, software, and firmware portions, both
originals and updates, of automated data processing systems employed for processing classified and other sensitive information. This technical guideline has been written
to help the vendor and evaluator community understand what trusted distribution
is, why it is important, and how an effective trusted distribution system may be
implemented to meet the requirements of the Trusted Computer Systems Evaluation
Criteria.
As the Director, National Computer Security Center, I invite your
recommendations for revision to this technical guideline. We plan to review this
document biannually. Please address any proposals for revision through appropriate
channels to:
National Computer Security Center
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Attention: Chief, Criteria and Guidelines
Patrick R. Gallagher ,Jr. 15 December 1988
Director
National Computer Security Center
i
ACKNOWLEDGMENTS
Special recognition is extended to James N. Menendez, National Computer
Security Center (NCSC), as project manager and coauthor of this document.
Recognition is also extended to Scott Wright, Advanced Information Management
(AIM), Inc., as coauthor and researcher of this document.
Acknowledgment is also given to all those members of the computer security
community who contributed their time and expertise by actively participating in