Rainbow Series


DoD Password Management Guideline April 1985 (CSC-STD-002-85)
Guidance for Applying the DoD TCSEC in Specific Environments June 1985 (CSC-STD-003-85)
Technical Rationale Behind CSC-STD-003-85 June 1985 (CSC-STD-004-85)
DoD Trusted Computer System Evaluation Criteria (TCSEC) December 1985 (DoD 5200.28-STD)
Trusted Network Interpretation of TCSEC Version 1 July 1987 (NCSC-TG-005)
Discretinary Access Control in Trusted Systems Version 1 September 1987 (NCSC-TG-003)
Trusted Product Security Evaluation Program March 1988 (NCSC-TG-002)
Configuration Management in Trusted Systems Version 1 March 1988 (NCSC-TG-006)
Audit in Trusted Systems Version 2 June 1988 (NCSC-TG-001)
Computer Security Subsystem September 1988 (CSC-TG-009)
Glossary of Computer Security Terms Version 1 October 1988 (NCSC-TC-004)
Design Documentation in Trusted Systems October 1988 (CSC-TG-007)
Understanding Trusted Distribution in Trusted Systems Version 1 December 1988 (NCSC-TG-008)
Guidelines for Formal Verification Systems April 1989 (NCSC-TG-014)
Rating Maintenance Phase Program Documenatation June 1989 (CSC-TG-013)
Guide to Understanding Trusted Facility Management June 1989 (NCSC-TG-015)
Trusted UNIX Working Group Rationale for Selecting Access Control List Features August 1989 (CSC-TG-020-A)
Trusted Product Evaluation Questionnaire Version 1 October 1989 (NCSC-TG-019)
Trusted Network Interpretation Environments Guideline August 1990 (CSC-TG-011)
Trusted Database Management System Interpretation April 1991 (CSC-TG-021)
Guide to Understanding I&A September 1991 (NCSC-TG-017)
Understanding Data Remanence in Automated Information Systems September 1991 (CSC-TG-025)
Writing Trusted Facility Manuals October 1992 (NCSC-TG-016)
A Guide to Writing the Security Features Users Guide for Trusted Systems (CSC-TG-026)

Ordering Information