Rainbow Series


NSA/NCSC Rainbow Series (.pdf)

Name

Description

Orange Book

DoD Trusted Computer System Evaluation Criteria [Version 1 - 26 December 1985]

Green Book

DoD Password Management Guideline [Version 1 - 12 April 1985]

Light Yellow Book

Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments [Version 1 - 25 June 1985]

Yellow Book

Technical Rational Behind CSC-STD-003-85: Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments [Version 1 - 25 June 1985]

NTISSAM COMPUSEC/1-87

Advisory Memorandum on Office Automation Security Guidelines

Tan Book

A Guide to Understanding Audit in Trusted Systems [Version 2 6/01/88]

Bright Blue Book

Trusted Product Evaluation - A Guide for Vendors [Version 1 6/22/90]

Neon Orange Book

A Guide to Understanding Discretionary Access Control in Trusted
Systems [Version 1, 9/30/87]

Aqua Book

Glossary of Computer Security Terms [Version 1, 10/21/88]

Red Book

Trusted Network Interpretation [Version 1 7/31/87]

Orange Book

A Guide to Understanding Configuration management in Trusted
Systems [Version 1 - 28 Mar 1988]

Burgundy Book

A Guide to Understanding Design Documentation in Trusted Systems
[Version 1 - 6 Oktober 1988]

Lavender Book

A Guide to Understanding Trusted Distribution in Trusted Systems
[Version 1 - 15 December 1988]

Venice Blue Book

Computer Security Subsystem Interpretation of the Trusted Computer
System Evaluation Criteria [Version 1 - 16 September 1988]

Aqua Book

A Guide to Understanding Security Modeling in Trusted Systems [Version 1 - October 1992]

Red Book

Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI [Version 1 - 1 August 1990]

Pink Book

Rating Maintenance Phase Program Document [Version 2 - 01 Mars 1995]

Purple Book

Guidelines for Formal Verification Systems [Version - 1 April 1989]

Brown Book

A Guide to Understanding Trusted Facility Management [Version 1 - 18 October 1989]

Yellow-Green Book

Guidelines for Writing Trusted Facility Manuals [Version 1 - October 1992]

Light Blue Book

A Guide to Understanding Identification and Authentication in Trusted Systems
[Version 1 - September 1991]

Light Blue Book

A Guide to Understanding Object Reuse in Trusted Systems [Version 1 - July 1992]

Blue Book

Trusted Product Evaluation Questionnaire [Version 2 - 2 May 1992]

Silver Book

Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX� System [Version 1 - 7 July 1989]

Lavender/Purple Book (N/A)

Trusted Database Management System Interpretation [Version 1 - April 1991]

Yellow Book

A Guide to Understanding Trusted Recovery [Version 1 - 30 December 1991]

Bright Orange Book

A Guide to Understanding Security Testing and Test Documentation in Trusted Systems

Purple Book 1/4

A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements [Version 1 - December 1992]

Purple Book 2/4

A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators [Version 1 - 30 June 1993]

Purple Book 3/4

A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial [Version 1 - 28 February 1994]

Purple Book 4/4 (N/A)

A Guide to Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document - An Aid to Procurement Initiators and Contractors

Forrest Green Book

A Guide to Understanding Data Remanence in Automated Information Systems
[Version 2 - September 1991]

Hot Peach Book

A Guide to Writing the Security Features User's Guide for Trusted Systems
[Version 1 - September 1991]

Turquoise Book

A Guide to Understanding Information System Security Officer
Responsibilities for Automated Information Systems [Version 1 - May 1992]

Violet Book

Assessing Controlled Access Protection [Version 1 - 25 May 1992]

Blue Book

Introduction to Certification and Accreditation [Version 1 - January 1994]

Light Pink Book

A Guide to Understanding Covert Channel Analysis of Trusted Systems
[Version 1 - November 1993]

Rainbow

A zip file containing all of the above books (4.14 MB)




Other NCSC Publications (.pdf)

Name

Description

C1 Technical Report 001

Technical Report, Computer Viruses: Prevention, Detection, and Treatment [12 March 1990]

C Technical Report 79-91

Technical Report, Integrity in Automated Information Systems [September 1991]

C Technical Report 32-92 (N/A)

The Design and Evaluation of INFOSEC systems: The Computer Security Contribution to the Composition Discussion [June 1992]

C Technical Report 111-91

Integrity-Oriented Control Objectives: Proposed Revisions to the TCSEC [October 1991]

NCSC Technical Report 002

Use of the TCSEC for Complex, Evolving, Mulitpolicy Systems

NCSC Technical Report 003

Turning Multiple Evaluated Products Into Trusted Systems

NCSC Technical Report 004

A Guide to Procurement of Single Connected Systems - Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators - Includes Complex, Evolving, and Multipolicy Systems

NCSC Technical Report 005 Volume 1/5

Inference and Aggregation Issues In Secure Database Management Systems

NCSC Technical Report 005 Volume 2/5

Entity and Referential Integrity Issues In Multilevel Secure Database Management

NCSC Technical Report 005 Volume 3/5

Polyinstantiation Issues In Multilevel Secure Database Management Systems

NCSC Technical Report 005 Volume 4/5

Auditing Issues In Secure Database Management Systems

NCSC Technical Report 005 Volume 5/5

Discretionary Access Control Issues In High Assurance Secure Database Management Systems

Other

A zip file containing all of the above books (1.92 MB)