Basic Search
Text Search
ASSIST Updates
Data updated: 16 Jan 2026.
Home
|
About Quick Search
|
ASSIST
|
ASSIST Updates
Document Details
Basic Search
Text Search
Document ID:
DI-MISC-81762
Scroll down to access document images
Overview
Title:
Security Evaluation Document (SED)
Scope:
The Security Evaluation Document (SED) provides information about the architectural design of a High Assurance Device (HAD) and its detailed implementation throughout the development. The SED must provide sufficient details to determine the adequacy of the design and ensure appropriate system security requirements are met. Additionally, the SED must contain fail-safe analysis of unauthorized events, Covert Channel Analysis (CCA), and anti-tamper design details. The SED supports security evaluations by documenting HAD design details previously collected from the CCA report, Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA) security evaluation documentation.
Status:
Active
DID Date:
21-AUG-2023
Next Review Due:
19-AUG-2028
FSC/Area:
MISC
Doc Category:
Data Item Description
Responsibilities
DID Approval Authority:
NS
National Security Agency
Preparing Activity:
NS
National Security Agency
DoD Interest Level:
/
Prepared by DoD activity
Coordination:
Full
Revision History
Click on column headings for a description of column content.
Media
Document Part Description
Dist Stmt
Document Date
Pages
Size
Revision B
A
21-AUG-2023
10
218.3 KB
Revision A Notice 1 - Validation
A
20-SEP-2022
1
1.9 KB
Revision A
A
27-NOV-2017
8
250.9 KB
Notice 1 - Validation
A
04-JAN-2017
1
1.8 KB
Base Document
A
02-FEB-2009
8
56.4 KB
NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.
About Quick Search
|
Contact Us
|
FAQ
|
ASSIST
|
Privacy and Security
|
Section 508 Compliance
|
Defense Standardization Program
WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.