Skip Navigation Links
MenuExpand
ASSIST
   Data updated: 16 Jan 2026. Home |  About Quick Search |  ASSIST |  ASSIST Updates Document Details

Document ID:   DI-MISC-81762       Scroll down to access document images

Overview
Title:  Security Evaluation Document (SED)
Scope:  The Security Evaluation Document (SED) provides information about the architectural design of a High Assurance Device (HAD) and its detailed implementation throughout the development. The SED must provide sufficient details to determine the adequacy of the design and ensure appropriate system security requirements are met. Additionally, the SED must contain fail-safe analysis of unauthorized events, Covert Channel Analysis (CCA), and anti-tamper design details. The SED supports security evaluations by documenting HAD design details previously collected from the CCA report, Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA) security evaluation documentation.
Status:  Active DID Date:  21-AUG-2023      
  Next Review Due:  19-AUG-2028
MISC Doc Category:   Data Item Description  

Responsibilities
DID Approval Authority:  NS  National Security Agency
  Preparing Activity: NS  National Security Agency
DoD Interest Level:  / Prepared by DoD activity
Coordination:  Full  

Revision History Click on column headings for a description of column content.
MediaDocument Part DescriptionDist StmtDocument DatePagesSize
Document ImageRevision B A21-AUG-202310218.3 KB
Document ImageRevision A Notice 1 - ValidationA20-SEP-202211.9 KB
Document ImageRevision A A27-NOV-20178250.9 KB
Document ImageNotice 1 - ValidationA04-JAN-201711.8 KB
Document ImageBase Document A02-FEB-2009856.4 KB

NOTE: It is recommended that you use Adobe Reader v7.0 or higher for optimal download performance; older versions should continue to work, but downloading large files may appear to take longer, so please be patient in those cases.


  About Quick Search  |  Contact Us  |  FAQ  |  ASSIST  |  Privacy and Security  |  Section 508 Compliance  |  Defense Standardization Program  

WARNING: UNAUTHORIZED ACCESS TO THIS UNITED STATES GOVERNMENT COMPUTER SYSTEM AND SOFTWARE IS PROHIBITED BY PUBLIC LAW 99-474 (THE COMPUTER FRAUD AND ABUSE ACT OF 1986) AND CAN RESULT IN ADMINISTRATIVE, DISCIPLINARY OR CRIMINAL PROCEEDINGS.