<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A brief summary of my studying the Orange Book in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21303#M1147</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1475315891"&gt;@wentzwu&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;When studying Domain 3, Security Architecture and Engineering, of the CISSP CBK, it is not uncommon that CISSP aspirants are confused by the concept of the reference monitor. The following is a summary of my studying the Orange Book to clarify it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/04/17/the-reference-monitor-concept" target="_blank" rel="noopener"&gt;https://wentzwu.com/2019/04/17/the-reference-monitor-concept&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Wentz,&lt;/P&gt;&lt;P&gt;Thank you. Your illustrations here lead to a nice comparison. However, for most of the younger members of our community, I'd like to point out that the &lt;EM&gt;Orange Book&lt;/EM&gt; is the nickname for an out-of-date computer security publication from the U.S. National Security Agency (NSA), officially titled&lt;/P&gt;&lt;P&gt;&lt;EM&gt;DoD 5200.28-STD "Orange Book", DoD Trusted Computer System Evaluation Criteria&lt;/EM&gt; (December 26, 1985).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is the most prominent and well-known book in a series of computer security publications from NSA, called the &lt;EM&gt;Rainbow Series&lt;/EM&gt;, since each volume was printed with a different distinctive color cover. They were written and maintained in the 1980's and '90's.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;None of the Rainbow Series publications are current or currently valid, but they are an important set with historical significance. They are no longer maintained or published by NSA or the Department of Defense (DoD). However, the U.S. National Institute of Science &amp;amp; Technology Computer Resource Center (NIST CRC) makes many of them available for historical purposes. See&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/publications/detail/white-paper/1985/12/26/dod-rainbow-series/final" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;White Paper:&amp;nbsp;DoD Rainbow Series&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and further links back to the more complete collection at the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://fas.org/irp/nsa/rainbow.htm" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Federation of American Scientists&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As noted by the FAS, some of the Rainbow Series books were superseded by the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.niap-ccevs.org" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Common Criteria Evaluation and Validation Scheme (CCEVS)&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;as maintained by the National Information Assurance Partnership (NIAP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, some U.S. national security organizations and some contractors to those organizations prohibit use of government or corporate computers and networks to access the FAS.org web site. Community members at U.S. DoD, DHS, and Intel Community organizations, and at companies with contracts with those organizations should consult with their information security offices before connecting to FAS.org.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Apr 2019 14:40:27 GMT</pubDate>
    <dc:creator>CraginS</dc:creator>
    <dc:date>2019-04-17T14:40:27Z</dc:date>
    <item>
      <title>A brief summary of my studying the Orange Book</title>
      <link>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21295#M1142</link>
      <description>&lt;P&gt;When studying Domain 3, Security Architecture and Engineering, of the CISSP CBK, it is not uncommon that CISSP aspirants are confused by the concept of the reference monitor. The following is a summary of my studying the Orange Book to clarify it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/04/17/the-reference-monitor-concept" target="_blank" rel="noopener"&gt;https://wentzwu.com/2019/04/17/the-reference-monitor-concept&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ReferenceMonitorConcept.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3142i2224AB0F62CEF9BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="ReferenceMonitorConcept.jpg" alt="ReferenceMonitorConcept.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TCBAccessControl.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3143i7A874E99EB952AD9/image-size/large?v=v2&amp;amp;px=999" role="button" title="TCBAccessControl.jpg" alt="TCBAccessControl.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BellLaPadulaModel.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3144iDD4EE97EAEF27F75/image-size/large?v=v2&amp;amp;px=999" role="button" title="BellLaPadulaModel.jpg" alt="BellLaPadulaModel.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:10:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21295#M1142</guid>
      <dc:creator>wentzwu</dc:creator>
      <dc:date>2023-10-09T09:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: A brief summary of my studying the Orange Book</title>
      <link>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21303#M1147</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1475315891"&gt;@wentzwu&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;When studying Domain 3, Security Architecture and Engineering, of the CISSP CBK, it is not uncommon that CISSP aspirants are confused by the concept of the reference monitor. The following is a summary of my studying the Orange Book to clarify it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/04/17/the-reference-monitor-concept" target="_blank" rel="noopener"&gt;https://wentzwu.com/2019/04/17/the-reference-monitor-concept&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Wentz,&lt;/P&gt;&lt;P&gt;Thank you. Your illustrations here lead to a nice comparison. However, for most of the younger members of our community, I'd like to point out that the &lt;EM&gt;Orange Book&lt;/EM&gt; is the nickname for an out-of-date computer security publication from the U.S. National Security Agency (NSA), officially titled&lt;/P&gt;&lt;P&gt;&lt;EM&gt;DoD 5200.28-STD "Orange Book", DoD Trusted Computer System Evaluation Criteria&lt;/EM&gt; (December 26, 1985).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is the most prominent and well-known book in a series of computer security publications from NSA, called the &lt;EM&gt;Rainbow Series&lt;/EM&gt;, since each volume was printed with a different distinctive color cover. They were written and maintained in the 1980's and '90's.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;None of the Rainbow Series publications are current or currently valid, but they are an important set with historical significance. They are no longer maintained or published by NSA or the Department of Defense (DoD). However, the U.S. National Institute of Science &amp;amp; Technology Computer Resource Center (NIST CRC) makes many of them available for historical purposes. See&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/publications/detail/white-paper/1985/12/26/dod-rainbow-series/final" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;White Paper:&amp;nbsp;DoD Rainbow Series&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and further links back to the more complete collection at the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://fas.org/irp/nsa/rainbow.htm" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Federation of American Scientists&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As noted by the FAS, some of the Rainbow Series books were superseded by the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.niap-ccevs.org" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Common Criteria Evaluation and Validation Scheme (CCEVS)&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;as maintained by the National Information Assurance Partnership (NIAP).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, some U.S. national security organizations and some contractors to those organizations prohibit use of government or corporate computers and networks to access the FAS.org web site. Community members at U.S. DoD, DHS, and Intel Community organizations, and at companies with contracts with those organizations should consult with their information security offices before connecting to FAS.org.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 14:40:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21303#M1147</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2019-04-17T14:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: A brief summary of my studying the Orange Book</title>
      <link>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21337#M1155</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thank you, Dr. Shelton, for your informative supplement.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 23:42:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21337#M1155</guid>
      <dc:creator>wentzwu</dc:creator>
      <dc:date>2019-04-17T23:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: A brief summary of my studying the Orange Book</title>
      <link>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21417#M1173</link>
      <description>&lt;P&gt;Although times and reference sources and materials have changed "security kernels" are still one of the most important security engineering topics to grasp for a CISSP. Searching through Common Criteria evaluations will give you good practical knowledge on product conformance claims. Testing of secure designs goes from mathematical formalism to validating that those principles are verified in OS designs. It is the most fun reading you can have!&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2019 17:51:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/A-brief-summary-of-my-studying-the-Orange-Book/m-p/21417#M1173</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-04-19T17:51:43Z</dc:date>
    </item>
  </channel>
</rss>

