Skip to Main Content
Idaho State University home

Government Documents

Rainbow Series

NIST.gov

NSA/NCSC Rainbow Series 
Document TitleReference # or Description
A Guide to Understanding Audit in Trusted Systems, June 1988 NCSC-TG-001
Trusted Product Evaluation A Guide for Vendors, March 1988 NCSC-TG-002
A Guide to Understanding Discretionary Access Control in Trusted Systems, September 1987 NCSC-TG-003
Glossary of Computer Security Acronyms, October 1988 NCSC-TG-004
Trusted Network Interpretation, July 1987 NCSC-TG-005
A Guide to Understanding Configuration Management in Trusted Systems, March 1988

NCSC-TG-006

 A Guide to Understanding Design Documentation in Trusted Systems  NCSC-TG-007
A Guide to Understanding Trusted Distribution in Trusted Systems, December 1988 NCSC-TG-008
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria  NCSC-TG-009
A Guide to Understanding Security Modeling in Trusted Systems NCSC-TG-010
Trusted Network Interpretation Environments Guidline - Guidance for Applying the Trusted Network Interpretation NCSC-TG-011
Rating Maintenance Phase Program Document, March 1995 NCSC-TG-013
Guidlines for Formal Verification Systems, April 1989 NCSC-TG-014
A Guide to Understanding Trusted Facility Management, June 1989 NCSC-TG-015
Guidelines for Writing Trusted Facility Manuals NCSC-TG-016
A Guide to Understanding Identification and Authentication in Trusted Systems NCSC-TG-017
A Guide to Understanding Object Reuse in Trusted Systems NCSC-TG-018
Trusted Product Evaluation Questionnaire NCSC-TG-019
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System, August 1989 NCSC-TG-020A
Trusted Database Management System Interpretation NCSC-TG-021
A Guide to Understanding Trusted Recovery NCSC-TG-022
A Guide to Understanding Data Remanence in Automated Information Systems, September 1991 NCSC-TG-025
A Guide to Writing the Security Features User's Guide for Trusted Systems NCSC-TG-026
A Guide to Understanding Information System Security Officer for Automated Information Systems, May 1992 NCSC-TG-027
Assessing Controlled Access Protection NCSC-TG-028
Introduction to Certification and Accreditation, September 1994 NCSC-TG-029
A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993 NCSC-TG-030
                                                 Other NSA/NCSC Publications 
National Security Agency/CSS Degausser Products List, September 2001    
NCSC ETL Endorsed Tools List  
                                              Department of Defense Rainbow Series
Trusted Computer System Evaluation Criteria, August 1983 CSC-STD-001-83
Password Management Guideline, April 1985 CSC-STD-002-85
Computer Security Requirements: Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments, June 1985 CSC-STD-003-85
Technical Rationale Behind CSC-STD-003-85 Computer Security Requirements: Guidance for Applying the DoD Trusted Computer System Evaluation Criteria in Specific Environments, June 1985 CSC-STD-004-85
                                                     Other Rainbow Publications
Computer Viruses: Prevention, Detection, and Treatment; June 1989 C1 technical Report 001
The Design and Evaluation of INFOSEC Systems: The Computer Security Contribution to the Composistion Discussion, June 1992 C Technical Report 32-92
Integrity in Automated Information Systems, September 1991 C Technical Report 79-91
Integrity-Oriented Control Objectives: Proposed Revisions to the Trusted Computer System Evaluation Criteria (TCSEC), DoD; August 1991 IDA Document D-967
Use of the Trusted Computer System Evaluation Criteria (TCSEC) for Complex, Evolving, Multipolicy Systems; July 1994 NCSC Technical Report - 002
Turning Multiple Evaluated Products Into Trusted Systems, July 1994 NCSC Technical Report - 003