<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;</provider_name><provider_url>https://kikakumaster.com/ja/</provider_url><author_name>KikakuAdmin000</author_name><author_url>https://kikakumaster.com/ja/author/kikakuadmin000/</author_url><title>DI-MISC-81762 - Security Evaluation Document (SED) - &#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="TNN1jRdhQE"&gt;&lt;a href="https://kikakumaster.com/ja/mil-spec/di-misc-81762/"&gt;DI-MISC-81762 &#x2013; Security Evaluation Document (SED)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://kikakumaster.com/ja/mil-spec/di-misc-81762/embed/#?secret=TNN1jRdhQE" width="600" height="338" title="&#x201C;DI-MISC-81762 &#x2013; Security Evaluation Document (SED)&#x201D; &#x2014; &#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;" data-secret="TNN1jRdhQE" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://kikakumaster.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).</description></oembed>
