{"id":199655,"date":"2023-02-26T17:18:06","date_gmt":"2023-02-26T08:18:06","guid":{"rendered":"https:\/\/kikakumaster.com\/mil-spec\/security-evaluation-document-sed\/"},"modified":"2023-03-03T13:40:51","modified_gmt":"2023-03-03T04:40:51","slug":"di-misc-81762","status":"publish","type":"mil-spec","link":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/","title":{"rendered":"DI-MISC-81762 &#8211; Security Evaluation Document (SED)"},"content":{"rendered":"<p>The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).<\/p><div id=\"kikak-640587253\" class=\"kikak- kikak-entity-placement\"><p><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=tuVq3VflqQM&amp;offerid=208750.10000028&amp;subid=0&amp;type=4\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=tuVq3VflqQM&amp;bids=208750.10000028&amp;subid=0&amp;type=4&amp;gridnum=16\" alt=\"American National Standards Institute Inc.\" border=\"0\" \/><\/a><\/p>\n<\/div>\n<p><a href=\"https:\/\/quicksearch.dla.mil\/qsDocDetails.aspx?ident_number=276538\">Go to DI-MISC-81762 at DAPS Quick Search ASSIST<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[3244],"tags":[],"sdo":[1337],"topic":[],"fsc":[3519],"document_type":[3246],"class_list":["post-199655","mil-spec","type-mil-spec","status-publish","hentry","category-data-item-description","sdo-us-dod","fsc-misc","document_type-data-item-description"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc<\/title>\n<meta name=\"description\" content=\"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc\" \/>\n<meta property=\"og:description\" content=\"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/\" \/>\n<meta property=\"og:site_name\" content=\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-03T04:40:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/\",\"url\":\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/\",\"name\":\"DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"isPartOf\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#website\"},\"datePublished\":\"2023-02-26T08:18:06+00:00\",\"dateModified\":\"2023-03-03T04:40:51+00:00\",\"description\":\"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).\",\"breadcrumb\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kikakumaster.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DI-MISC-81762 &#8211; Security Evaluation Document (SED)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#website\",\"url\":\"https:\/\/kikakumaster.com\/ja\/\",\"name\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"description\":\"Share your technical standard knowledge.\",\"publisher\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kikakumaster.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#organization\",\"name\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"url\":\"https:\/\/kikakumaster.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\"},\"image\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc","description":"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/","og_locale":"ja_JP","og_type":"article","og_title":"DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc","og_description":"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).","og_url":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/","og_site_name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","article_modified_time":"2023-03-03T04:40:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/","url":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/","name":"DI-MISC-81762 - Security Evaluation Document (SED) - \u898f\u683c\u30de\u30b9\u30bf\u30fc","isPartOf":{"@id":"https:\/\/kikakumaster.com\/ja\/#website"},"datePublished":"2023-02-26T08:18:06+00:00","dateModified":"2023-03-03T04:40:51+00:00","description":"Security Evaluation Document (SED) - The purpose of the Security Evaluation Document (SED) is to provide information about the architectural design of an Information Assurance (IA) product and its intended detailed implementation throughout the development\/design of the product. Sufficient detail is provided to determine adequacy of the design and ensure that appropriate system security requirements are met, while performing failsafe analysis of unauthorized events upon a system as well as analysis of covert channels and anti-tamper design. The SED is used to support security evaluations, and is a combination of previously used evaluation documentation that included Covert Channel Analysis Report (CCA), Theory of Design and Operation (TDO), Theory of Compliance (TOC), and Fail-Safe Design and Analysis (FSDA).","breadcrumb":{"@id":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kikakumaster.com\/ja\/mil-spec\/di-misc-81762\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kikakumaster.com\/ja\/"},{"@type":"ListItem","position":2,"name":"DI-MISC-81762 &#8211; Security Evaluation Document (SED)"}]},{"@type":"WebSite","@id":"https:\/\/kikakumaster.com\/ja\/#website","url":"https:\/\/kikakumaster.com\/ja\/","name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","description":"Share your technical standard knowledge.","publisher":{"@id":"https:\/\/kikakumaster.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kikakumaster.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/kikakumaster.com\/ja\/#organization","name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","url":"https:\/\/kikakumaster.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"\u898f\u683c\u30de\u30b9\u30bf\u30fc"},"image":{"@id":"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/mil-spec\/199655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/mil-spec"}],"about":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/types\/mil-spec"}],"wp:attachment":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/media?parent=199655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/categories?post=199655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/tags?post=199655"},{"taxonomy":"sdo","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/sdo?post=199655"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/topic?post=199655"},{"taxonomy":"fsc","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/fsc?post=199655"},{"taxonomy":"document_type","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/document_type?post=199655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}