Closed Security Environment
- An environment that includes those systems in which both the following conditions hold true. a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced malicious logic. Sufficient clearance is defined as follows: where the maximum classification of data to be processed is Confidential or below, developers are cleared and authorized to the same level as the most sensitive data; where the maximum classification of data to be processed is Secret or above, developers have at least a Secret clearance. b) Configuration control provides sufficient assurance that applications are protected against the introduction of malicious logic prior to and during operation of system applications. (CSC-STD-003-85;; CSC-STD-004-85;)
- An environment in which both of the following conditions hold true. a) Application developers (including maintainers) have sufficient clearances and authorizations to provide acceptable presumption that they have not introduced malicious logic. b) Configuration control provides sufficient assurance that applications and the equipment are protected against the introduction of malicious logic prior to and during the operation of system applications. (NCSC-WA-001-85;)