X hits on this document

PDF document

National Information Assurance Partnership - page 3 / 16

45 views

0 shares

0 downloads

0 comments

3 / 16

VALIDATION REPORT Primavera® P6™ Enterprise Project Portfolio Management (Version 6.2.1)

Table of Contents

1

1.1 1.2 1.3

Executive Summary ........................................................................................1 Evaluation Details.....................................................................................2 Interpretations ...........................................................................................3 Threats.......................................................................................................3

2 3

3.1 3.2 3.3

Identification ...................................................................................................3

Security Policy ................................................................................................3 User Data Protection .................................................................................3 Identification and Authentication .............................................................3 Security Management ...............................................................................4

4

4.1

Assumptions....................................................................................................4 Clarification of Scope ...............................................................................4

5 6 7

7.1 7.2 7.3

Architectural Information ...............................................................................4 Documentation................................................................................................7

Product Testing ...............................................................................................7 Developer Testing.....................................................................................7 Evaluation Team Independent Testing .....................................................8 Penetration Testing ...................................................................................9

8 9 10 11 12 13 14

Evaluated Configuration ...............................................................................10 Results of the Evaluation ..............................................................................10 Validator Comments/Recommendations ......................................................11 Annexes.........................................................................................................11 Security Target..............................................................................................11 Glossary ........................................................................................................12 Bibliography .................................................................................................12

iii

Document info
Document views45
Page views45
Page last viewedFri Dec 09 19:00:50 UTC 2016
Pages16
Paragraphs325
Words4531

Comments