EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1310 Feb 2015 - 09:09ThomasMisa 
1220 Jan 2015 - 15:28ThomasMisa 
1120 Jan 2015 - 15:21ThomasMisa 
1005 Jan 2015 - 20:29ThomasMisa 
905 Jan 2015 - 20:28ThomasMisaAttached file RainbowSeries_documents-sm.jpg 
804 Jan 2015 - 23:12ThomasMisaAttached file RainbowSeries_documents.jpg 
710 Nov 2014 - 12:58ThomasMisa 
610 Nov 2014 - 12:38ThomasMisa 
503 Oct 2013 - 15:31norqu036? 
427 Mar 2013 - 09:43NicLewis 
earlier first

Render style:     Context:


 History: r13 | r9 < r8 < r7 < r6
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubRainbowSeries (revision 7)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

Rainbow Series

 

The "Rainbow Series" was a series of computer security standards and guidelines published during the 1980s and the 1990s. The series was originally produced under the Department of Defense, then by the National Computer Security Center. "Rainbow" refers to the colors of the various book covers, beginning with the Orange Book (TCSEC) in 1983. The books in the series cover a wide range of topics in computing security, including, for example, system evaluation criteria, password management, and trusted system recovery.

Additional Resources:

Individual Rainbow Series Volumes:

  • TCSEC.pdf: DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supercedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book).

  • CSC-STD-003-85LightYellow.pdf: Computer Security Requirements—Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985 (Light Yellow Book).

  • CSC-STD-004-85Yellow.pdf: Technical Rational Behind CSC-STD-003-85: Computer Security Requirements—Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985. (Yellow Book).

  • N-C-1-87.pdf: NTISSAM COMPUSEC/1-87 - Advisory Memorandum on Office Automation Security Guidelines.

  • NCSC-TG-001-2Tan.pdf: A Guide to Understanding Audit in Trusted Systems 1 June 1988, Version 2. (Tan Book).

  • NCSC-TG-003NeonOrange.pdf: A Guide to Understanding Discretionary Access Control in Trusted Systems, 30 September 1987. (Neon Orange Book).

  • NCSC-TG-005Red.pdf: Trusted Network Interpretation of the TCSEC (TNI), 31 July 1987. (Red Book).

  • NCSC-TG-006Amber.pdf: A Guide to Understanding Configuration Management in Trusted Systems, 28 March 1988. (Amber Book).

  • NCSC-TG-007Burgundy.pdf: A Guide to Understanding Design Documentation in Trusted Systems, 6 October 1988. (Burgundy Book).

  • NCSC-TG-008DarkLavender.pdf: A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book).

  • NCSC-TG-010Aqua.pdf: A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book).

  • NCSC-TG-011Red.pdf: Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book).

  • NCSC-TG-015Brown.pdf: A Guide to Understanding Trusted Facility Management, 18 October 1989 (Brown Book).

  • NCSC-TG-017LightBlue.pdf: A Guide to Understanding Identification and Authentication in Trusted Systems, September 1991. (Light Blue Book).

  • NCSC-TG-020-ASilver.pdf: Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)

  • NCSC-TG-021Purple.pdf: Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book).

  • NCSC-TG-022Yellow.pdf: A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book).

  • NCSC-TG-023BrightOrange.pdf: A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book).

  • NCSC-TG-024-1Purple.pdf: A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)

  • NCSC-TG-024-2Purple.pdf: A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book).

  • NCSC-TG-024-3Purple.pdf: A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book).

  • NCSC-TG-025.2ForestGreen.pdf: A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book).

  • NCSC-TG-026HotPeach.pdf: A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book).

  • NCSC-TG-027Turquoise.pdf: A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquoise Book).

  • NCSC-TG-029Blue.pdf: Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book).

  • NCSC-TG-030LightPinkP1.pdf: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book) Part 1.

  • NCSC-TG-030LightPinkP2.pdf: A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book) Part 2.

-- Main.lewi0740 - 03 Oct 2012

Topic attachments
ISorted descending Attachment Action Size Date Who Comment
pdfpdf csc-std-002-85green.pdf manage 103.8 K 20 Feb 2013 - 10:43 NicLewis Green Book.
pdfpdf csc-std-003-85lightyellow.pdf manage 57.6 K 20 Feb 2013 - 10:44 NicLewis Computer Security Requirements—Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985 (Light Yellow Book).
pdfpdf csc-std-004-85yellow.pdf manage 125.8 K 20 Feb 2013 - 10:45 NicLewis Technical Rational Behind CSC-STD-003-85: Computer Security Requirements—Guidance for Applying the DoD TCSEC in Specific Environments, 25 June 1985. (Yellow Book).
pdfpdf n-c-1-87.pdf manage 107.2 K 20 Feb 2013 - 10:46 NicLewis NTISSAM COMPUSEC/1-87 - Advisory Memorandum on Office Automation Security Guidelines.
pdfpdf ncsc-tg-001-2tan.pdf manage 49.8 K 20 Feb 2013 - 10:46 NicLewis A Guide to Understanding Audit in Trusted Systems 1 June 1988, Version 2. (Tan Book).
pdfpdf ncsc-tg-002brightblue.pdf manage 85.1 K 20 Feb 2013 - 10:47 NicLewis Trusted Product Evaluations - A Guide for Vendors, 22 June 1990. (Bright Blue Book).
pdfpdf ncsc-tg-003neonorange.pdf manage 65.1 K 20 Feb 2013 - 10:47 NicLewis A Guide to Understanding Discretionary Access Control in Trusted Systems, 30 September 1987. (Neon Orange Book).
pdfpdf ncsc-tg-004tealgreen.pdf manage 144.5 K 20 Feb 2013 - 10:48 NicLewis Glossary of Computer Security Terms, 21 October 1988. (Teal Green Book).
pdfpdf ncsc-tg-005red.pdf manage 1260.3 K 20 Feb 2013 - 10:49 NicLewis Trusted Network Interpretation of the TCSEC (TNI), 31 July 1987. (Red Book).
pdfpdf ncsc-tg-006amber.pdf manage 66.3 K 20 Feb 2013 - 10:49 NicLewis A Guide to Understanding Configuration Management in Trusted Systems, 28 March 1988. (Amber Book).
pdfpdf ncsc-tg-007burgundy.pdf manage 102.4 K 20 Feb 2013 - 10:53 NicLewis A Guide to Understanding Design Documentation in Trusted Systems, 6 October 1988. (Burgundy Book).
pdfpdf ncsc-tg-008darklavender.pdf manage 116.6 K 20 Feb 2013 - 10:54 NicLewis A Guide to Understanding Trusted Distribution in Trusted Systems 15 December 1988. (Dark Lavender Book).
pdfpdf ncsc-tg-009veniceblue.pdf manage 110.0 K 20 Feb 2013 - 10:55 NicLewis Computer Security Subsystem Interpretation of the TCSEC 16 September 1988. (Venice Blue Book).
pdfpdf ncsc-tg-010aqua.pdf manage 490.4 K 20 Feb 2013 - 10:55 NicLewis A Guide to Understanding Security Modeling in Trusted Systems, October 1992. (Aqua Book).
pdfpdf ncsc-tg-011red.pdf manage 185.3 K 20 Feb 2013 - 10:55 NicLewis Trusted Network Interpretation Environments Guideline - Guidance for Applying the TNI, 1 August 1990. (Red Book).
pdfpdf ncsc-tg-013.2pink.pdf manage 331.4 K 20 Feb 2013 - 10:56 NicLewis RAMP Program Document, 1 March 1995, Version 2 (Pink Book).
pdfpdf ncsc-tg-014purple.pdf manage 84.2 K 20 Feb 2013 - 10:56 NicLewis Guidelines for Formal Verification Systems, 1 April 1989. (Purple Book).
pdfpdf ncsc-tg-015brown.pdf manage 131.2 K 20 Feb 2013 - 10:57 NicLewis A Guide to Understanding Trusted Facility Management, 18 October 1989 (Brown Book).
pdfpdf ncsc-tg-016yellowgreen.pdf manage 115.4 K 20 Feb 2013 - 10:58 NicLewis Guidelines for Writing Trusted Facility Manuals, October 1992. (Yellow-Green Book).
pdfpdf ncsc-tg-017lightblue.pdf manage 64.6 K 20 Feb 2013 - 10:59 NicLewis A Guide to Understanding Identification and Authentication in Trusted Systems, September 1991. (Light Blue Book).
pdfpdf ncsc-tg-018lightblue.pdf manage 55.8 K 20 Feb 2013 - 10:59 NicLewis A Guide to Understanding Object Reuse in Trusted Systems, July 1992. (Light Blue Book).
pdfpdf ncsc-tg-019.2blue.pdf manage 107.7 K 20 Feb 2013 - 11:00 NicLewis Trusted Product Evaluation Questionaire, 2 May 1992, Version 2. (Blue Book).
pdfpdf ncsc-tg-020-asilver.pdf manage 185.1 K 20 Feb 2013 - 11:00 NicLewis Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System, 7 July 1989. (Silver Book)
pdfpdf ncsc-tg-021purple.pdf manage 273.0 K 20 Feb 2013 - 11:01 NicLewis Trusted Database Management System Interpretation of the TCSEC (TDI), April 1991. (Purple Book).
pdfpdf ncsc-tg-022yellow.pdf manage 103.3 K 20 Feb 2013 - 11:01 NicLewis A Guide to Understanding Trusted Recovery in Trusted Systems, 30 December 1991. (Yellow Book).
pdfpdf ncsc-tg-023brightorange.pdf manage 224.0 K 20 Feb 2013 - 11:02 NicLewis A Guide to Understanding Security Testing and Test Documentation in Trusted Systems (Bright Orange Book).
pdfpdf ncsc-tg-024-1purple.pdf manage 396.8 K 20 Feb 2013 - 11:02 NicLewis A Guide to Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements, December 1992. (Purple Book)
pdfpdf ncsc-tg-024-2purple.pdf manage 149.4 K 20 Feb 2013 - 11:03 NicLewis A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators, 30 June 1993. (Purple Book).
pdfpdf ncsc-tg-024-3purple.pdf manage 119.4 K 20 Feb 2013 - 11:03 NicLewis A Guide to Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description Tutorial, 28 February 1994. (Purple Book).
pdfpdf ncsc-tg-025.2forestgreen.pdf manage 71.2 K 20 Feb 2013 - 11:04 NicLewis A Guide to Understanding Data Remanence in Automated Information Systems, September 1991, Version 2, (Supercedes CSC-STD-005-85). (Forest Green Book).
pdfpdf ncsc-tg-026hotpeach.pdf manage 78.3 K 20 Feb 2013 - 11:04 NicLewis A Guide to Writing the Security Features User's Guide for Trusted Systems, September 1991. (Hot Peach Book).
pdfpdf ncsc-tg-027turquoise.pdf manage 186.4 K 20 Feb 2013 - 11:05 NicLewis A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems, May 1992. (Turquoise Book).
pdfpdf ncsc-tg-028violet.pdf manage 203.0 K 20 Feb 2013 - 11:05 NicLewis Assessing Controlled Access Protection, 25 May 1992. (Violet Book).
pdfpdf ncsc-tg-029blue.pdf manage 202.3 K 20 Feb 2013 - 11:06 NicLewis Introduction to Certification and Accreditation Concepts, January 1994. (Blue Book).
pdfpdf ncsc-tg-030lightpinkp1.pdf manage 1294.5 K 20 Feb 2013 - 11:06 NicLewis A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book) Part 1.
pdfpdf ncsc-tg-030lightpinkp2.pdf manage 491.5 K 20 Feb 2013 - 11:07 NicLewis A Guide to Understanding Covert Channel Analysis of Trusted Systems, November 1993. (Light Pink Book) Part 2.
Edit | WYSIWYG | Attach |  PDF |  History: r13 | r9 < r8 < r7 < r6 |  Backlinks |  Raw View | More topic actions...
Topic revision: r7 - 10 Nov 2014 - 12:58:40 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback