AIR FORCE MIL-HDBK-1785-1995 HANDBOOK FOR SYSTEM SECURITY ENGINEERING PROGRAM MANAGEMENT REQUIREMENTS《工程项目管理要求安全系统手册》.pdf
《AIR FORCE MIL-HDBK-1785-1995 HANDBOOK FOR SYSTEM SECURITY ENGINEERING PROGRAM MANAGEMENT REQUIREMENTS《工程项目管理要求安全系统手册》.pdf》由会员分享,可在线阅读,更多相关《AIR FORCE MIL-HDBK-1785-1995 HANDBOOK FOR SYSTEM SECURITY ENGINEERING PROGRAM MANAGEMENT REQUIREMENTS《工程项目管理要求安全系统手册》.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、 UIL-HDBK-L7BS = 9999970 0210703 LBO NOT: FIL.STD.1785 has been redesignated a5 a handbook, and is to be used for guidance purposes only. This document is no longer to be cited as a requirement. For administrative expediency , the on1 y physi cal change from MIL-STD-1785 is this cover page. However,
2、 this document is no longer to be cited as a requirement, If cited as a requirement. contractors may disregard the requirements of this document and interpret its contents only as guidance. DEPARTMENT OF DEFENSE HANDBOOK FOR SYSTEM SECURITY ENGINEERING PROGRAM MANAGEMENT REQUIREMENTS 1 NOTsF$R?FENT
3、1 MIL-HDBK-1785 1 Ausust 1995 SUPERSED I NG MI L -STD - I785 1 September 1989 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-MIL-HDBK-1785 9999970 0230704 017 MIL-STD-1785 DEPARTMENT OF DEFENSE WASHINGTON DC 20301 System Security Engineering (SSE) M
4、anagement Progiam Requirements MIL-STD-1785. 1. This military standard is approved for use by all Departments and Agencies of the Department of Defense. 2. Beneficial comments (recommendations, additions, deletions) and any pertinent data which may improve this document is addressed to: Headquarters
5、 Air Force Systems Comrnand, Office of the Chief of Security Police, Andrews AFB, Washington, DC 20334. Use the self addressed standardized Document Improvement Proposal (DD Form 1426) at the end of this document or send comments by letter. . Provided by IHSNot for ResaleNo reproduction or networkin
6、g permitted without license from IHS-,-,-m 9999970 0230705 753 m MIL-HDBK-1785 HI L- STD- 17 8 5 FOREWORD The primary objective of the System Security Engineering Management program is to minimize or contain defense system vulnerabilities to known or postulated security threats. Scientific and engin
7、eering principles are applied during design and development to identify and reduce these vulnerabilities. Management techniques include life cycle considerations to ensure identified threats and vulnerabilities are contained. The basic premise of SSE philosophy is recognition that an initial investm
8、ent in “engineering-out“ security vulnerabilities and “designing-in“ countermeasures is a long term cost saving meacurz-. SSE is integrated with the system acquisition planning process to identify life cycle security threats and vulnerabilities, and concentrate on defense system susceptibility to da
9、mage, compronise or destruction. iii Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-Pa rasraph 1 . 1.1 1.2 1.2.1 1.2.2 2 . 2.1 2.1 2.2 2.3 3 . 3.1 3.2 3.3 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 3.23 3.24
10、 3.25 3.26 3.4 MIL-HDBK-L785 m 70 0230706 T MIL-STD- 17 8 5 CONTENTS Paqe SCOPE 1 Purpose 1 Tailoring Task Descriptions 1 Application Guidance 1 . 1 Applicability . REFERENCE DOCUMENTS 2 Government Documents 2 Specifications. Standards and Handbooks 2 Order of Precedence 2 Source of Documents 2 . .
11、DEFINITIONS . Acquisition Program Adversary Scenario . Adversary Model Carve-out Configuration Item (CI) Cost Trade-offs Countermeasure . Electronic Security Facilities . Integrated Logistics Support . Life Cycle Cost (LcC) Logistics Support Analysis (LSA) . Maintainability Maintenance Concept Secur
12、ity Criteria Security Subsystem . Security System Subsystem System . System Security Engineering Management . System Security Management Plan (SSMP) . Technology Trade-offs Threat Validation Vulnerability Operational Test and Evaluation System Security Engineering (SSE) 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4
13、 4 5 5 5 5 5 5 5 5 6 6 6 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-MIL-HDBK-2785 9999970 0230707 826 MIL-STD-17 85 CONTENTS (contfd) Paraqraph 4 . GENERAL REQUIREMENTS 4.1 SSE Management Program . 4.2 SSE Program Requirements . 4.2.1 Concept Ex
14、ploration Phase 4.2.2 Demonstration and Validation Phase . 4.2.3 Full-scale Development Phase . 4.2.4 Production and Deployment Phase 5 . DETAILED REQUIREMENTS . 5.1 Purpose 5.2 Application Guidance . 5.3 Task Requirements 5.3.1 Concept Exploration Phase 5.3.1.1 System Security Management Plan 5.3.1
15、.2 Threat Definition and Analysis . 5.3.1.3 Preliminary System Security Concept 5.3.1.4 Security Requirements Definition . 5.3.1.5 Technology Assessments and Cost Studies 5.3.1.6 Logistics Support 5.3.1.7 Security Training Requirements . 5.3.1.8 R and develop recommendations for engineering changes
16、to eliminate or mitigate vulnerabilities consistent with other design and operational considerations. SSE supports the development of programs and standards to provide life cycle security for critical defense resources. 1.2 Amlicabilitv. Tasks described here are selectively applied in DOD contract s
17、pecifications, request for proposals, statements of work and Government in-house efforts requiring a system security engineering management program. The word llcontractorsl include Government activities developing military systems, equipment and facilities. This standard may also apply to initial de
18、sign of new facilities or modifications to existing ones. 1.2.1 Tailorins Task DescriRtions. Task descriptions are tailored as needed and applied to system security engineering management programs. When preparing a proposal the contractor may include additional tasks and modify these tasks as long a
19、s supporting rationale is provided. 1.2.2 Application Guidance. Government and industrial organizations responsible for system security engineering management programs must select tasks which can materially aid in attaining overall security objectives in a cost effective manner. they may be tailored
20、. Further, the timing and depth required during the various acquisition phases are often driven by interface with other ongoing program activities. For these reasons, specific rules are not defined for all task requirements. Once tasks have been selected, 1 Provided by IHSNot for ResaleNo reproducti
21、on or networking permitted without license from IHS-,-,-MIL-8TD-1785 2. REFERENCE DOCUMENTS 2.1 Government Documents. 2.1.1 Specifications. Standards and Handbooks. Unless otherwise indicated, specifications, standards, and handbooks listed in the Department of Defense Index of Specification and Sta
22、ndards (DODISS) for solicitations form a part of this standard to the extent cited below. STANDARDS : MILITARY MIL-STD-4 7 O Maintainability Program for System and Equipment MIL-STD-490 Specification Practice MIL-STD-499 Engineering Management MIL-STD-78 5 Reliability Program for System and Equipmen
23、t Development and Production MIL-STD-1388-1 Logistics Support Analysis 2.2 Order of Precedence. In the event of conflict between the text of this standard and the references, the text of this standard takes precedence. 2.3 Source of Documents. Copies of military standards, specifications and associa
24、ted documents listed in the Department of Defense Index of Specifications and Standards are available from the Department of Defense Single Stock Paint, Commanding Officer,Naval Publications and Forms Center, 5801 Tabor Avenue, Philadelphia, PA 19120. sponsoring industry association. Copies of all l
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AIRFORCEMILHDBK17851995HANDBOOKFORSYSTEMSECURITYENGINEERINGPROGRAMMANAGEMENTREQUIREMENTS 工程项目 管理 要求 安全

链接地址:http://www.mydoc123.com/p-427847.html