Rainbow Series

From HandWiki
A complete set of the US DoD Rainbow Series computer security documents

The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defense Computer Security Center, and then by the National Computer Security Center.

Objective

These standards describe a process of evaluation for trusted systems. In some cases, U.S. government entities (as well as private firms) would require formal validation of computer technology using this process as part of their procurement criteria. Many of these standards have influenced, and have been superseded by, the Common Criteria.

The books have nicknames based on the color of its cover. For example, the Trusted Computer System Evaluation Criteria was referred to as "The Orange Book."[1] In the book entitled Applied Cryptography, security expert Bruce Schneier states of NCSC-TG-021 that he "can't even begin to describe the color of [the] cover" and that some of the books in this series have "hideously colored covers." He then goes on to describe how to receive a copy of them, saying "Don't tell them I sent you."[2]

Most significant Rainbow Series books

NIST Rainbow Series
Document Title Date Color
5200.28-STD DoD Trusted Computer System Evaluation Criteria 1983 Orange     
CSC-STD-002-85 DoD Password Management Guideline 1985 Green     
CSC-STD-003-85 Guidance for Applying TCSEC in Specific Environments 1985 Light Yellow     
CSC-STD-004-85 Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements 1985 Yellow     
NCSC-TG-001 A Guide to Understanding Audit in Trusted Systems 1988 Tan     
NCSC-TG-002 Trusted Product Security Evaluation Program 1990 Bright Blue     
NCSC-TG-003 Discretionary Access Control in Trusted Systems 1987 Neon Orange     
NCSC-TG-004 Glossary of Computer Security Terms 1988 Teal Green     
NCSC-TG-005 Trusted Network Interpretation 1987 Red     
NCSC-TG-006 Configuration Management in Trusted Systems 1988 Amber     
NCSC-TG-007 A Guide to Understanding Design Documentation in Trusted Systems 1988 Burgundy     
NCSC-TG-008 A Guide to Understanding Trusted Distribution in Trusted Systems 1988 Dark Lavender     
NCSC-TG-009 Computer Security Subsystem Interpretation of the TCSEC 1988 Venice Blue     
NCSC-TG-010 A Guide to Understanding Security Modeling in Trusted Systems 1992 Aqua     
NCSC-TG-011 Trusted Network Interpretation Environments Guideline (TNI) 1990 Red     
NCSC-TG-012 Trusted Database Management System Interpretation [3] 1991     
NCSC-TG-013 RAMP Program Document 1989 Pink     
NCSC-TG-013 V2 RAMP Program Document version 2 1995 Pink     
NCSC-TG-014 Guidelines for Formal Verification Systems 1989 Purple     
NCSC-TG-015 Guide to Understanding Trusted Facility Management 1989 Brown     
NCSC-TG-016 Guidelines for Writing Trusted Facility Manuals 1992 Yellow-Green     
NCSC-TG-017 Identification and Authentication in Trusted Systems 1991 Light Blue     
NCSC-TG-018 Object Reuse in Trusted Systems 1992 Light Blue     
NCSC-TG-019 Trusted Product Evaluation Questionnaire 1992 Blue     
NCSC-TG-020 Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System 1989 Silver     
NCSC-TG-020-A Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System 1989 Grey Silver     
NCSC-TG-021 Trusted Database Management System Interpretation of the TCSEC (TDI) 1991 Purple     
NCSC-TG-022 Trusted Recovery in Trusted Systems 1991 Yellow     
NCSC-TG-023 Security Testing and Test Documentation in Trusted Systems 1993 Bright Orange     
NCSC-TG-024 Vol. 1/4 Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements 1992 Purple     
NCSC-TG-024 Vol. 2/4 Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work 1993 Purple     
NCSC-TG-024 Vol. 3/4 Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description 1994 Purple     
NCSC-TG-024 Vol. 4/4 Procurement of Trusted Systems: How to Evaluate a Bidder's Proposal Document Publication TBA Purple     
NCSC-TG-025 Guide to Understanding Data Remanence in Automated Information Systems. 1991 Forest Green     
NCSC-TG-026 Writing the Security Features User's Guide for Trusted Systems 1991 Hot Peach     
NCSC-TG-027 Information System Security Officer Responsibilities for Automated Information Systems 1992 Turquoise     
NCSC-TG-028 Assessing Controlled Access Protection 1992 Violet     
NCSC-TG-029 Certification and Accreditation Concepts 1994 Blue     
NCSC-TG-030 Covert Channel Analysis of Trusted Systems 1993 Light Pink     

References

  1. Steve Lipner, "The Birth and Death of the Orange Book" IEEE Annals of the History of Computing 37 no. 2 (2015): 19-31 at DOI
  2. Schneier, Bruce (1996), Applied Cryptography (2nd ed.), New York, NY: John Wiley and Sons, ISBN 978-0-471-11709-4 
  3. https://biotech.law.lsu.edu/blaw/dodd/corres/pdf/85101m_0700/p85101m.pdf[bare URL PDF]

External links