Add some rough security requirements, assumptions, threats
Summarize and copy some security requirements, assumptions, and threats from NIAP OS PP and BSI OS PP.
Loading
Please sign in to comment
Summarize and copy some security requirements, assumptions, and threats from NIAP OS PP and BSI OS PP.