Citation[edit | edit source]
Overview[edit | edit source]
The purpose of this document is to provide a description of the technical foundations, termed "models," that underlie secure information technology (IT). The intent is to provide, in a concise form, the models that should be considered in the design and development of technical security capabilities. These models encompass lessons learned, good practices, and specific technical considerations.
The intended audience consists of both government and private sectors including: