About CommentOnThis.comThis is a site designed to make it easier to take the core of large published reports and allow anyone to comment on them. More... |
8.7.7 The confidentiality of information assets might be compromised through faulty hardware and software components. Use of components which have been assured through the CCT Mark, CAPS, or a similar scheme should be preferred during system design, to give confidence to system designers that the Vendor's security functionality claims have been validated. Comment |