How to Include Additional Operating Environments in Your Security Policy
Let’s assume that you have met the porting requirements for listing additional operating environments in your FIPS 140-2 Security Policy. (As a reminder, those requirements are detailed in the FIPS 140-2 …