This family defines the rules for the protection from unauthorised disclosure of TSF data moving between the TSF and a remote trusted IT product. Examples of this data are TSF critical data such as passwords, keys, audit data, or TSF executable code.
User notes
This family is used in a distributed system context where the TSF is providing TSF data to a remote trusted IT product. The TSF can only take the measures at its site and cannot be held responsible for the behaviour of the other trusted IT product.