A strawman update to vol. 2 of 4 of the procurement guideline series. Deals with complex, evolving multipolicy systems. Facilitates the acquisition of trusted computer systems. Designed for new or experienced automated information system developers, purchasers, or program managers who must identify & satisfy requirements associated with security-relevant acquisitions.