Here's the stuff we found when you searched for "Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments"

If you Log in you could create a "Computer Security Requirements -- Guidance for Applying the DoD TCSEC in Specific Environments" node. If you don't already have an account, you can register here.