. "* The types of security analysis performed of the system, including software and hardware, who performs the analysis, and whether the analysis is public." . . . .