What do Protection Profiles describe?

A.
the list of protected objects
B.
a set of security requirements
C.
the security rights associated with users
D.
how a product implements its security policy
E.
the procedures for evaluating a product’s security features