Konica Minolta bizhub PRO 950 bizhub PRO 950 Security User Guide - Page 76

Table of items saved in audit log, Details of attack

Page 76 highlights

5 Administrator Security Functions 5.7 Table of items saved in audit log No. Operation ID 1 CE authentication CE ID 2 Administrator authentication Administrator ID 3 Set/change Security Strengthen mode Administrator ID 4 Print audit log Administrator ID 5 Change/register CE password CE ID 6 Change/register Administrator password CE ID/ Administrator ID 7 Create user by Administrator User ID 8 Change/register user User ID password by Administrator 9 Delete user by Administrator User ID 10 Change attributes of user by User ID Administrator 11 Password authentication for User ID user / Unregistered user ID 12 Change attributes of user by User ID user (user password, etc.) 13 Access to file (document data User ID readout) 14 Delete file (document data deletion) User ID 16 Password authentication for Secure user ID secure printing / Unregistered user ID 17 Access to secure print file Secure user ID 18 Delete secure print file Secure user ID 19 Change HDD lock password Administrator ID Stored action 01 02 03 04 05 06 07 08 09 10 11 12 13 14 16 17 18 19 Result OK/NG OK/NG OK OK OK OK OK OK OK OK OK/NG OK OK OK OK/NG OK OK OK The purpose of analyzing the audit log is to understand the following and implement countermeasures: Whether or not data was accessed or tampered with Subject of attack Details of attack Results of attack 68 bizhub PRO 950

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

5
Administrator Security Functions
68
bizhub PRO 950
5.7
Table of items saved in audit log
The purpose of analyzing the audit log is to understand the following and im-
plement countermeasures:
Whether or not data was accessed or tampered with
Subject of attack
Details of attack
Results of attack
No.
Operation
ID
Stored
action
Result
1
CE authentication
CE ID
01
OK/NG
2
Administrator authentication
Administrator ID
02
OK/NG
3
Set/change Security
Strengthen mode
Administrator ID
03
OK
4
Print audit log
Administrator ID
04
OK
5
Change/register CE
password
CE ID
05
OK
6
Change/register
Administrator password
CE ID/ Administrator
ID
06
OK
7
Create user by Administrator
User ID
07
OK
8
Change/register user
password by Administrator
User ID
08
OK
9
Delete user by Administrator
User ID
09
OK
10
Change attributes of user by
Administrator
User ID
10
OK
11
Password authentication for
user
User ID
/ Unregistered user ID
11
OK/NG
12
Change attributes of user by
user (user password, etc.)
User ID
12
OK
13
Access to file (document data
readout)
User ID
13
OK
14
Delete file (document data
deletion)
User ID
14
OK
16
Password authentication for
secure
printing
Secure user ID
/ Unregistered user ID
16
OK/NG
17
Access to
secure
print file
Secure user ID
17
OK
18
Delete
secure
print file
Secure user ID
18
OK
19
Change HDD lock password
Administrator ID
19
OK