Ricoh Aficio MP 3352 Security Target - Page 3

Table of Contents

Page 3 highlights

Page 2 of 91 Table of Contents 1 ST Introduction ...7 1.1 ST Reference ...7 1.2 TOE Reference ...7 1.3 TOE Overview ...8 1.3.1 TOE Type ...8 1.3.2 TOE Usage...8 1.3.3 Major Security Features of TOE 11 1.4 TOE Description...11 1.4.1 Physical Boundary of TOE 11 1.4.2 Guidance Documents 14 1.4.3 Definition of Users ...17 1.4.3.1. Direct User ...17 1.4.3.2. Indirect User ...18 1.4.4 Logical Boundary of TOE 19 1.4.4.1. Basic Functions 19 1.4.4.2. Security Functions 22 1.4.5 Protected Assets ...24 1.4.5.1. User Data ...24 1.4.5.2. TSF Data ...25 1.4.5.3. Functions ...25 1.5 Glossary...25 1.5.1 Glossary for This ST 25 2 Conformance Claim...29 2.1 CC Conformance Claim 29 2.2 PP Claims...29 2.3 Package Claims ...29 2.4 Conformance Claim Rationale 30 2.4.1 Consistency Claim with TOE Type in PP 30 2.4.2 Consistency Claim with Security Problems and Security Objectives in PP ......... 30 2.4.3 Consistency Claim with Security Requirements in PP 31 3 Security Problem Definitions 34 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92

Page 2 of
91
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
...................................................................................................................
7
1.1
ST Reference
................................................................................................................
7
1.2
TOE Reference
.............................................................................................................
7
1.3
TOE Overview
..............................................................................................................
8
1.3.1
TOE Type
.....................................................................................................................
8
1.3.2
TOE Usage
...................................................................................................................
8
1.3.3
Major Security Features of TOE
...............................................................................
11
1.4
TOE Description
.........................................................................................................
11
1.4.1
Physical Boundary of TOE
........................................................................................
11
1.4.2
Guidance Documents
................................................................................................
14
1.4.3
Definition of Users
....................................................................................................
17
1.4.3.1.
Direct User
.........................................................................................................
17
1.4.3.2.
Indirect User
......................................................................................................
18
1.4.4
Logical Boundary of TOE
.........................................................................................
19
1.4.4.1.
Basic Functions
..................................................................................................
19
1.4.4.2.
Security Functions
.............................................................................................
22
1.4.5
Protected Assets
........................................................................................................
24
1.4.5.1.
User Data
...........................................................................................................
24
1.4.5.2.
TSF Data
............................................................................................................
25
1.4.5.3.
Functions
............................................................................................................
25
1.5
Glossary
......................................................................................................................
25
1.5.1
Glossary for This ST
.................................................................................................
25
2
Conformance Claim
...........................................................................................................
29
2.1
CC Conformance Claim
..............................................................................................
29
2.2
PP Claims
...................................................................................................................
29
2.3
Package Claims
..........................................................................................................
29
2.4
Conformance Claim Rationale
....................................................................................
30
2.4.1
Consistency Claim with TOE Type in PP
................................................................
30
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
30
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
31
3
Security Problem Definitions
............................................................................................
34