Ricoh Aficio MP 6001 SP Security Target - Page 37
OE.PHYSICAL.MANAGED Physical management
View all Ricoh Aficio MP 6001 SP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 37 highlights
Page 36 of 87 appropriately configure the firewall according to the guidance document, and prevent the attacks to the LAN from the Internet. Also, the responsible manager of MFP shall instruct the MFP administrators to close the unused LAN ports and disable the USB use at the time of installation according to the guidance document. 4.2.2 Non-IT Environment OE.PHYSICAL.MANAGED Physical management According to the guidance document, the TOE shall be placed in a secure or monitored area that provides protection from physical access to the TOE by unauthorised persons. OE.USER.AUTHORIZED Assignment of user authority The responsible manager of MFP shall grant login user name, login password and user role (supervisor, MFP administrator or normal user) to persons who follow the security policies and procedures of their organisation to be authorised to use the TOE. OE.USER.TRAINED User training The responsible manager of MFP shall train users according to the guidance document and ensure that users are aware of the security policies and procedures of their organisation and have the competence to follow those policies and procedures. OE.ADMIN.TRAINED Administrator training The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their organisation; have the training, competence, and time to follow the guidance document; and correctly configure and operate the TOE according to those policies and procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select administrators who will not use their privileged access rights for malicious purposes according to the guidance document. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to the guidance document for detecting security violations or unusual patterns of activity. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.