Ricoh Aficio MP 6001 SP Security Target - Page 5

List of s, List of Tables

Page 5 highlights

Page 4 of 87 List of Figures Figure 1 : Example of TOE Environment ...9 Figure 2 : Hardware Configuration of the TOE 11 Figure 3 : Logical Scope of the TOE ...19 List of Tables Table 1 : Identification Information of TOE 6 Table 2 : Guidance for English Version-1 ...13 Table 3 : Guidance for English Version-2 ...14 Table 4 : Guidance for English Version-3 ...15 Table 5 : Guidance for English Version-4 ...16 Table 6 : Definition of Users ...18 Table 7 : List of Administrative Roles ...18 Table 8: Definition of User Data ...23 Table 9: Definition of TSF Data...24 Table 10: Specific Terms Related to This ST 24 Table 11: Rationale for Security Objectives 37 Table 12 : List of Auditable Events...44 Table 13 : List of Cryptographic Key Generation 47 Table 14: List of Cryptographic Operation 48 Table 15: List of Subjects, Objects, and Operations among Subjects and Objects (a 48 Table 16: List of Subjects, Objects, and Operations among Subjects and Objects (b 48 Table 17: Subjects, Objects and Security Attributes (a 49 Table 18: Rules on User Documents ...50 Table 19: Rules on User Jobs (a)...51 Table 20: Rules That Explicitly Authorise Access (a 51 Table 21: Subjects, Objects and Security Attributes (b 51 Table 22: Rules Governing the Operation for MFP Application (b 52 Table 23: List of Authentication Events and Unsuccessful Authentication Attempts 52 Table 24: List of Actions for Authentication Failure 53 Table 25: List of Security Attributes for Each User That Shall Be Maintained 53 Table 26: Rules for Initial Association of Attributes 55 Table 27: User Roles for Security Attributes (a 55 Table 28: User Roles for Security Attributes (b 56 Table 29: Properties of Static Attribute Initialisation (a 57 Table 30: Authorised Identified Roles Allowed to Override Default Values 58 Table 31: List of TSF Data...59 Table 32: List of Specification of Management Functions 60 Table 33: TOE Security Assurance Requirements (EAL3+ALC_FLR.2 62 Table 34: Relationship between Security Objectives and Functional Requirements 63 Table 35: Result of Dependency Analysis of TOE Security Functional Requirements 70 Table 36: Auditable Events and Audit Data 73 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

Page 4 of
87
List of Figures
Figure 1 : Example of TOE Environment
.......................................................................................................
9
Figure 2 : Hardware Configuration of the TOE
............................................................................................
11
Figure 3 : Logical Scope of the TOE
............................................................................................................
19
List of Tables
Table 1 : Identification Information of TOE
...................................................................................................
6
Table 2 : Guidance for English Version-1
.....................................................................................................
13
Table 3 : Guidance for English Version-2
.....................................................................................................
14
Table 4 : Guidance for English Version-3
.....................................................................................................
15
Table 5 : Guidance for English Version-4
.....................................................................................................
16
Table 6 : Definition of Users
.........................................................................................................................
18
Table 7 : List of Administrative Roles
..........................................................................................................
18
Table 8: Definition of User Data
...................................................................................................................
23
Table 9: Definition of TSF Data
....................................................................................................................
24
Table 10: Specific Terms Related to This ST
................................................................................................
24
Table 11: Rationale for Security Objectives
..................................................................................................
37
Table 12 : List of Auditable Events
...............................................................................................................
44
Table 13 : List of Cryptographic Key Generation
.........................................................................................
47
Table 14: List of Cryptographic Operation
...................................................................................................
48
Table 15: List of Subjects, Objects, and Operations among Subjects and Objects (a)
..................................
48
Table 16: List of Subjects, Objects, and Operations among Subjects and Objects (b)
..................................
48
Table 17: Subjects, Objects and Security Attributes (a)
................................................................................
49
Table 18: Rules on User Documents
.............................................................................................................
50
Table 19: Rules on User Jobs (a)
...................................................................................................................
51
Table 20: Rules That Explicitly Authorise Access (a)
...................................................................................
51
Table 21: Subjects, Objects and Security Attributes (b)
................................................................................
51
Table 22: Rules Governing the Operation for MFP Application (b)
.............................................................
52
Table 23: List of Authentication Events and Unsuccessful Authentication Attempts
...................................
52
Table 24: List of Actions for Authentication Failure
.....................................................................................
53
Table 25: List of Security Attributes for Each User That Shall Be Maintained
............................................
53
Table 26: Rules for Initial Association of Attributes
.....................................................................................
55
Table 27: User Roles for Security Attributes (a)
...........................................................................................
55
Table 28: User Roles for Security Attributes (b)
...........................................................................................
56
Table 29: Properties of Static Attribute Initialisation (a)
...............................................................................
57
Table 30: Authorised Identified Roles Allowed to Override Default Values
.................................................
58
Table 31: List of TSF Data
............................................................................................................................
59
Table 32: List of Specification of Management Functions
............................................................................
60
Table 33: TOE Security Assurance Requirements (EAL3+ALC_FLR.2)
.....................................................
62
Table 34: Relationship between Security Objectives and Functional Requirements
....................................
63
Table 35: Result of Dependency Analysis of TOE Security Functional Requirements
.................................
70
Table 36: Auditable Events and Audit Data
..................................................................................................
73
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.