Ricoh Aficio MP 6001 SP Security Target - Page 63

Security Assurance Requirements

Page 63 highlights

6.1.8 Class FTP: Trusted path/channels Page 62 of 87 FTP_ITC.1 Inter-TSF trusted channel Hierarchical to: No other components. Dependencies: No dependencies. FTP_ITC.1.1 The TSF shall provide a communication channel between itself and another trusted IT product that is logically distinct from other communication channels and provides assured identification of its end points and protection of the channel data from modification or disclosure. FTP_ITC.1.2 The TSF shall permit [selection: the TSF, another trusted IT product] to initiate communication via the trusted channel. FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for [assignment: communication via the LAN of document data, function data, protected data, and confidential data]. 6.2 Security Assurance Requirements The evaluation assurance level of this TOE is EAL3+ALC_FLR.2. Table 33 lists the assurance components of the TOE. ALC_FLR.2 was added to the set of components defined in evaluation assurance level 3 (EAL3). Table 33: TOE Security Assurance Requirements (EAL3+ALC_FLR.2) Assurance Classes ADV: Development AGD: Guidance documents ALC: Life-cycle support ASE: Security Target evaluation ADV_ARC.1 ADV_FSP.3 ADV_TDS.2 AGD_OPE.1 AGD_PRE.1 ALC_CMC.3 ALC_CMS.3 ALC_DEL.1 ALC_DVS.1 ALC_LCD.1 ALC_FLR.2 ASE_CCL.1 ASE_ECD.1 ASE_INT.1 ASE_OBJ.2 ASE_REQ.2 ASE_SPD.1 Assurance Components Security architecture description Functional specification with complete summary Architectural design Operational user guidance Preparative procedures Authorisation controls Implementation representation CM coverage Delivery procedures Identification of security measures Developer defined life-cycle model Flaw reporting procedures Conformance claims Extended components definition ST introduction Security objectives Derived security requirements Security problem definition Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

Page 62 of
87
6.1.8
Class FTP: Trusted path/channels
FTP_ITC.1
Inter-TSF trusted channel
Hierarchical to:
No other components.
Dependencies:
No dependencies.
FTP_ITC.1.1
The TSF shall provide a communication channel between itself and another trusted IT product
that is logically distinct from other communication channels and provides assured identification
of its end points and protection of the channel data from modification or disclosure.
FTP_ITC.1.2
The TSF shall permit
[selection: the TSF, another trusted IT product]
to initiate
communication via the trusted channel.
FTP_ITC.1.3
The TSF shall initiate communication via the trusted channel for
[assignment: communication
via the LAN of document data, function data, protected data, and confidential data]
.
6.2
Security Assurance Requirements
The evaluation assurance level of this TOE is EAL3+ALC_FLR.2. Table 33 lists the assurance components
of the TOE. ALC_FLR.2 was added to the set of components defined in evaluation assurance level 3
(EAL3).
Table 33: TOE Security Assurance Requirements (EAL3+ALC_FLR.2)
Assurance Classes
Assurance Components
ADV_ARC.1
Security architecture description
ADV_FSP.3
Functional specification with complete summary
ADV:
Development
ADV_TDS.2
Architectural design
AGD_OPE.1
Operational user guidance
AGD:
Guidance documents
AGD_PRE.1
Preparative procedures
ALC_CMC.3
Authorisation controls
ALC_CMS.3
Implementation representation CM coverage
ALC_DEL.1
Delivery procedures
ALC_DVS.1
Identification of security measures
ALC_LCD.1
Developer defined life-cycle model
ALC:
Life-cycle support
ALC_FLR.2
Flaw reporting procedures
ASE_CCL.1
Conformance claims
ASE_ECD.1
Extended components definition
ASE_INT.1
ST introduction
ASE_OBJ.2
Security objectives
ASE_REQ.2
Derived security requirements
ASE:
Security Target evaluation
ASE_SPD.1
Security problem definition
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.