Ricoh Aficio MP 6001 SP Security Target - Page 64
Security Requirements Rationale
View all Ricoh Aficio MP 6001 SP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 64 highlights
Assurance Classes ATE: Tests AVA: Vulnerability assessment ASE_TSS.1 ATE_COV.2 ATE_DPT.1 ATE_FUN.1 ATE_IND.2 AVA_VAN.2 Assurance Components TOE summary specification Analysis of coverage Testing: basic design Functional testing Independent testing - sample Vulnerability analysis Page 63 of 87 6.3 Security Requirements Rationale This section describes the rationale for security requirements. If all security functional requirements are satisfied as below, the security objectives defined in "4 Security Objectives" are fulfilled. 6.3.1 Tracing Table 34 shows the relationship between the TOE security functional requirements and TOE security objectives. Table 34 shows that each TOE security functional requirement fulfils at least one TOE security objective. Table 34: Relationship between Security Objectives and Functional Requirements O.DOC.NO_DI S O.DOC.NO_ALT O.FUNC.NO_ALT O.PROT.NO_ALT O.CONF.NO_DIS O.CONF.NO_ALT O.USER.AUTHORIZED O.INTERFACE.MANAGED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED O.STORAGE.ENCRYPTED FAU_GEN.1 FAU_GEN.2 FAU_STG.1 FAU_STG.4 FAU_SAR.1 FAU_SAR.2 FCS_CKM.1 FCS_COP.1 FDP_ACC.1(a) X X X X X X X X X X X Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.