Ricoh Aficio MP 6001 SP Security Target - Page 72

Rationale for Removing Dependencies on FCS_CKM.4

Page 72 highlights

FDP_RIP.1 FIA_AFL.1 FIA_ATD.1 FIA_SOS.1 FIA_UAU.1 FIA_UAU.7 FIA_UID.1 FIA_USB.1 FPT_FDI_EXP.1 FMT_MSA.1(a) FMT_MSA.1(b) FMT_MSA.3(a) FMT_MSA.3(b) FMT_MTD.1 FMT_SMF.1 FMT_SMR.1 FPT_STM.1 FPT_TST.1 FTA_SSL.3 FTP_ITC.1 FMT_MSA.3(b) None FIA_UAU.1 None None FIA_UID.1 FIA_UAU.1 None FIA_ATD.1 FMT_SMF.1 FMT_SMR.1 [FDP_ACC.1(a) or FDP_IFC.1] FMT_SMR.1 FMT_SMF.1 [FDP_ACC.1(b) or FDP_IFC.1] FMT_SMR.1 FMT_SMF.1 FMT_MSA.1(a) FMT_SMR.1 FMT_MSA.1(b) FMT_SMR.1 FMT_SMR.1 FMT_SMF.1 None FIA_UID.1 None None None None FMT_MSA.3(b) None FIA_UAU.1 None None FIA_UID.1 FIA_UAU.1 None FIA_ATD.1 FMT_SMF.1 FMT_SMR.1 FDP_ACC.1(a) FMT_SMR.1 FMT_SMF.1 FDP_ACC.1(b) FMT_SMR.1 FMT_SMF.1 FMT_MSA.1(a) FMT_SMR.1 FMT_MSA.1(b) FMT_SMR.1 FMT_SMR.1 FMT_SMF.1 None FIA_UID.1 None None None None None None None None None None None None None None None None None None None None None None None None Page 71 of 87 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on FCS_CKM.4 Once the MFP administrator generates the cryptographic key that is used for the HDD encryption of this TOE at the start of TOE operation, the cryptographic key will be continuously used for the HDD and will not be deleted. Therefore, cryptographic key destruction by the standard method is unnecessary. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

Page 71 of
87
FMT_MSA.3(b)
FMT_MSA.3(b)
FDP_RIP.1
None
None
None
FIA_AFL.1
FIA_UAU.1
FIA_UAU.1
None
FIA_ATD.1
None
None
None
FIA_SOS.1
None
None
None
FIA_UAU.1
FIA_UID.1
FIA_UID.1
None
FIA_UAU.7
FIA_UAU.1
FIA_UAU.1
None
FIA_UID.1
None
None
None
FIA_USB.1
FIA_ATD.1
FIA_ATD.1
None
FPT_FDI_EXP.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
None
FMT_MSA.1(a)
[FDP_ACC.1(a) or
FDP_IFC.1]
FMT_SMR.1
FMT_SMF.1
FDP_ACC.1(a)
FMT_SMR.1
FMT_SMF.1
None
FMT_MSA.1(b)
[FDP_ACC.1(b)
or FDP_IFC.1]
FMT_SMR.1
FMT_SMF.1
FDP_ACC.1(b)
FMT_SMR.1
FMT_SMF.1
None
FMT_MSA.3(a)
FMT_MSA.1(a)
FMT_SMR.1
FMT_MSA.1(a)
FMT_SMR.1
None
FMT_MSA.3(b)
FMT_MSA.1(b)
FMT_SMR.1
FMT_MSA.1(b)
FMT_SMR.1
None
FMT_MTD.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
None
FMT_SMF.1
None
None
None
FMT_SMR.1
FIA_UID.1
FIA_UID.1
None
FPT_STM.1
None
None
None
FPT_TST.1
None
None
None
FTA_SSL.3
None
None
None
FTP_ITC.1
None
None
None
The following explains the rationale for acceptability in all cases where a dependency is not satisfied:
Rationale for Removing Dependencies on FCS_CKM.4
Once the MFP administrator generates the cryptographic key that is used for the HDD encryption of this
TOE at the start of TOE operation, the cryptographic key will be continuously used for the HDD and will not
be deleted. Therefore, cryptographic key destruction by the standard method is unnecessary.
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.