Ricoh Aficio MP 6001 SP Security Target - Page 75

FAU_SAR.2 Restricted audit review

Page 75 highlights

Page 74 of 87 Success and failure of new creation, modification, and deletion of destination folder -: No applicable expanded audit information (*1): The starting of Audit Function is substituted with the event of the TOE start-up. FAU_GEN.2 (User identity association) The TOE records each auditable event with the identification information (login user name) of the occurrence factor. FAU_SAR.1 (Audit review) The TOE allows only MFP administrator who are successfully identified and authenticated to read the audit log in a text format. The TOE provides its Web Function with the MFP administrator to read the audit log. FAU_SAR.2 (Restricted audit review) The TOE allows only MFP administrator who are successfully identified and authenticated to read and delete the audit log. The TOE provides its Web Function with the MFP administrator to read the audit log. FAU_STG.1 (Protected audit trail storage) The TOE provides only MFP administrator who are successfully identified and authenticated with the function to read and delete the audit log. It does not provide the users other than the MFP administrator with the function to access to the audit log. FAU_STG.4 (Prevention of audit data loss) The TOE writes the new audit log over the oldest audit log when there is insufficient space in the audit log files to append the new audit log. FCS_CKM.1 (Cryptographic key generation) The TOE generates the HDD cryptographic keys after receiving the operation instruction from the MFP administrator. If the logged-in user is the MFP administrator, the TOE displays a screen on the Operation Panel that the MFP administrator can use to generate the HDD cryptographic keys. The MFP administrator uses the Operation Panel to instruct the TOE to generate an HDD cryptographic key, and the TOE generates a 256 bit HDD cryptographic key using the TRNG cryptographic key generation algorithm (compliant with the BSI-AIS31 standard) and stores it in the memory area inside the TOE. FCS_COP.1 (Cryptographic operation) The TOE encrypts data before writing it to the HDD, and decrypts data after reading it from the HDD. This process is performed for all data written to and read from the HDD. The following are the specific cryptographic operations: Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88

Page 74 of
87
Success and failure of new
creation,
modification,
and
deletion of destination folder
-
-: No applicable expanded audit information
(*1): The starting of Audit Function is substituted with the event of the TOE start-up.
FAU_GEN.2 (User identity association)
The TOE records each auditable event with the identification information (login user name) of the
occurrence factor.
FAU_SAR.1 (Audit review)
The TOE allows only MFP administrator who are successfully identified and authenticated to read the audit
log in a text format. The TOE provides its Web Function with the MFP administrator to read the audit log.
FAU_SAR.2 (Restricted audit review)
The TOE allows only MFP administrator who are successfully identified and authenticated to read and delete
the audit log. The TOE provides its Web Function with the MFP administrator to read the audit log.
FAU_STG.1 (Protected audit trail storage)
The TOE provides only MFP administrator who are successfully identified and authenticated with the
function to read and delete the audit log. It does not provide the users other than the MFP administrator with
the function to access to the audit log.
FAU_STG.4 (Prevention of audit data loss)
The TOE writes the new audit log over the oldest audit log when there is insufficient space in the audit log
files to append the new audit log.
FCS_CKM.1 (Cryptographic key generation)
The TOE generates the HDD cryptographic keys after receiving the operation instruction from the MFP
administrator. If the logged-in user is the MFP administrator, the TOE displays a screen on the Operation
Panel that the MFP administrator can use to generate the HDD cryptographic keys.
The MFP administrator uses the Operation Panel to instruct the TOE to generate an HDD cryptographic key,
and the TOE generates a 256 bit HDD cryptographic key using the TRNG cryptographic key generation
algorithm (compliant with the BSI-AIS31 standard) and stores it in the memory area inside the TOE.
FCS_COP.1 (Cryptographic operation)
The TOE encrypts data before writing it to the HDD, and decrypts data after reading it from the HDD. This
process is performed for all data written to and read from the HDD. The following are the specific
cryptographic operations:
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.