Page 2 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction
....................................................................................
7
1.1
ST Reference
..................................................................................
7
1.2
TOE Reference
................................................................................
7
1.3
TOE Overview
................................................................................
9
1.3.1
TOE Type
....................................................................................................
9
1.3.2
TOE Usage and Major Security Features of TOE
............................................
9
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
....................
10
1.4
TOE Description
.............................................................................
12
1.4.1
Physical Boundary of TOE
..........................................................................
12
1.4.2
Guidance Documents
..................................................................................
15
1.4.3
User Roles
.................................................................................................
17
1.4.3.1
Responsible Manager of MFP
................................................................
17
1.4.3.2
Administrator
......................................................................................
17
1.4.3.3
Supervisor
...........................................................................................
17
1.4.3.4
General User
.......................................................................................
18
1.4.3.5
Customer Engineer
..............................................................................
18
1.4.4
Logical Boundaries of TOE
..........................................................................
18
1.4.4.1
Basic Functions
...................................................................................
19
1.4.4.2
Security Functions
...............................................................................
21
1.4.5
Protected Assets
.........................................................................................
25
1.4.5.1
Document Data
....................................................................................
25
1.4.5.2
Print Data
...........................................................................................
25
2
Conformance Claim
..............................................................................
26
2.1
CC Conformance Claim
.....................................................................
26
2.2
PP Claims, Package Claims
................................................................
26
2.3
Conformance Rationale
.....................................................................
26
3
Security Problem Definitions
...................................................................
27
3.1
Threats
.......................................................................................
27
3.2
Organisational Security Policies
...........................................................
27