Ricoh Aficio MP 8001 sec - Page 3

Table of Contents - problems

Page 3 highlights

Table of Contents Page 2 of 82 1 ST Introduction 7 1.1 ST Reference 7 1.2 TOE Reference 7 1.3 TOE Overview 9 1.3.1 TOE Type...9 1.3.2 TOE Usage and Major Security Features of TOE 9 1.3.3 Environment for TOE Usage and Non-TOE Configuration Items 10 1.4 TOE Description 12 1.4.1 Physical Boundary of TOE 12 1.4.2 Guidance Documents 15 1.4.3 User Roles 17 1.4.3.1 Responsible Manager of MFP 17 1.4.3.2 Administrator 17 1.4.3.3 Supervisor 17 1.4.3.4 General User 18 1.4.3.5 Customer Engineer 18 1.4.4 Logical Boundaries of TOE 18 1.4.4.1 Basic Functions 19 1.4.4.2 Security Functions 21 1.4.5 Protected Assets 25 1.4.5.1 Document Data 25 1.4.5.2 Print Data 25 2 Conformance Claim 26 2.1 CC Conformance Claim 26 2.2 PP Claims, Package Claims 26 2.3 Conformance Rationale 26 3 Security Problem Definitions 27 3.1 Threats 27 3.2 Organisational Security Policies 27 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 2 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction
....................................................................................
7
1.1
ST Reference
..................................................................................
7
1.2
TOE Reference
................................................................................
7
1.3
TOE Overview
................................................................................
9
1.3.1
TOE Type
....................................................................................................
9
1.3.2
TOE Usage and Major Security Features of TOE
............................................
9
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
....................
10
1.4
TOE Description
.............................................................................
12
1.4.1
Physical Boundary of TOE
..........................................................................
12
1.4.2
Guidance Documents
..................................................................................
15
1.4.3
User Roles
.................................................................................................
17
1.4.3.1
Responsible Manager of MFP
................................................................
17
1.4.3.2
Administrator
......................................................................................
17
1.4.3.3
Supervisor
...........................................................................................
17
1.4.3.4
General User
.......................................................................................
18
1.4.3.5
Customer Engineer
..............................................................................
18
1.4.4
Logical Boundaries of TOE
..........................................................................
18
1.4.4.1
Basic Functions
...................................................................................
19
1.4.4.2
Security Functions
...............................................................................
21
1.4.5
Protected Assets
.........................................................................................
25
1.4.5.1
Document Data
....................................................................................
25
1.4.5.2
Print Data
...........................................................................................
25
2
Conformance Claim
..............................................................................
26
2.1
CC Conformance Claim
.....................................................................
26
2.2
PP Claims, Package Claims
................................................................
26
2.3
Conformance Rationale
.....................................................................
26
3
Security Problem Definitions
...................................................................
27
3.1
Threats
.......................................................................................
27
3.2
Organisational Security Policies
...........................................................
27