Ricoh Aficio MP 8001 sec - Page 4

Security Objectives, Extended Components Definition, Security Requirements, TOE Summary - specifications

Page 4 highlights

Page 3 of 82 3.3 Assumptions 28 4 Security Objectives 29 4.1 Security Objectives for TOE 29 4.2 Security Objectives of Operational Environment 30 4.3 Security Objectives Rationale 30 4.3.1 Tracing...30 4.3.2 Tracing Justification 31 5 Extended Components Definition 34 6 Security Requirements 35 6.1 Security Functional Requirements 35 6.1.1 Class FAU: Security audit 35 6.1.2 Class FCS: Cryptographic support 40 6.1.3 Class FDP: User data protection 41 6.1.4 Class FIA: Identification and authentication 44 6.1.5 Class FMT: Security management 46 6.1.6 Class FPT: Protection of the TSF 53 6.1.7 Class FTP: Trusted path/channels 53 6.2 Security Assurance Requirements 55 6.3 Security Requirements Rationale 56 6.3.1 Tracing...56 6.3.2 Justification of Traceability 57 6.3.3 Dependency Analysis 61 6.3.4 Security Assurance Requirements Rationale 63 7 TOE Summary Specification 64 7.1 TOE Security Function 64 7.1.1 SF.AUDIT Audit Function 65 7.1.1.1 Generation of Audit Logs 66 7.1.1.2 Reading Audit Logs 67 7.1.1.3 Protection of Audit Logs 67 7.1.1.4 Time Stamps 67 7.1.2 SF.I&A User Identification and Authentication Function 67 7.1.2.1 User Identification and Authentication 68 7.1.2.2 Actions in Event of Identification and Authentication Failure 68 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 3 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
3.3
Assumptions
.................................................................................
28
4
Security Objectives
...............................................................................
29
4.1
Security Objectives for TOE
................................................................
29
4.2
Security Objectives of Operational Environment
........................................
30
4.3
Security Objectives Rationale
..............................................................
30
4.3.1
Tracing
......................................................................................................
30
4.3.2
Tracing Justification
...................................................................................
31
5
Extended Components Definition
...............................................................
34
6
Security Requirements
..........................................................................
35
6.1
Security Functional Requirements
........................................................
35
6.1.1
Class FAU: Security audit
...........................................................................
35
6.1.2
Class FCS: Cryptographic support
...............................................................
40
6.1.3
Class FDP: User data protection
..................................................................
41
6.1.4
Class FIA: Identification and authentication
................................................
44
6.1.5
Class FMT: Security management
...............................................................
46
6.1.6
Class FPT: Protection of the TSF
.................................................................
53
6.1.7
Class FTP: Trusted path/channels
...............................................................
53
6.2
Security Assurance Requirements
.........................................................
55
6.3
Security Requirements Rationale
..........................................................
56
6.3.1
Tracing
......................................................................................................
56
6.3.2
Justification of Traceability
.........................................................................
57
6.3.3
Dependency Analysis
..................................................................................
61
6.3.4
Security Assurance Requirements Rationale
.................................................
63
7
TOE Summary Specification
....................................................................
64
7.1
TOE Security Function
.....................................................................
64
7.1.1
SF.AUDIT
Audit Function
........................................................................
65
7.1.1.1
Generation of Audit Logs
......................................................................
66
7.1.1.2
Reading Audit Logs
..............................................................................
67
7.1.1.3
Protection of Audit Logs
.......................................................................
67
7.1.1.4
Time Stamps
.......................................................................................
67
7.1.2
SF.I&A
User Identification and Authentication Function
.............................
67
7.1.2.1
User Identification and Authentication
..................................................
68
7.1.2.2
Actions in Event of Identification and Authentication Failure
..................
68