Ricoh Aficio MP 8001 sec - Page 41
FAU_STG.4, Prevention of audit data loss, Class FCS: Cryptographic support, FCS_CKM.1 Cryptographic
View all Ricoh Aficio MP 8001 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 41 highlights
Page 40 of 82 FAU_STG.1.2 The TSF shall be able to [selection: prevent] unauthorised modifications to the stored audit records in the audit trail. FAU_STG.4 Prevention of audit data loss Hierarchical to: FAU_STG.3 Action in case of possible audit data loss. Dependencies: FAU_STG.1 Protected audit trail storage. FAU_STG.4.1 The TSF shall [selection: overwrite the oldest stored audit records] and [assignment: no other actions to be taken in case of audit storage failure]if the audit trail is full. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction. FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm shown in Table 6] and specified cryptographic key size [assignment: cryptographic key size shown in Table 6] that meet the following: [assignment: standard shown in Table 6]. Table 6: List of cryptographic key generation Key type HDD cryptographic key Standard BSI-AIS31 Cryptographic key generation algorithm TRNG Cryptographic key size 256 bits FCS_COP.1 Cryptographic operation Hierarchical to: No other components. Dependencies: [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction. FCS_COP.1.1 The TSF shall perform [assignment: cryptographic operations shown in Table 7 ] in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm shown in Table 7] and cryptographic key sizes [assignment: cryptographic key size shown in Table 7] that meet the following: [assignment: standards shown in Table 7]. Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.