Ricoh Aficio MP 8001 sec - Page 57

Security Requirements Rationale

Page 57 highlights

Page 56 of 82 6.3 Security Requirements Rationale This section describes the rationale behind the security requirements. If all security functional requirements are satisfied as below, the security objectives defined in "4.1 Security Objectives for TOE" are fulfilled. 6.3.1 Tracing Table 23 shows the relationship between the TOE security functional requirements and TOE security objectives. The "v" in the table indicates that the TOE security functional requirement fulfils the TOE security objective. Table 23 shows that each TOE security functional requirementfulfils at least one TOE security objective. Table 23: Relationship between security objectives and functional requirements O.AUDIT O.I&A O.DOC_ACC O.MANAGE O.MEM.PROTECT O.NET.PROTECT O.GENUINE O.LINE_PROTECT FAU_GEN.1 v FAU_SAR.1 v FAU_SAR.2 v FAU_STG.1 v FAU_STG.4 v FCS_CKM.1 v FCS_COP.1 v FDP_ACC.1 v FDP_ACF.1 v FDP_IFC.1 v FDP_IFF.1 v FIA_AFL.1 v FIA_ATD.1 v FIA_SOS.1 v FIA_UAU.2 v FIA_UAU.7 v FIA_UID.2 v Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 56 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
6.3
Security Requirements Rationale
This section describes the rationale behind the security requirements.
If all security functional requirements are satisfied as below, the security objectives defined in "4.1 Security
Objectives for TOE" are fulfilled.
6.3.1
Tracing
Table 23 shows the relationship between the TOE security functional requirements and TOE security
objectives. The "v" in the table indicates that the TOE security functional requirement fulfils the TOE
security objective.
Table 23 shows that each TOE security functional requirement fulfils at least one TOE security objective.
Table 23: Relationship between security objectives and functional requirements
O.AUDIT
O.I&A
O.DOC_ACC
O.MANAGE
O.MEM.PROTECT
O.NET.PROTECT
O.GENUINE
O.LINE_PROTECT
FAU_GEN.1
v
FAU_SAR.1
v
FAU_SAR.2
v
FAU_STG.1
v
FAU_STG.4
v
FCS_CKM.1
v
FCS_COP.1
v
FDP_ACC.1
v
FDP_ACF.1
v
FDP_IFC.1
v
FDP_IFF.1
v
FIA_AFL.1
v
FIA_ATD.1
v
FIA_SOS.1
v
FIA_UAU.2
v
FIA_UAU.7
v
FIA_UID.2
v