Ricoh Aficio MP C3001 Security Target - Page 3

Table of Contents

Page 3 highlights

Page 2 of 93 Table of Contents 1 ST Introduction ...7 1.1 ST Reference ...7 1.2 TOE Reference ...7 1.3 TOE Overview ...8 1.3.1 TOE Type ...8 1.3.2 TOE Usage...8 1.3.3 Major Security Features of TOE 10 1.4 TOE Description...11 1.4.1 Physical Boundary of TOE 11 1.4.2 Guidance Documents 14 1.4.3 Definition of Users ...18 1.4.3.1. Direct User ...19 1.4.3.2. Indirect User ...20 1.4.4 Logical Boundary of TOE 21 1.4.4.1. Basic Functions 21 1.4.4.2. Security Functions 24 1.4.5 Protected Assets ...26 1.4.5.1. User Data ...26 1.4.5.2. TSF Data ...27 1.4.5.3. Functions ...27 1.5 Glossary...27 1.5.1 Glossary for This ST 27 2 Conformance Claim...31 2.1 CC Conformance Claim 31 2.2 PP Claims...31 2.3 Package Claims ...31 2.4 Conformance Claim Rationale 32 2.4.1 Consistency Claim with TOE Type in PP 32 2.4.2 Consistency Claim with Security Problems and Security Objectives in PP ......... 32 2.4.3 Consistency Claim with Security Requirements in PP 33 3 Security Problem Definitions 36 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 2 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
...................................................................................................................
7
1.1
ST Reference
................................................................................................................
7
1.2
TOE Reference
.............................................................................................................
7
1.3
TOE Overview
..............................................................................................................
8
1.3.1
TOE Type
.....................................................................................................................
8
1.3.2
TOE Usage
...................................................................................................................
8
1.3.3
Major Security Features of TOE
..............................................................................
10
1.4
TOE Description
.........................................................................................................
11
1.4.1
Physical Boundary of TOE
........................................................................................
11
1.4.2
Guidance Documents
................................................................................................
14
1.4.3
Definition of Users
....................................................................................................
18
1.4.3.1.
Direct User
.........................................................................................................
19
1.4.3.2.
Indirect User
......................................................................................................
20
1.4.4
Logical Boundary of TOE
.........................................................................................
21
1.4.4.1.
Basic Functions
..................................................................................................
21
1.4.4.2.
Security Functions
.............................................................................................
24
1.4.5
Protected Assets
........................................................................................................
26
1.4.5.1.
User Data
...........................................................................................................
26
1.4.5.2.
TSF Data
............................................................................................................
27
1.4.5.3.
Functions
............................................................................................................
27
1.5
Glossary
......................................................................................................................
27
1.5.1
Glossary for This ST
.................................................................................................
27
2
Conformance Claim
...........................................................................................................
31
2.1
CC Conformance Claim
..............................................................................................
31
2.2
PP Claims
...................................................................................................................
31
2.3
Package Claims
..........................................................................................................
31
2.4
Conformance Claim Rationale
....................................................................................
32
2.4.1
Consistency Claim with TOE Type in PP
................................................................
32
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
32
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
33
3
Security Problem Definitions
............................................................................................
36