Ricoh Aficio MP C3001 Security Target - Page 42

OE.PHYSICAL.MANAGED Physical management - admin

Page 42 highlights

Page 41 of 93 OE.INTERFACE.MANAGED Management of external interfaces in IT environment The IT environment shall take a countermeasure for the prevention of unmanaged access to TOE external interfaces. 4.2.2 Non-IT Environment OE.PHYSICAL.MANAGED Physical management According to the guidance document, the TOE shall be placed in a secure or monitored area that provides protection from physical access to the TOE by unauthorised persons. OE.USER.AUTHORIZED Assignment of user authority The responsible manager of MFP shall give users the authority to use the TOE in accordance with the security policies and procedures of their organisation. OE.USER.TRAINED User training The responsible manager of MFP shall train users according to the guidance document and ensure that users are aware of the security policies and procedures of their organisation and have the competence to follow those policies and procedures. OE.ADMIN.TRAINED Administrator training The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their organisation; have the training, competence, and time to follow the guidance document; and correctly configure and operate the TOE according to those policies and procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select administrators who will not use their privileged access rights for malicious purposes according to the guidance document. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to the guidance document for detecting security violations or unusual patterns of activity. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 41 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
OE.INTERFACE.MANAGED
Management of external interfaces in IT environment
The IT environment shall take a countermeasure for the prevention of unmanaged
access to TOE external interfaces.
4.2.2
Non-IT Environment
OE.PHYSICAL.MANAGED Physical management
According to the guidance document, the TOE shall be placed in a secure or monitored
area that provides protection from physical access to the TOE by unauthorised persons.
OE.USER.AUTHORIZED
Assignment of user authority
The responsible manager of MFP shall give users the authority to use the TOE in
accordance with the security policies and procedures of their organisation.
OE.USER.TRAINED
User training
The responsible manager of MFP shall train users according to the guidance document
and ensure that users are aware of the security policies and procedures of their
organisation and have the competence to follow those policies and procedures.
OE.ADMIN.TRAINED
Administrator training
The responsible manager of MFP shall ensure that administrators are aware of the
security policies and procedures of their organisation; have the training, competence,
and time to follow the guidance document; and correctly configure and operate the TOE
according to those policies and procedures.
OE.ADMIN.TRUSTED
Trusted administrator
The responsible manager of MFP shall select administrators who will not use their
privileged access rights for malicious purposes according to the guidance document.
OE.AUDIT.REVIEWED
Log audit
The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate
intervals according to the guidance document for detecting security violations or
unusual patterns of activity.