Ricoh Aficio MP C3001 Security Target - Page 6

List of s, List of Tables - specifications

Page 6 highlights

Page 5 of 93 List of Figures Figure 1 : Example of TOE Environment...9 Figure 2 : Hardware Configuration of the TOE 12 Figure 3 : Logical Scope of the TOE...21 List of Tables Table 1 : Identification Information of TOE...7 Table 2 : Guidance for English Version-1...14 Table 3 : Guidance for English Version-2...15 Table 4 : Guidance for English Version-3...17 Table 5 : Guidance for English Version-4...17 Table 6 : Definition of Users ...19 Table 7 : List of Administrative Roles...19 Table 8 : Definition of User Data ...26 Table 9 : Definition of TSF Data ...27 Table 10 : Specific Terms Related to This ST 27 Table 11 : Rationale for Security Objectives 42 Table 12 : List of Auditable Events ...49 Table 13 : List of Cryptographic Key Generation 53 Table 14 : List of Cryptographic Operation 53 Table 15 : List of Subjects, Objects, and Operations among Subjects and Objects (a 54 Table 16 : List of Subjects, Objects, and Operations among Subjects and Objects (b 54 Table 17 : Subjects, Objects and Security Attributes (a 54 Table 18 : Rules to Control Operations on Document Data and User Jobs (a 55 Table 19 : Additional Rules to Control Operations on Document Data and User Jobs (a 56 Table 20 : Subjects, Objects and Security Attributes (b 57 Table 21 : Rule to Control Operations on MFP Applications (b 57 Table 22 : List of Authentication Events of Basic Authentication 58 Table 23 : List of Actions for Authentication Failure 58 Table 24 : List of Security Attributes for Each User That Shall Be Maintained 59 Table 25 : Rules for Initial Association of Attributes 61 Table 26 : User Roles for Security Attributes (a 62 Table 27 : User Roles for Security Attributes (b 63 Table 28 : Authorised Identified Roles Allowed to Override Default Values 64 Table 29 : List of TSF Data ...65 Table 30 : List of Specification of Management Functions 66 Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2 69 Table 32 : Relationship between Security Objectives and Functional Requirements 70 Table 33 : Results of Dependency Analysis of TOE Security Functional Requirements 77 Table 34 : List of Audit Events...80 Table 35 : List of Audit Log Items ...81 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 5 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
List of Figures
Figure 1 : Example of TOE Environment
........................................................................................................
9
Figure 2 : Hardware Configuration of the TOE
.............................................................................................
12
Figure 3 : Logical Scope of the TOE
.............................................................................................................
21
List of Tables
Table 1 : Identification Information of TOE
....................................................................................................
7
Table 2 : Guidance for English Version-1
......................................................................................................
14
Table 3 : Guidance for English Version-2
......................................................................................................
15
Table 4 : Guidance for English Version-3
......................................................................................................
17
Table 5 : Guidance for English Version-4
......................................................................................................
17
Table 6 : Definition of Users
.........................................................................................................................
19
Table 7 : List of Administrative Roles
...........................................................................................................
19
Table 8 : Definition of User Data
..................................................................................................................
26
Table 9 : Definition of TSF Data
...................................................................................................................
27
Table 10 : Specific Terms Related to This ST
...............................................................................................
27
Table 11 : Rationale for Security Objectives
.................................................................................................
42
Table 12 : List of Auditable Events
...............................................................................................................
49
Table 13 : List of Cryptographic Key Generation
.........................................................................................
53
Table 14 : List of Cryptographic Operation
...................................................................................................
53
Table 15 : List of Subjects, Objects, and Operations among Subjects and Objects (a)
.................................
54
Table 16 : List of Subjects, Objects, and Operations among Subjects and Objects (b)
.................................
54
Table 17 : Subjects, Objects and Security Attributes (a)
...............................................................................
54
Table 18 : Rules to Control Operations on Document Data and User Jobs (a)
..............................................
55
Table 19 : Additional Rules to Control Operations on Document Data and User Jobs (a)
............................
56
Table 20 : Subjects, Objects and Security Attributes (b)
...............................................................................
57
Table 21 : Rule to Control Operations on MFP Applications (b)
..................................................................
57
Table 22 : List of Authentication Events of Basic Authentication
.................................................................
58
Table 23 : List of Actions for Authentication Failure
....................................................................................
58
Table 24 : List of Security Attributes for Each User That Shall Be Maintained
............................................
59
Table 25 : Rules for Initial Association of Attributes
....................................................................................
61
Table 26 : User Roles for Security Attributes (a)
...........................................................................................
62
Table 27 : User Roles for Security Attributes (b)
..........................................................................................
63
Table 28 : Authorised Identified Roles Allowed to Override Default Values
................................................
64
Table 29 : List of TSF Data
...........................................................................................................................
65
Table 30 : List of Specification of Management Functions
...........................................................................
66
Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2)
....................................................
69
Table 32 : Relationship between Security Objectives and Functional Requirements
....................................
70
Table 33 : Results of Dependency Analysis of TOE Security Functional Requirements
..............................
77
Table 34 : List of Audit Events
......................................................................................................................
80
Table 35 : List of Audit Log Items
................................................................................................................
81