Konica Minolta C250i bizhub C360i/C300i/C250i Security Operations User Manual - Page 13

Enhanced security mode, Precautions for operation control

Page 13 highlights

1.3 Enhanced security mode 1 1.3 Enhanced security mode Setting the [Enhanced Security Mode] to [ON] will validate the security function of this machine. For details of the settings of different security functions to be changed by turning [ON] the [Enhanced Security Mode], see page 2-10. 1.3.1 Major security functions in operation under ISO15408 certification The following describes major security functions in operation under ISO15408 certification. Function Identification and authentication function User limiting function Auditing function Network communication protecting function Description Access control is then provided through password authentication for any access to the Administrator Mode, user authentication mode, User Box, and a User Box data file. Access is thereby granted only to the authenticated user. A password that can be set must meet the Password Rules. The machine does not accept setting of an easily decipherable password. For details of the Password Rules, see page 1-14. If a wrong password is entered, during password authentication, a predetermined number of times (once to three times.) or more set by the administrator, the machine determines that it is unauthorized access through Prohibited Functions, prohibiting any further entry of the password. By prohibiting the password entry operation, the machine prevents unauthorized use or removal of data. The administrator is responsible for resetting the prohibition of the password entry operation. For details, see page 2-19. Specific functions to be used by each user may be limited. For details, see page 2-24. Information including operations performed on the machine and a job history can be stored in the Storage or log server. Setting the job log (audit log) allows an illegal act or inadequate operation performed on the machine to be traced. For details, see page 2-31. Communication data between the machine, client PC, and servers can be encrypted using the IPsec, which prevents information leakage through eavesdropping over the network. For details, see page 2-15. 1.4 Precautions for operation control This machine and the data handled by this machine should be used in an office environment that meets the following conditions. The machine must be controlled for its operation under the following conditions to protect the data that should be protected. 1.4.1 Roles of the owner of the machine The owner (an individual or an organization) of the machine should take full responsibility for controlling the machine, thereby ensuring that no improper operations are performed. - The owner of the machine should have the administrator recognize the organizational security policy and procedure, educate him or her to comply with the guidance and documents prepared by the manufacturer, and allow time for him or her to acquire required ability. The owner of the machine should also operate and manage the machine so that the administrator can configure and operate the machine appropriately according to the policy and procedure. - The owner of the machine should have users of the machine recognize the organizational security policy and procedure, educate them to follow the policy and procedure, and operate and manage the machine so that the users acquire the required ability. - The owner of the machine should vest the user with authority to use the machine according to the organizational security policy and procedure. - The owner of the machine should operate and manage the machine so that the administrator checks the job log (audit log) data at appropriate timing to thereby determine whether a security compromise or a faulty condition has occurred during an operating period. - The owner of the machine must permit only the administrator to handle the job log (audit log) data that has automatically been distributed. The owner of the machine should also operate and manage the machine such that the job log (audit log) data is not illegally accessed, deleted, or altered. bizhub C360i/C300i/C250i/C036DNi/C030DNi/C025DNi 1-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

bizhub C360i/C300i/C250i/C036DNi/C030DNi/C025DNi
1-9
1.3
Enhanced security mode
1
1.3
Enhanced security mode
Setting the [Enhanced Security Mode] to [ON] will validate the security function of this machine. For details
of the settings of different security functions to be changed by turning [ON] the [Enhanced Security Mode],
see page 2-10.
1.3.1
Major security functions in operation under ISO15408 certification
The following describes major security functions in operation under ISO15408 certification.
1.4
Precautions for operation control
This machine and the data handled by this machine should be used in an office environment that meets the
following conditions. The machine must be controlled for its operation under the following conditions to pro-
tect the data that should be protected.
1.4.1
Roles of the owner of the machine
The owner (an individual or an organization) of the machine should take full responsibility for controlling the
machine, thereby ensuring that no improper operations are performed.
-
The owner of the machine should have the administrator recognize the organizational security policy
and procedure, educate him or her to comply with the guidance and documents prepared by the man-
ufacturer, and allow time for him or her to acquire required ability. The owner of the machine should
also operate and manage the machine so that the administrator can configure and operate the machine
appropriately according to the policy and procedure.
-
The owner of the machine should have users of the machine recognize the organizational security policy
and procedure, educate them to follow the policy and procedure, and operate and manage the machine
so that the users acquire the required ability.
-
The owner of the machine should vest the user with authority to use the machine according to the or-
ganizational security policy and procedure.
-
The owner of the machine should operate and manage the machine so that the administrator checks
the job log (audit log) data at appropriate timing to thereby determine whether a security compromise
or a faulty condition has occurred during an operating period.
-
The owner of the machine must permit only the administrator to handle the job log (audit log) data that
has automatically been distributed. The owner of the machine should also operate and manage the ma-
chine such that the job log (audit log) data is not illegally accessed, deleted, or altered.
Function
Description
Identification and au-
thentication function
Access control is then provided through password authentication for any ac-
cess to the Administrator Mode, user authentication mode, User Box, and a
User Box data file. Access is thereby granted only to the authenticated user.
A password that can be set must meet the Password Rules. The machine
does not accept setting of an easily decipherable password. For details of
the Password Rules, see page 1-14.
If a wrong password is entered, during password authentication, a predeter-
mined number of times (once to three times.) or more set by the administra-
tor, the machine determines that it is unauthorized access through Prohibited
Functions, prohibiting any further entry of the password. By prohibiting the
password entry operation, the machine prevents unauthorized use or remov-
al of data. The administrator is responsible for resetting the prohibition of the
password entry operation. For details, see page 2-19.
User limiting function
Specific functions to be used by each user may be limited. For details, see
page 2-24.
Auditing function
Information including operations performed on the machine and a job history
can be stored in the Storage or log server. Setting the job log (audit log) al-
lows an illegal act or inadequate operation performed on the machine to be
traced. For details, see page 2-31.
Network communication
protecting function
Communication data between the machine, client PC, and servers can be
encrypted using the IPsec, which prevents information leakage through
eavesdropping over the network. For details, see page 2-15.