Ricoh Aficio MP 2550B Security Target - Page 62

Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements

Page 62 highlights

Page 62 of 83 FTP_TRP.1 also protects Document Data on networks from leakage and detects the tampering by using a trusted path, which is described later, between the TOE and the remote users. For sending by e-mail from the TOE to client PC, Document Data or Print Data on network is protected from leakage and tampering is detected by using S/MIME in the mailing service. For use of web service, print service, and fax service from client PC, Document Data on networks is protected from leakage and tampering is detected by using the SSL protocol. O.GENUINE Protection of Integrity of MFP Control Software The following are the rationale for the functional requirements that correspond to O.GENUINE in Table 23 being appropriate to satisfy O.GENUINE. a) Check the integrity of MFP Control Software. To accomplish O.GENUINE, the integrity of MFP Control Software, which is installed in FlashROM, shall be verified. For this, FPT_TST.1 tests the integrity of the executable code of MFP Control Software, which is installed in FlashROM, and verifies its integrity at the TOE start-up. O.LINE_PROTECT Protection for Intrusion from Telephone Line The following are the rationale for the functional requirements that correspond to O.LINE_PROTECT in Table 23 being appropriate to satisfy O. LINE_PROTECT. a) Prohibit the intrusion of fax line. To accomplish O.LINE_PROTECT, the unauthorised access to the TOE over a telephone line by attackers shall be prevented. For this, FDP_IFC.1 and FDP_IFF.1 allow the fax data to pass from the fax process on the Fax Unit to the fax reception process on Controller Board only provided the received fax data from a telephone line is the fax data. 6.3.3 Dependency Analysis Table 24 shows the correspondence status of the dependencies in this ST for the TOE security functional requirements. Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements TOE Security Functional Requirements FAU_GEN.1 FAU_SAR.1 FAU_SAR.2 FAU_STG.1 FAU_STG.4 FCS_CKM.1 Dependencies claimed by CC FPT_STM.1 FAU_GEN.1 FAU_SAR.1 FAU_GEN.1 FAU_STG.1 [FCS_CKM.2 or Dependencies satisfied in ST FPT_STM.1 FAU_GEN.1 FAU_SAR.1 FAU_GEN.1 FAU_STG.1 FCS_COP.1 Dependencies not satisfied in ST None None None None None FCS_CKM.4 Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 62 of 83
FTP_TRP.1 also protects Document Data on networks from leakage and detects the tampering by using
a trusted path, which is described later, between the TOE and the remote users. For sending by e-mail
from the TOE to client PC, Document Data or Print Data on network is protected from leakage and
tampering is detected by using S/MIME in the mailing service. For use of web service, print service,
and fax service from client PC, Document Data on networks is protected from leakage and tampering is
detected by using the SSL protocol.
O.GENUINE
Protection of Integrity of MFP Control Software
The following are the rationale for the functional requirements that correspond to O.GENUINE in Table 23
being appropriate to satisfy O.GENUINE.
a)
Check the integrity of MFP Control Software.
To accomplish O.GENUINE, the integrity of MFP Control Software, which is installed in FlashROM,
shall be verified.
For this, FPT_TST.1 tests the integrity of the executable code of MFP Control Software, which is
installed in FlashROM, and verifies its integrity at the TOE start-up.
O.LINE_PROTECT
Protection for Intrusion from Telephone Line
The following are the rationale for the functional requirements that correspond to O.LINE_PROTECT in
Table 23 being appropriate to satisfy O. LINE_PROTECT.
a)
Prohibit the intrusion of fax line.
To accomplish O.LINE_PROTECT, the unauthorised access to the TOE over a telephone line by
attackers shall be prevented.
For this, FDP_IFC.1 and FDP_IFF.1 allow the fax data to pass from the fax process on the Fax Unit to
the fax reception process on Controller Board only provided the received fax data from a telephone line
is the fax data.
6.3.3
Dependency Analysis
Table 24 shows the correspondence status of the dependencies in this ST for the TOE security functional
requirements.
Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements
TOE Security
Functional
Requirements
Dependencies
claimed by CC
Dependencies
satisfied in ST
Dependencies not
satisfied in ST
FAU_GEN.1
FPT_STM.1
FPT_STM.1
None
FAU_SAR.1
FAU_GEN.1
FAU_GEN.1
None
FAU_SAR.2
FAU_SAR.1
FAU_SAR.1
None
FAU_STG.1
FAU_GEN.1
FAU_GEN.1
None
FAU_STG.4
FAU_STG.1
FAU_STG.1
None
FCS_CKM.1
[FCS_CKM.2 or
FCS_COP.1
FCS_CKM.4
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.