Page 3 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction
....................................................................................
7
1.1
ST Reference
..................................................................................
7
1.2
TOE Reference
................................................................................
7
1.3
TOE Overview
................................................................................
8
1.3.1
TOE Type
.....................................................................................................
8
1.3.2
TOE Usage and Major Security Features of TOE
.............................................
8
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
.......................
8
1.4
TOE Description
.............................................................................
10
1.4.1
Physical Boundaries of TOE
.........................................................................
10
1.4.2
Guidance Documents
...................................................................................
13
1.4.3
User Roles
..................................................................................................
16
1.4.3.1
Responsible Manager of MFP
.................................................................
16
1.4.3.2
Administrator
.......................................................................................
16
1.4.3.3
Supervisor
............................................................................................
16
1.4.3.4
General User
........................................................................................
17
1.4.3.5
Customer Engineer
...............................................................................
17
1.4.4
Logical Boundaries of TOE
...........................................................................
17
1.4.4.1
Basic Functions
....................................................................................
17
1.4.4.2
Security Functions
................................................................................
19
1.4.5
Protected Assets
..........................................................................................
23
1.4.5.1
Document Data
.....................................................................................
23
1.4.5.2
Print Data
............................................................................................
24
2
Conformance Claims
.............................................................................
25
2.1
CC conformance Claim
.....................................................................
25
2.2
PP Claims, Package Claims
................................................................
25
2.3
Conformance Rationale
.....................................................................
25
3
Security Problem Definitions
...................................................................
26
3.1
Threats
.......................................................................................
26
3.2
Organisational Security Policies
...........................................................
26