Ricoh Aficio MP 2851 Security Target - Page 3

Table of Contents

Page 3 highlights

Table of Contents Page 3 of 81 1 ST Introduction 7 1.1 ST Reference 7 1.2 TOE Reference 7 1.3 TOE Overview 8 1.3.1 TOE Type...8 1.3.2 TOE Usage and Major Security Features of TOE 8 1.3.3 Environment for TOE Usage and Non-TOE Configuration Items 8 1.4 TOE Description 10 1.4.1 Physical Boundaries of TOE 10 1.4.2 Guidance Documents 13 1.4.3 User Roles 16 1.4.3.1 Responsible Manager of MFP 16 1.4.3.2 Administrator 16 1.4.3.3 Supervisor 16 1.4.3.4 General User 17 1.4.3.5 Customer Engineer 17 1.4.4 Logical Boundaries of TOE 17 1.4.4.1 Basic Functions 17 1.4.4.2 Security Functions 19 1.4.5 Protected Assets 23 1.4.5.1 Document Data 23 1.4.5.2 Print Data 24 2 Conformance Claims 25 2.1 CC conformance Claim 25 2.2 PP Claims, Package Claims 25 2.3 Conformance Rationale 25 3 Security Problem Definitions 26 3.1 Threats 26 3.2 Organisational Security Policies 26 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 3 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction
....................................................................................
7
1.1
ST Reference
..................................................................................
7
1.2
TOE Reference
................................................................................
7
1.3
TOE Overview
................................................................................
8
1.3.1
TOE Type
.....................................................................................................
8
1.3.2
TOE Usage and Major Security Features of TOE
.............................................
8
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
.......................
8
1.4
TOE Description
.............................................................................
10
1.4.1
Physical Boundaries of TOE
.........................................................................
10
1.4.2
Guidance Documents
...................................................................................
13
1.4.3
User Roles
..................................................................................................
16
1.4.3.1
Responsible Manager of MFP
.................................................................
16
1.4.3.2
Administrator
.......................................................................................
16
1.4.3.3
Supervisor
............................................................................................
16
1.4.3.4
General User
........................................................................................
17
1.4.3.5
Customer Engineer
...............................................................................
17
1.4.4
Logical Boundaries of TOE
...........................................................................
17
1.4.4.1
Basic Functions
....................................................................................
17
1.4.4.2
Security Functions
................................................................................
19
1.4.5
Protected Assets
..........................................................................................
23
1.4.5.1
Document Data
.....................................................................................
23
1.4.5.2
Print Data
............................................................................................
24
2
Conformance Claims
.............................................................................
25
2.1
CC conformance Claim
.....................................................................
25
2.2
PP Claims, Package Claims
................................................................
25
2.3
Conformance Rationale
.....................................................................
25
3
Security Problem Definitions
...................................................................
26
3.1
Threats
.......................................................................................
26
3.2
Organisational Security Policies
...........................................................
26