Ricoh Aficio MP 2851 Security Target - Page 34

Security Requirements

Page 34 highlights

Page 34 of 81 6 Security Requirements This section describes the security functional requirements, security assurance requirements, and security requirements rationale. 6.1 Security Functional Requirements This section describes the TOE security functional requirements for fulfilling the security objectives defined in "4.1 Security Objectives for TOE". The security functional requirements are quoted from the requirement defined in the CC Part2. The part with assignment and selection defined in the CC Part2 are identified with [bold face and brackets]. 6.1.1 Class FAU: Security audit FAU_GEN.1 Audit data generation Hierarchical to: No other components. Dependencies: FPT_STM.1 Reliable time stamps. FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events: a) Start-up and shutdown of the Audit Functions; b) All auditable events for the [selection: not specified] level of audit; and c) [assignment: auditable events of the TOE shown in Table 4]. Table 4 shows the actions (CC rules) recommended by the CC as auditable for each functional requirement and the corresponding auditable events of the TOE. Table 4: List of auditable events Functional requirements Actions which should be auditable Auditable events of TOE FAU_GEN.1 FAU_SAR.1 FAU_SAR.2 FAU_STG.1 FAU_STG.4 FCS_CKM.1 None a) Basic: Reading of information from the audit records. a) Basic: Unsuccessful attempts to read information from the audit records. None a) Basic: Actions taken due to the audit storage failure. a) Minimal: Success and failure of the activity. b) Basic: The object attribute(s), and object value(s) excluding any sensitive Auditable events not recorded. Auditable events not recorded. Auditable events not recorded. 1. HDD cryptographic key generation (Outcome: Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 34 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
6 Security Requirements
This section describes the security functional requirements, security assurance requirements, and security
requirements rationale.
6.1
Security Functional Requirements
This section describes the TOE security functional requirements for fulfilling the security objectives defined
in "4.1 Security Objectives for TOE". The security functional requirements are quoted from the requirement
defined in the CC Part2.
The part with assignment and selection defined in the CC Part2 are identified with [
bold face and brackets
].
6.1.1
Class FAU: Security audit
FAU_GEN.1
Audit data generation
Hierarchical to:
No other components.
Dependencies:
FPT_STM.1 Reliable time stamps.
FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following auditable events:
a) Start-up and shutdown of the Audit Functions;
b) All auditable events for the
[selection: not specified]
level of audit; and
c)
[assignment: auditable events of the TOE shown in
Table 4
]
.
Table 4 shows the actions (CC rules) recommended by the CC as auditable for each functional requirement
and the corresponding auditable events of the TOE.
Table 4: List of auditable events
Functional requirements
Actions which should be auditable
Auditable events of TOE
FAU_GEN.1
None
-
FAU_SAR.1
a) Basic: Reading of information from
the audit records.
Auditable events not recorded.
FAU_SAR.2
a) Basic: Unsuccessful attempts to
read information from the audit
records.
Auditable events not recorded.
FAU_STG.1
None
-
FAU_STG.4
a) Basic: Actions taken due to the
audit storage failure.
Auditable events not recorded.
FCS_CKM.1
a) Minimal: Success and failure of the
activity.
b) Basic: The object attribute(s), and
object value(s) excluding any sensitive
<Individually-defined auditable
events>
1. HDD cryptographic key
generation (Outcome: