Ricoh Aficio MP 2851 Security Target - Page 38

FCS_CKM.1 Cryptographic key generation - review

Page 38 highlights

Page 38 of 81 b) For each audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [assignment: communication IP address, IDs of persons whose authentication information is created/changed/deleted, Locking out users, release of user Lockout, method of Lockout release, IDs of object document data]. FAU_SAR.1 Audit review Hierarchical to: No other components. Dependencies: FAU_GEN.1 Audit data generation. FAU_SAR.1.1 The TSF shall provide [assignment: the machine administrator] with the capability to read [assignment: all log items] from the audit records. FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to interpret the information. FAU_SAR.2 Restricted audit review Hierarchical to: No other components. Dependencies: FAU_SAR.1 Audit review. FAU_SAR.2.1 The TSF shall prohibit all users read access to the audit records, except those users that have been granted explicit read-access. FAU_STG.1 Protected audit trail storage Hierarchical to: No other components. Dependencies: FAU_GEN.1 Audit data generation. FAU_STG.1.1 The TSF shall protect the stored audit records in the audit trail from unauthorised deletion. FAU_STG.1.2 The TSF shall be able to [selection: prevent] unauthorised modifications to the stored audit records in the audit trail. FAU_STG.4 Prevention of audit data loss Hierarchical to: FAU_STG.3 Action in case of possible audit data loss. Dependencies: FAU_STG.1 Protected audit trail storage. FAU_STG.4.1 The TSF shall [selection: overwrite the oldest stored audit records] and [assignment: no other actions to be taken in case of audit storage failure]if the audit trail is full. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 38 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
b) For each audit event type, based on the auditable event definitions of the functional
components included in the PP/ST,
[assignment: communication IP address, IDs of
persons whose authentication information is created/changed/deleted, Locking out users,
release of user Lockout, method of Lockout release, IDs of object document data].
FAU_SAR.1 Audit review
Hierarchical to:
No other components.
Dependencies:
FAU_GEN.1 Audit data generation.
FAU_SAR.1.1 The TSF shall provide
[assignment: the machine administrator]
with the capability to read
[assignment: all log items]
from the audit records.
FAU_SAR.1.2 The TSF shall provide the audit records in a manner suitable for the user to interpret the
information.
FAU_SAR.2
Restricted audit review
Hierarchical to:
No other components.
Dependencies:
FAU_SAR.1 Audit review.
FAU_SAR.2.1
The TSF shall prohibit all users read access to the audit records, except those users that have
been granted explicit read-access.
FAU_STG.1
Protected audit trail storage
Hierarchical to:
No other components.
Dependencies:
FAU_GEN.1 Audit data generation.
FAU_STG.1.1
The TSF shall protect the stored audit records in the audit trail from unauthorised deletion.
FAU_STG.1.2
The TSF shall be able to
[selection: prevent]
unauthorised modifications to the stored audit
records in the audit trail.
FAU_STG.4
Prevention of audit data loss
Hierarchical to:
FAU_STG.3 Action in case of possible audit data loss.
Dependencies:
FAU_STG.1 Protected audit trail storage.
FAU_STG.4.1 The TSF shall
[selection: overwrite the oldest stored audit records]
and
[assignment: no
other actions to be taken in case of audit storage failure]
if the audit trail is full.
6.1.2
Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to:
No other components.
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or