Ricoh Aficio MP 2851 Security Target - Page 42

FIA_AFL.1, Authentication failure handling

Page 42 highlights

Page 42 of 81 following types of subject and information security attributes: [assignment: subjects or information and their corresponding security attributes shown inTable 12]. Table 12: Security attributes corresponding to subjects or information Type Subjects or information Security attributes Subject Fax process on Fax Unit No security attributes Subject Fax reception process on Controller Board No security attributes Information Data received from a telephone line Data type (Note: "Data type" means the type of data received from a telephone line and indicates whether this is fax or non-fax data.) FDP_IFF.1.2 The TSF shall permit an information flow between a controlled subject and controlled information via a controlled operation if the following rules hold: [assignment: after the type of received data from a telephone line is recognised as fax data, the fax process on the Fax Unit allows Fax Reception on the Controller Board to let data received from a telephone line pass]. FDP_IFF.1.3 The TSF shall enforce the [assignment: no additional information flow control SFP rules]. FDP_IFF.1.4 The TSF shall explicitly authorise an information flow based on the following rules: [assignment: no rules, based on security attributes that explicitlyauthorise information flows]. FDP_IFF.1.5 The TSF shall explicitly deny an information flow based on the following rules: [assignment: no rules, based on security attributes that explicitly deny information flows]. 6.1.4 Class FIA: Identification and authentication FIA_AFL.1 Authentication failure handling Hierarchical to: No other components. Dependencies: FIA_UAU.1 Timing of authentication. FIA_AFL.1.1 TSF shall detect when [selection: an administrator (refinement: the machine administrator) configurable positive integer within [assignment: 1 to 5]] unsuccessful authentication attempts occur related to [assignment: the consecutive numbers of times of authentication failure for each user in the authentication events shown in Table 13]. Table 13: List of authentication events Authentication events User authentication using the control panel Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 42 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
following types of subject and information security attributes:
[assignment: subjects or
information and their corresponding security attributes shown in
Table 12
].
Table 12: Security attributes corresponding to subjects or information
Type
Subjects or information
Security attributes
Subject
Fax process on Fax Unit
No security attributes
Subject
Fax reception process on Controller Board
No security attributes
Information
Data received from a telephone line
Data type
(Note: "Data type" means the type of data received from a telephone line and indicates whether this is
fax or non-fax data.)
FDP_IFF.1.2
The TSF shall permit an information flow between a controlled subject and controlled
information via a controlled operation if the following rules hold:
[assignment: after the
type of received data from a telephone line is recognised as fax data, the fax process on
the Fax Unit allows Fax Reception on the Controller Board to let data received from a
telephone line pass]
.
FDP_IFF.1.3
The TSF shall enforce the
[assignment: no additional information flow control SFP
rules]
.
FDP_IFF.1.4
The TSF
shall
explicitly authorise an information flow based on the following rules:
[assignment: no rules, based on security attributes that explicitly authorise information
flows]
.
FDP_IFF.1.5
The TSF shall
explicitly deny an information flow based on the following rules:
[assignment: no rules, based on security attributes that explicit
ly deny information
flows]
.
6.1.4
Class FIA: Identification and authentication
FIA_AFL.1
Authentication failure handling
Hierarchical to:
No other components.
Dependencies:
FIA_UAU.1 Timing of authentication.
FIA_AFL.1.1
TSF shall detect when
[selection: an administrator (refinement: the machine
administrator) configurable positive integer within [assignment: 1 to 5]]
unsuccessful
authentication attempts occur related to
[assignment: the consecutive numbers of times of
authentication failure for each user in the authentication events shown in
Table 13
].
Table 13: List of authentication events
Authentication events
User authentication using the control panel