Ricoh Aficio MP 2851 Security Target - Page 6

List of s, List of Tables

Page 6 highlights

List of Figures Page 6 of 81 Figure 1: Example TOE environment ...9 Figure 2: Hardware configuration of TOE...11 Figure 3: Logical boundaries of TOE...17 List of Tables Table 1: List of administrator roles ...16 Table 2: Correspondence between operations authorised by permissions to process document data and operations possible on document data...21 Table 3: Relationship between security environment and security objectives 30 Table 4: List of auditable events ...34 Table 5: List of cryptographic key generation 39 Table 6: List of Cryptographic operations...39 Table 7: List of subjects, objects, and operations among subjects and objects 40 Table 8: Subjects, objects and security attributes 40 Table 9: Rules governing access...40 Table 10: Rules governing access explicitly 41 Table 11: List of subjects, information and operation 41 Table 12: Security attributes corresponding to subjects or information 42 Table 13: List of authentication events...42 Table 14: Lockout release actions ...43 Table 15: Rules for initial association of attributes 45 Table 16: Management roles of security attributes 45 Table 17: Characteristics of static attribute initialisation 46 Table 18: List of TSF data management...47 Table 19: List of specifications of Management Functions 48 Table 20: Services requiring trusted paths...53 Table 21: TOE Security assurance requirements (EAL3 54 Table 22: Relationship between security objectives and functional requirements 55 Table 23: Correspondence of dependencies of TOE security functional requirements 60 Table 24: Relationship between TOE security functional requirements and TOE security functions...........63 Table 25: Auditable events and auditable information 65 Table 26: User roles and authentication methods 67 Table 27: Unlocking administrators for each user role 68 Table 28: Default value for document data ACL 69 Table 29: Operations on document data ACL and Authorised users 70 Table 30: Access to administrator information 71 Table 31: Authorised operations on general user information 72 Table 32: Administrators authorised to specify machine control data 73 Table 33: List of encryption operations on data stored on the HDD 74 Table 34: Specific terms used in this ST...77 Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 6 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
List of Figures
Figure 1: Example TOE environment
..............................................................................................................
9
Figure 2: Hardware configuration of TOE
.....................................................................................................
11
Figure 3: Logical boundaries of TOE
.............................................................................................................
17
List of Tables
Table 1: List of administrator roles
................................................................................................................
16
Table 2: Correspondence between operations authorised by permissions to process document data and
operations possible on document data
............................................................................................................
21
Table 3: Relationship between security environment and security objectives
...............................................
30
Table 4: List of auditable events
....................................................................................................................
34
Table 5: List of cryptographic key generation
................................................................................................
39
Table 6: List of Cryptographic operations
......................................................................................................
39
Table 7: List of subjects, objects, and operations among subjects and objects
..............................................
40
Table 8: Subjects, objects and security attributes
...........................................................................................
40
Table 9: Rules governing access
....................................................................................................................
40
Table 10: Rules governing access explicitly
..................................................................................................
41
Table 11: List of subjects, information and operation
....................................................................................
41
Table 12: Security attributes corresponding to subjects or information
.........................................................
42
Table 13: List of authentication events
...........................................................................................................
42
Table 14: Lockout release actions
..................................................................................................................
43
Table 15: Rules for initial association of attributes
........................................................................................
45
Table 16: Management roles of security attributes
.........................................................................................
45
Table 17: Characteristics of static attribute initialisation
...............................................................................
46
Table 18: List of TSF data management
.........................................................................................................
47
Table 19: List of specifications of Management Functions
............................................................................
48
Table 20: Services requiring trusted paths
.....................................................................................................
53
Table 21: TOE Security assurance requirements (EAL3)
..............................................................................
54
Table 22: Relationship between security objectives and functional requirements
.........................................
55
Table 23: Correspondence of dependencies of TOE security functional requirements
..................................
60
Table 24: Relationship between TOE security functional requirements and TOE security functions
...........
63
Table 25: Auditable events and auditable information
...................................................................................
65
Table 26: User roles and authentication methods
...........................................................................................
67
Table 27: Unlocking administrators for each user role
..................................................................................
68
Table 28: Default value for document data ACL
...........................................................................................
69
Table 29: Operations on document data ACL and Authorised users
..............................................................
70
Table 30: Access to administrator information
...............................................................................................
71
Table 31: Authorised operations on general user information
........................................................................
72
Table 32: Administrators authorised to specify machine control data
............................................................
73
Table 33: List of encryption operations on data stored on the HDD
..............................................................
74
Table 34: Specific terms used in this ST
........................................................................................................
77