Ricoh Aficio MP 2851 Security Target - Page 60

O.line_protect

Page 60 highlights

Page 60 of 81 O.GENUINE Protection of integrity of MFP Control Software integrity Following are the rationale behind the functional requirements corresponding to O.GENUINE in Table 22, and these requirements are included to fulfill the O.GENUINE sp ecification. a) Check the integrity of the MFP Control Software. To fulfill O.GENUINE, the integrity of the MFP Control Software, which is installed in FlashROM, shall be verified. For this, FPT_TST.1 tests the integrity of the executable code of the MFP Control Software, which is installed in the FlashROM, and verifies its integrity at TOE start-up. O.LINE_PROTECT Protection from intrusion via telephone line Following are the rationale behind the functional requirements corresponding to O.LINE.PROTECT inTable 22, and these requirements are included to fulfill the O.LINE.PROTECT specification. a) Prohibit intrusion via the fax line. To fulfill O.LINE_PROTECT , unauthorised access by an attacker to the TOE via telephone line shall be prevented. For this, FDP_IFC.1 and FDP_IFF.1 allow fax data to pass from the fax process on theFax Unit to the fax reception process on the Controller Board only if the data received from the telephone line is fax data. 6.3.3 Dependency Analysis Table 23 shows the correspondence of dependencies in this ST for the TOE security functional requirements. Table 23: Correspondence of dependencies of TOE security functional requirements TOE security functional requirements FAU_GEN.1 FAU_SAR.1 FAU_SAR.2 FAU_STG.1 FAU_STG.4 FCS_CKM.1 FCS_COP.1 FDP_ACC.1 FDP_ACF.1 Dependencies claimed by CC FPT_STM.1 FAU_GEN.1 FAU_SAR.1 FAU_GEN.1 FAU_STG.1 [FCS_CKM.2 or FCS_COP.1] FCS_CKM.4 [FDP_ITC.1 or FDP_ITC.2 or FCS_CKM.1] FCS_CKM.4 FDP_ACF.1 FDP_ACC.1 FMT_MSA.3 Dependencies satisfied in ST FPT_STM.1 FAU_GEN.1 FAU_SAR.1 FAU_GEN.1 FAU_STG.1 FCS_COP.1 FCS_CKM.1 FDP_ACF.1 FDP_ACC.1 FMT_MSA.3 Dependencies not satisfied in ST None None None None None FCS_CKM.4 FCS_CKM.4 None None Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

Page 60 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
O.GENUINE
Protection of integrity of MFP Control Software integrity
Following are the rationale behind the functional requirements corresponding to O.GENUINE in Table 22,
and these requirements are included to fulfill the O.GENUINE sp ecification.
a)
Check the integrity of the MFP Control Software.
To fulfill O.GENUINE, the integrity of the MFP Control Software, which is installed in FlashROM,
shall be verified. For this, FPT_TST.1 tests the integrity of the executable code of the MFP Control
Software, which is installed in the FlashROM, and verifies its integrity at TOE start-up.
O.LINE_PROTECT
Protection from intrusion via telephone line
Following are the rationale behind the functional requirements corresponding to O.LINE.PROTECT in Table
22, and these requirements are included to fulfill the O.LINE.PROTECT specification.
a)
Prohibit intrusion via the fax line.
To fulfill O.LINE_PROTECT, unauthorised access by an attacker to the TOE via telephone line shall
be prevented.
For this, FDP_IFC.1 and FDP_IFF.1 allow fax data to pass from the fax process on the Fax Unit to the
fax reception process on the Controller Board only if the data received from the telephone line is fax
data.
6.3.3
Dependency Analysis
Table 23 shows the correspondence of dependencies in this ST for the TOE security functional requirements.
Table 23: Correspondence of dependencies of TOE security functional requirements
TOE security
functional
requirements
Dependencies
claimed by CC
Dependencies
satisfied in ST
Dependencies not
satisfied in ST
FAU_GEN.1
FPT_STM.1
FPT_STM.1
None
FAU_SAR.1
FAU_GEN.1
FAU_GEN.1
None
FAU_SAR.2
FAU_SAR.1
FAU_SAR.1
None
FAU_STG.1
FAU_GEN.1
FAU_GEN.1
None
FAU_STG.4
FAU_STG.1
FAU_STG.1
None
FCS_CKM.1
[FCS_CKM.2 or
FCS_COP.1]
FCS_CKM.4
FCS_COP.1
FCS_CKM.4
FCS_COP.1
[FDP_ITC.1 or
FDP_ITC.2 or
FCS_CKM.1]
FCS_CKM.4
FCS_CKM.1
FCS_CKM.4
FDP_ACC.1
FDP_ACF.1
FDP_ACF.1
None
FDP_ACF.1
FDP_ACC.1
FMT_MSA.3
FDP_ACC.1
FMT_MSA.3
None