Ricoh Aficio MP 3350B Security Target - Page 3

Table of Contents

Page 3 highlights

Table of Contents Page 3 of 83 1 ST Introduction ...8 1.1 ST Reference ...8 1.2 TOE Reference ...8 1.3 TOE Overview ...10 1.3.1 TOE Type ...10 1.3.2 TOE Usage and Major Security Features of TOE 10 1.3.3 Environment for TOE Usage and Non-TOE Configuration Items 10 1.4 TOE Description...12 1.4.1 Physical Scope of TOE 12 1.4.2 Guidance Documents 15 1.4.3 User Roles ...17 1.4.3.1 Responsible Manager for MFP 17 1.4.3.2 Administrator 18 1.4.3.3 Supervisor ...18 1.4.3.4 General User...18 1.4.3.5 Customer Engineer 18 1.4.4 Logical Scope of TOE 18 1.4.4.1 Basic Functions 19 1.4.4.2 Security Functions 22 1.4.5 Protected Assets...25 1.4.5.1 Document Data 25 1.4.5.2 Print Data ...26 2 Conformance Claims ...27 2.1 CC Conformance Claim 27 2.2 PP Claims, Package Claims 27 2.3 Conformance Rationale 27 3 Security Problem Definition 28 3.1 Threats ...28 3.2 Organisational Security Policies 28 Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 3 of 83
Table of Contents
1
ST Introduction
.....................................................................................................................
8
1.1
ST Reference
..................................................................................................................
8
1.2
TOE Reference
...............................................................................................................
8
1.3
TOE Overview
..............................................................................................................
10
1.3.1
TOE Type
.................................................................................................................
10
1.3.2
TOE Usage and Major Security Features of TOE
..................................................
10
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
........................
10
1.4
TOE Description
...........................................................................................................
12
1.4.1
Physical Scope of TOE
.............................................................................................
12
1.4.2
Guidance Documents
...............................................................................................
15
1.4.3
User Roles
................................................................................................................
17
1.4.3.1
Responsible Manager for MFP
.........................................................................
17
1.4.3.2
Administrator
...................................................................................................
18
1.4.3.3
Supervisor
.........................................................................................................
18
1.4.3.4
General User
.....................................................................................................
18
1.4.3.5
Customer Engineer
...........................................................................................
18
1.4.4
Logical Scope of TOE
...............................................................................................
18
1.4.4.1
Basic Functions
................................................................................................
19
1.4.4.2
Security Functions
............................................................................................
22
1.4.5
Protected Assets
.......................................................................................................
25
1.4.5.1
Document Data
.................................................................................................
25
1.4.5.2
Print Data
.........................................................................................................
26
2
Conformance Claims
...........................................................................................................
27
2.1
CC Conformance Claim
................................................................................................
27
2.2
PP Claims, Package Claims
.........................................................................................
27
2.3
Conformance Rationale
................................................................................................
27
3
Security Problem Definition
...............................................................................................
28
3.1
Threats
.........................................................................................................................
28
3.2
Organisational Security Policies
..................................................................................
28
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.