Page 3 of 83
Table of Contents
1
ST Introduction
.....................................................................................................................
8
1.1
ST Reference
..................................................................................................................
8
1.2
TOE Reference
...............................................................................................................
8
1.3
TOE Overview
..............................................................................................................
10
1.3.1
TOE Type
.................................................................................................................
10
1.3.2
TOE Usage and Major Security Features of TOE
..................................................
10
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
........................
10
1.4
TOE Description
...........................................................................................................
12
1.4.1
Physical Scope of TOE
.............................................................................................
12
1.4.2
Guidance Documents
...............................................................................................
15
1.4.3
User Roles
................................................................................................................
17
1.4.3.1
Responsible Manager for MFP
.........................................................................
17
1.4.3.2
Administrator
...................................................................................................
18
1.4.3.3
Supervisor
.........................................................................................................
18
1.4.3.4
General User
.....................................................................................................
18
1.4.3.5
Customer Engineer
...........................................................................................
18
1.4.4
Logical Scope of TOE
...............................................................................................
18
1.4.4.1
Basic Functions
................................................................................................
19
1.4.4.2
Security Functions
............................................................................................
22
1.4.5
Protected Assets
.......................................................................................................
25
1.4.5.1
Document Data
.................................................................................................
25
1.4.5.2
Print Data
.........................................................................................................
26
2
Conformance Claims
...........................................................................................................
27
2.1
CC Conformance Claim
................................................................................................
27
2.2
PP Claims, Package Claims
.........................................................................................
27
2.3
Conformance Rationale
................................................................................................
27
3
Security Problem Definition
...............................................................................................
28
3.1
Threats
.........................................................................................................................
28
3.2
Organisational Security Policies
..................................................................................
28
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.