Ricoh Aficio MP 3350B Security Target - Page 57

Security Requirements Rationale

Page 57 highlights

Page 57 of 83 6.3 Security Requirements Rationale This chapter describes the rationale for the security requirements. As described below, if all security functional requirements are satisfied, the security objectives defined in "4.1 Security Objectives for TOE" are achieved. 6.3.1 Tracing Table 23 shows the relation between the TOE security functional requirements and TOE security objectives. The "X" in the table indicates that the each of the TOE security functional requirements and the TOE security objectives correspond. Table 23 shows that each TOE security functional requirement corresponds to one or more TOE security objectives. Table 23: Relation between Security Objectives and Functional Requirements O.AUDIT O.I&A O.DOC_ACC O.MANAGE O.MEM.PROTECT O.NET.PROTECT O.GENUINE O.LINE_PROTECT FAU_GEN.1 X FAU_SAR.1 X FAU_SAR.2 X FAU_STG.1 X FAU_STG.4 X FCS_CKM.1 X FCS_COP.1 X FDP_ACC.1 X FDP_ACF.1 X FDP_IFC.1 X FDP_IFF.1 X FIA_AFL.1 X FIA_ATD.1 X FIA_SOS.1 X FIA_UAU.2 X FIA_UAU.7 X Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 57 of 83
6.3
Security Requirements Rationale
This chapter describes the rationale for the security requirements.
As described below, if all security functional requirements are satisfied, the security objectives defined in
"4.1 Security Objectives for TOE" are achieved.
6.3.1
Tracing
Table 23 shows the relation between the TOE security functional requirements and TOE security objectives.
The "X" in the table indicates that the each of the TOE security functional requirements and the TOE
security objectives correspond.
Table 23 shows that each TOE security functional requirement corresponds to one or more TOE security
objectives.
Table 23: Relation between Security Objectives and Functional Requirements
O.AUDIT
O.I&A
O.DOC_ACC
O.MANAGE
O.MEM.PROTECT
O.NET.PROTECT
O.GENUINE
O.LINE_PROTECT
FAU_GEN.1
X
FAU_SAR.1
X
FAU_SAR.2
X
FAU_STG.1
X
FAU_STG.4
X
FCS_CKM.1
X
FCS_COP.1
X
FDP_ACC.1
X
FDP_ACF.1
X
FDP_IFC.1
X
FDP_IFF.1
X
FIA_AFL.1
X
FIA_ATD.1
X
FIA_SOS.1
X
FIA_UAU.2
X
FIA_UAU.7
X
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.