Ricoh Aficio MP 3350B Security Target - Page 6

List of s, List of Tables

Page 6 highlights

Page 6 of 83 List of Figures Figure 1: Environment for Usage of TOE...11 Figure 2: Hardware Configuration of TOE 13 Figure 3: Logical Scope of TOE ...19 Figure 4: Operation Panel (for North America 20 List of Tables Table 1: List of TOE...9 Table 2: List of Administrator Roles ...18 Table 3: Correspondence Table for Operation Permissions on Document Data and Operations on Document Data ...23 Table 4: Relation between Security Environment and Security Objectives 32 Table 5: List of Auditable Events ...36 Table 6: List of Cryptographic Key Generation 41 Table 7: List of Cryptographic Operation ...41 Table 8: List of Subjects, Objects, and Operations among Subjects and Objects 42 Table 9: Subjects, Objects and Security Attributes 42 Table 10: Rules Governing Access...43 Table 11: Rules Governing Access Explicitly 43 Table 12: List of Subjects, Information and Operation 44 Table 13: Security Attributes Corresponding to Subjects or Information 44 Table 14: List of Authentication Events ...45 Table 15: Lockout Release Actions...45 Table 16: Rules for Initial Association of Attributes 47 Table 17: Management Roles of Security Attributes 48 Table 18: Characteristics of Static Attribute Initialisation 49 Table 19: List of TSF Data Management ...49 Table 20: List of Specification of Management Functions 51 Table 21: Services Requiring Trusted Path 55 Table 22: TOE Security Assurance Requirements (EAL3 56 Table 23: Relation between Security Objectives and Functional Requirements 57 Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements 62 Table 25: Relation between TOE Security Functional Requirements and TOE Security Functions 65 Table 26: Auditable Events and Auditable Information 67 Table 27: User Roles and Authentication Methods 69 Table 28: Unlocking Administrators for Each User Role 70 Table 29: Initial Value for Document Data ACL 72 Table 30: Operations on the Document Data ACL and Authorised Operators 72 Table 31: Access to Administrator Information 73 Table 32: Authorised Operations on General User Information 74 Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 6 of 83
List of Figures
Figure 1: Environment for Usage of TOE
.....................................................................................................
11
Figure 2: Hardware Configuration of TOE
...................................................................................................
13
Figure 3: Logical Scope of TOE
...................................................................................................................
19
Figure 4: Operation Panel (for North America)
............................................................................................
20
List of Tables
Table 1: List of TOE
........................................................................................................................................
9
Table 2: List of Administrator Roles
.............................................................................................................
18
Table 3: Correspondence Table for Operation Permissions on Document Data and Operations on Document
Data
...............................................................................................................................................................
23
Table 4: Relation between Security Environment and Security Objectives
..................................................
32
Table 5: List of Auditable Events
..................................................................................................................
36
Table 6: List of Cryptographic Key Generation
............................................................................................
41
Table 7: List of Cryptographic Operation
.....................................................................................................
41
Table 8: List of Subjects, Objects, and Operations among Subjects and Objects
.........................................
42
Table 9: Subjects, Objects and Security Attributes
.......................................................................................
42
Table 10: Rules Governing Access
................................................................................................................
43
Table 11: Rules Governing Access Explicitly
...............................................................................................
43
Table 12: List of Subjects, Information and Operation
.................................................................................
44
Table 13: Security Attributes Corresponding to Subjects or Information
.....................................................
44
Table 14: List of Authentication Events
........................................................................................................
45
Table 15: Lockout Release Actions
...............................................................................................................
45
Table 16: Rules for Initial Association of Attributes
.....................................................................................
47
Table 17: Management Roles of Security Attributes
.....................................................................................
48
Table 18: Characteristics of Static Attribute Initialisation
.............................................................................
49
Table 19: List of TSF Data Management
......................................................................................................
49
Table 20: List of Specification of Management Functions
............................................................................
51
Table 21: Services Requiring Trusted Path
...................................................................................................
55
Table 22: TOE Security Assurance Requirements (EAL3)
...........................................................................
56
Table 23: Relation between Security Objectives and Functional Requirements
...........................................
57
Table 24: Correspondence Table of Dependencies of TOE Security Functional Requirements
....................
62
Table 25: Relation between TOE Security Functional Requirements and TOE Security Functions
.............
65
Table 26: Auditable Events and Auditable Information
................................................................................
67
Table 27: User Roles and Authentication Methods
.......................................................................................
69
Table 28: Unlocking Administrators for Each User Role
..............................................................................
70
Table 29: Initial Value for Document Data ACL
...........................................................................................
72
Table 30: Operations on the Document Data ACL and Authorised Operators
..............................................
72
Table 31: Access to Administrator Information
.............................................................................................
73
Table 32: Authorised Operations on General User Information
....................................................................
74
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.