Ricoh Aficio MP 3350B Security Target - Page 67

logs consist of Basic Audit Information and Expanded Audit Information. The Basic Audit Information

Page 67 highlights

Page 67 of 83 7.1.1.1 Audit logs generation The TOE generates the audit logs when auditable events occur, and appends them to the audit log files. Audit logs consist of Basic Audit Information and Expanded Audit Information. The Basic Audit Information is a data item recorded for the occurrence of any kinds of auditable events, and the Expanded Audit Information is a data item recorded for generating auditable events that require additional information for audit. Table 26 shows the audit information for each auditable event. If there is no free space in the audit log files to append new audit logs, the oldest audit logs in terms of the time/date information are overwritten with new audit logs. Table 26: Auditable Events and Auditable Information Auditable events Starting Audit Function (*1) Ending Audit Function (*1) Login Starting Lockout Releasing Lockout (*2) Lockout release at the TOE startup HDD encryption key generation Successful storage of Document Data Successful reading of Document Data (*3) Successful deletion of Document Data Receiving fax Changing user password (include newly creating and deleting password) Deleting Administrator Role Adding Administrator Role Changing Document Data ACL Changing date and time of system clock Audit logs Basic Audit Information Expanded Audit Information - Date/time of the events - Types of the events (Auditable events in this table) - Subject identity (*4) - Outcome Locked out User Locked out User who is to be released Release methods (Auto Lockout Release/Manual Lockout Release) - ID of object Document Data ID of object Document Data ID of object Document Data - In the case of newly creating/changing/deleting the user authentication information of others, the ID of the person making the change - - ID of object Document Data - Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83

Page 67 of 83
7.1.1.1
Audit logs generation
The TOE generates the audit logs when auditable events occur, and appends them to the audit log files. Audit
logs consist of Basic Audit Information and Expanded Audit Information. The Basic Audit Information is a
data item recorded for the occurrence of any kinds of auditable events, and the Expanded Audit Information
is a data item recorded for generating auditable events that require additional information for audit. Table 26
shows the audit information for each auditable event.
If there is no free space in the audit log files to append new audit logs, the oldest audit logs in terms of the
time/date information are overwritten with new audit logs.
Table 26: Auditable Events and Auditable Information
Audit logs
Auditable events
Basic Audit Information
Expanded Audit Information
Starting Audit Function (*1)
-
Ending Audit Function (*1)
-
Login
-
Starting Lockout
Locked out User
Releasing Lockout (*2)
Locked out User who is to be
released
Release methods (Auto Lockout
Release/Manual
Lockout
Release)
Lockout release at the TOE
startup
-
HDD encryption key generation
-
Successful
storage
of
Document Data
ID of object Document Data
Successful
reading
of
Document Data (*3)
ID of object Document Data
Successful
deletion
of
Document Data
ID of object Document Data
Receiving fax
-
Changing
user
password
(include newly creating and
deleting password)
In
the
case
of
newly
creating/changing/deleting
the
user authentication information
of others, the ID of the person
making the change
Deleting Administrator Role
-
Adding Administrator Role
-
Changing Document Data ACL
ID of object Document Data
Changing date and time of
system clock
- Date/time of the events
- Types of the events (Auditable
events in this table)
- Subject identity (*4)
- Outcome
-
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.