Ricoh Aficio MP 5002 Security Target - Page 3

Table of Contents - directions

Page 3 highlights

Page 2 of 93 Table of Contents 1 ST Introduction ...7 1.1 ST Reference ...7 1.2 TOE Reference ...7 1.3 TOE Overview ...8 1.3.1 TOE Type ...8 1.3.2 TOE Usage ...8 1.3.3 Major Security Features of TOE 11 1.4 TOE Description...11 1.4.1 Physical Boundary of TOE 11 1.4.2 Guidance Documents 14 1.4.3 Definition of Users 17 1.4.3.1. Direct User...17 1.4.3.2. Indirect User...18 1.4.4 Logical Boundary of TOE 20 1.4.4.1. Basic Functions 20 1.4.4.2. Security Functions 23 1.4.5 Protected Assets...25 1.4.5.1. User Data...25 1.4.5.2. TSF Data...25 1.4.5.3. Functions ...25 1.5 Glossary...26 1.5.1 Glossary for This ST 26 2 Conformance Claim...30 2.1 CC Conformance Claim 30 2.2 PP Claims...30 2.3 Package Claims ...30 2.4 Conformance Claim Rationale 31 2.4.1 Consistency Claim with TOE Type in PP 31 2.4.2 Consistency Claim with Security Problems and Security Objectives in PP .........31 2.4.3 Consistency Claim with Security Requirements in PP 32 3 Security Problem Definitions 35 Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 2 of
93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Table of Contents
1
ST Introduction
.....................................................................................................................
7
1.1
ST Reference
..................................................................................................................
7
1.2
TOE Reference
...............................................................................................................
7
1.3
TOE Overview
................................................................................................................
8
1.3.1
TOE Type
...................................................................................................................
8
1.3.2
TOE Usage
.................................................................................................................
8
1.3.3
Major Security Features of TOE
.............................................................................
11
1.4
TOE Description
...........................................................................................................
11
1.4.1
Physical Boundary of TOE
......................................................................................
11
1.4.2
Guidance Documents
...............................................................................................
14
1.4.3
Definition of Users
...................................................................................................
17
1.4.3.1.
Direct User
........................................................................................................
17
1.4.3.2.
Indirect User
.....................................................................................................
18
1.4.4
Logical Boundary of TOE
........................................................................................
20
1.4.4.1.
Basic Functions
................................................................................................
20
1.4.4.2.
Security Functions
............................................................................................
23
1.4.5
Protected Assets
.......................................................................................................
25
1.4.5.1.
User Data
..........................................................................................................
25
1.4.5.2.
TSF Data
...........................................................................................................
25
1.4.5.3.
Functions
..........................................................................................................
25
1.5
Glossary
........................................................................................................................
26
1.5.1
Glossary for This ST
................................................................................................
26
2
Conformance Claim
.............................................................................................................
30
2.1
CC Conformance Claim
................................................................................................
30
2.2
PP Claims
.....................................................................................................................
30
2.3
Package Claims
............................................................................................................
30
2.4
Conformance Claim Rationale
.....................................................................................
31
2.4.1
Consistency Claim with TOE Type in PP
...............................................................
31
2.4.2
Consistency Claim with Security Problems and Security Objectives in PP
.........
31
2.4.3
Consistency Claim with Security Requirements in PP
..........................................
32
3
Security Problem Definitions
..............................................................................................
35