Ricoh Aficio MP 5002 Security Target - Page 79

Rationale for Removing Dependencies on FCS_CKM.4

Page 79 highlights

FIA_USB.1 FPT_FDI_EXP.1 FMT_MSA.1(a) FMT_MSA.1(b) FMT_MSA.3(a) FMT_MSA.3(b) FMT_MTD.1 FMT_SMF.1 FMT_SMR.1 FPT_STM.1 FPT_TST.1 FTA_SSL.3 FTP_ITC.1 FIA_ATD.1 FMT_SMF.1 FMT_SMR.1 [FDP_ACC.1(a) or FDP_IFC.1] FMT_SMR.1 FMT_SMF.1 [FDP_ACC.1(b) or FDP_IFC.1] FMT_SMR.1 FMT_SMF.1 FMT_MSA.1(a) FMT_SMR.1 FMT_MSA.1(b) FMT_SMR.1 FMT_SMR.1 FMT_SMF.1 None FIA_UID.1 None None None None FIA_ATD.1 FMT_SMF.1 FMT_SMR.1 FDP_ACC.1(a) FMT_SMR.1 FMT_SMF.1 FDP_ACC.1(b) FMT_SMR.1 FMT_SMF.1 FMT_MSA.1(a) FMT_SMR.1 FMT_MSA.1(b) FMT_SMR.1 FMT_SMR.1 FMT_SMF.1 None FIA_UID.1 None None None None None None None None None None None None None None None None None Page 78 of 93 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on FCS_CKM.4 Once the MFP administrator generates the cryptographic key that is used for the HDD encryption of this TOE at the start of TOE operation, the cryptographic key will be continuously used for the HDD and will not be deleted. Therefore, cryptographic key destruction by the standard method is unnecessary. 6.3.4 Security Assurance Requirements Rationale This TOE is the MFP, which is a commercially available product. The MFP is assumed that it will be used in a general office and this TOE does not assume the attackers with Enhanced-Basic or higher level of attack potential. Architectural design (ADV_TDS.2) is adequate to show the validity of commercially available products. A high attack potential is required for the attacks that circumvent or tamper with the TSF, which is not covered in this evaluation. The vulnerability analysis (AVA_VAN.2) is therefore adequate for general needs. However, protection of the secrecy of relevant information is required to make security attacks more difficult, and it is important to ensure a secure development environment. Development security (ALC_DVS.1) is therefore important also. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 78 of
93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
FIA_USB.1
FIA_ATD.1
FIA_ATD.1
None
FPT_FDI_EXP.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
None
FMT_MSA.1(a)
[FDP_ACC.1(a) or
FDP_IFC.1]
FMT_SMR.1
FMT_SMF.1
FDP_ACC.1(a)
FMT_SMR.1
FMT_SMF.1
None
FMT_MSA.1(b)
[FDP_ACC.1(b)
or FDP_IFC.1]
FMT_SMR.1
FMT_SMF.1
FDP_ACC.1(b)
FMT_SMR.1
FMT_SMF.1
None
FMT_MSA.3(a)
FMT_MSA.1(a)
FMT_SMR.1
FMT_MSA.1(a)
FMT_SMR.1
None
FMT_MSA.3(b)
FMT_MSA.1(b)
FMT_SMR.1
FMT_MSA.1(b)
FMT_SMR.1
None
FMT_MTD.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
None
FMT_SMF.1
None
None
None
FMT_SMR.1
FIA_UID.1
FIA_UID.1
None
FPT_STM.1
None
None
None
FPT_TST.1
None
None
None
FTA_SSL.3
None
None
None
FTP_ITC.1
None
None
None
The following explains the rationale for acceptability in all cases where a dependency is not satisfied:
Rationale for Removing Dependencies on FCS_CKM.4
Once the MFP administrator generates the cryptographic key that is used for the HDD encryption of this
TOE at the start of TOE operation, the cryptographic key will be continuously used for the HDD and will not
be deleted. Therefore, cryptographic key destruction by the standard method is unnecessary.
6.3.4
Security Assurance Requirements Rationale
This TOE is the MFP, which is a commercially available product. The MFP is assumed that it will be used in
a general office and this TOE does not assume the attackers with Enhanced-Basic or higher level of attack
potential.
Architectural design (ADV_TDS.2) is adequate to show the validity of commercially available products. A
high attack potential is required for the attacks that circumvent or tamper with the TSF, which is not covered
in this evaluation. The vulnerability analysis (AVA_VAN.2) is therefore adequate for general needs.
However, protection of the secrecy of relevant information is required to make security attacks more difficult,
and it is important to ensure a secure development environment. Development security (ALC_DVS.1) is
therefore important also.