Ricoh Aficio MP C2800 Security Target - Page 3

Table of Contents - configuration page

Page 3 highlights

Table of Contents Page 3 of 80 1 ST Introduction...7 1.1 ST Reference...7 1.2 TOE Reference ...7 1.3 TOE Overview ...8 1.3.1 TOE Type...8 1.3.2 TOE Usage and Major Security Features of TOE 8 1.3.3 Environment for TOE Usage and Non-TOE Configuration Items 8 1.4 TOE Description 10 1.4.1 Physical Boundaries of TOE 10 1.4.2 Guidance Documents...13 1.4.3 User Roles...15 1.4.3.1 Responsible Manager of MFP 15 1.4.3.2 Administrator...15 1.4.3.3 Supervisor...15 1.4.3.4 General User...15 1.4.3.5 Customer Engineer...16 1.4.4 Logical Boundaries of TOE...16 1.4.4.1 Basic Functions ...16 1.4.4.2 Security Functions...18 1.4.5 Protected Assets...22 1.4.5.1 Document Data...22 1.4.5.2 Print Data...22 2 Conformance Claims 24 2.1 CC Conformance Claim 24 2.2 PP Claims, Package Claims 24 2.3 Conformance Rationale 24 3 Security Problem Definitions 25 3.1 Threats ...25 3.2 Organisational Security Policies 25 Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

Page 3 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction
.........................................................................................................
7
1.1
ST Reference
.......................................................................................................
7
1.2
TOE Reference
....................................................................................................
7
1.3
TOE Overview
....................................................................................................
8
1.3.1
TOE Type
.......................................................................................................................................
8
1.3.2
TOE Usage and Major Security Features of TOE
.............................................................
8
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items
...............................
8
1.4
TOE Description
...............................................................................................
10
1.4.1
Physical Boundaries of TOE
.................................................................................................
10
1.4.2
Guidance Documents
..............................................................................................................
13
1.4.3
User Roles
...................................................................................................................................
15
1.4.3.1
Responsible Manager of MFP
......................................................................................
15
1.4.3.2
Administrator
....................................................................................................................
15
1.4.3.3
Superviso r
..........................................................................................................................
15
1.4.3.4
General User
.....................................................................................................................
15
1.4.3.5
Customer Engineer
..........................................................................................................
16
1.4.4
Logical Boundaries of TOE
....................................................................................................
16
1.4.4.1
Basic Functions
................................................................................................................
16
1.4.4.2
Security Functions
...........................................................................................................
18
1.4.5
Protected Assets
........................................................................................................................
22
1.4.5.1
Document Data
.................................................................................................................
22
1.4.5.2
Print Data
..........................................................................................................................
22
2
Conformance Claims
................................................................................................
24
2.1
CC Conformance Claim
......................................................................................
24
2.2
PP Claims, Package Claims
................................................................................
24
2.3
Conformance Rationale
......................................................................................
24
3
Security Problem Definitions
....................................................................................
25
3.1
Threats
............................................................................................................
25
3.2
Organisational Security Policies
.........................................................................
25