Ricoh Aficio MP C2800 Security Target - Page 4

Security Objectives, Extended Components Definition, Security Requirements, TOE Summary - specifications

Page 4 highlights

Page 4 of 80 3.3 Assumptions...26 4 Security Objectives 27 4.1 Security Objectives for TOE 27 4.2 Security Objectives of Operational Environment 28 4.3 Security Objectives Rationale 28 4.3.1 Tracing...28 4.3.2 Tracing Justification...29 5 Extended Components Definition 32 6 Security Requirements 33 6.1 Security Functional Requirements 33 6.1.1 Class FAU: Security audit...33 6.1.2 Class FCS: Cryptographic support 38 6.1.3 Class FDP: User data protection 39 6.1.4 Class FIA: Identification and Authentication 42 6.1.5 Class FMT: Security management 44 6.1.6 Class FPT: Protection of the TSF 51 6.1.7 Class FTP: Trusted path/channels 51 6.2 Security Assurance Requirements 53 6.3 Security Requirements Rationale 54 6.3.1 Tracing...54 6.3.2 Justification of Traceability 55 6.3.3 Dependency Analysis...59 6.3.4 Security Assurance Requirements Rationale 61 7 TOE Summary Specification 62 7.1 TOE Security Function 62 7.1.1 SF.AUDIT Audit Function 63 7.1.1.1 Generation of Audit Logs 63 7.1.1.2 Reading Audit Logs ...65 7.1.1.3 Protection of Audit Logs 65 7.1.1.4 Time Stamps...65 7.1.2 SF.I&A User Identification and Authentication Function 65 7.1.2.1 User Identification and Authentication 66 7.1.2.2 Actions in Event of Identification and Authentication Failure 66 Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

Page 4 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
3.3
Assumptions
.....................................................................................................
26
4
Security Objectives
..................................................................................................
27
4.1
Security Objectives for TOE
...............................................................................
27
4.2
Security Objectives of Operational Environment
..................................................
28
4.3
Security Objectives Rationale
.............................................................................
28
4.3.1
Tracing
.........................................................................................................................................
28
4.3.2
Tracing Justification
................................................................................................................
29
5
Extended Components Definition
..............................................................................
32
6
Security Requirements
.............................................................................................
33
6.1
Security Functional Requirements
......................................................................
33
6.1.1
Class FAU: Security audit
.....................................................................................................
33
6.1.2
Class FCS: Cryptographic support
.....................................................................................
38
6.1.3
Class FDP: User data protection
.........................................................................................
39
6.1.4
Class FIA: Identification and Authentication
.................................................................
42
6.1.5
Class FMT: Security management
......................................................................................
44
6.1.6
Class FPT: Protection of the TSF
........................................................................................
51
6.1.7
Class FTP: Trusted path/channels
......................................................................................
51
6.2
Security Assurance Requirements
.......................................................................
53
6.3
Security Requirements Rationale
........................................................................
54
6.3.1
Tracing
.........................................................................................................................................
54
6.3.2
Justification of Traceability
..................................................................................................
55
6.3.3
Dependency Analysis
...............................................................................................................
59
6.3.4
Security Assurance Requirements Rationale
..................................................................
61
7
TOE Summary Specification
.....................................................................................
62
7.1
TOE Security Function
......................................................................................
62
7.1.1
SF.AUDIT
Audit Function
..................................................................................................
63
7.1.1.1
Generation of Audit Logs
...............................................................................................
63
7.1.1.2
Reading Audit Logs
.........................................................................................................
65
7.1.1.3
Protection of Audit Logs
.................................................................................................
65
7.1.1.4
Time Stamps
......................................................................................................................
65
7.1.2
SF.I&A
User Identification and Authentication Function
........................................
65
7.1.2.1
User Identification and Authentication
....................................................................
66
7.1.2.2
Actions in Event of Identification and Authentication Failure
.........................
66