Ricoh Aficio MP C2800 Security Target - Page 55

O.audit, O.i&a, O.doc_acc, O.manage, O.mem.protect, O.net.protect, O.genuine, O.line_protect,

Page 55 highlights

Page 55 of 80 O.AUDIT O.I&A O.DOC_ACC O.MANAGE O.MEM.PROTECT O.NET.PROTECT O.GENUINE O.LINE_PROTECT FIA_USB.1 FMT_MSA.1 FMT_MSA.3 FMT_MTD.1 FMT_SMF.1 FMT_SMR.1 FPT_STM.1 FPT_TST.1 FTP_ITC.1 FTP_TRP.1 v v v v v v v v v v v 6.3.2 Justification of Traceability This section describes how the TOE security objectives are fulfilled by the TOE security functional requirements corresponding to the TOE security objectives shown inTable 22. O.AUDIT Audit Following are the rationale behind the functional requirements corresponding to O.AUDIT in Table 22, and these requirements are included to fulfil the O.AUDIT specification. a ) Record audit logs To fulfil O.AUDIT, the performance of Security Functions should be recorded as audit logs. For this, FAU_GEN.1 generates audit information whenever an Audit Function starts and ends, whenever an identification or authentication function is performed, whenever users operate protected assets, whenever protected assets are encrypted, and whenever a major Management Function is performed. The log also records the date, time, type, subject identity, and outcome of each event. b) Provide Audit Function To fulfil O.AUDIT, access to audit logs should be restricted to the machine administrator only, and in a format that can be audited. For this, FAU_SAR.1 allows only the machine administrator to read audit logs, and FAU_SAR.2 prohibits persons other than the machine administrator reading audit logs. c ) Protect audit logs To fulfil O.AUDIT, audit logs should have adequate protection. For this, FAU_STG.4 protects audit logs from unauthorised deletion and prevents unauthorised tampering. If auditable events occur and the audit log files are full, FAU_STG.4 prevents loss of recent audit logs by writing the newer audit logs over audit logs that have the oldest time stamp. Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

Page 55 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
O.AUDIT
O.I&A
O.DOC_ACC
O.MANAGE
O.MEM.PROTECT
O.NET.PROTECT
O.GENUINE
O.LINE_PROTECT
FIA_USB.1
v
FMT_MSA.1
v
FMT_MSA.3
v
FMT_MTD.1
v
FMT_SMF.1
v
FMT_SMR.1
v
FPT_STM.1
v
FPT_TST.1
v
v
FTP_ITC.1
v
FTP_TRP.1
v
6.3.2
Justification of Traceability
This section describes how the TOE security objectives are fulfilled by the TOE security functional
requirements corresponding to the TOE security objectives shown inTable 22.
O.AUDIT
Audit
Following are the rationale behind the functional requirements corresponding to O.AUDIT in Table 22,
and these requirements are included to fulfil the O.AUDIT specification.
a)
Record audit logs
To fulfil O.AUDIT, the performance of Security Functions should be recorded as audit logs. For this,
FAU_GEN.1 generates audit information whenever an Audit Function starts and ends, whenever an
identification or authentication function is performed, whenever users operate protected assets,
whenever protected assets are encrypted, and whenever a major Management Function is performed.
The log also records the date, time, type, subject identity, and outcome of each event.
b)
Provide Audit Function
To fulfil O.AUDIT, access to audit logs should be restricted to the machine administrator only, and in a
format that can be audited. For this, FAU_SAR.1 allows only the machine administrator to read audit
logs, and FAU_SAR.2 prohibits persons other than the machine administrator reading audit logs.
c)
Protect audit logs
To fulfil O.AUDIT, audit logs should have adequate protection. For this, FAU_STG.4 protects audit
logs from unauthorised deletion and prevents unauthorised tampering. If auditable events occur and the
audit log files are full, FAU_STG.4 prevents loss of recent audit logs by writing the newer audit logs
over audit logs that have the oldest time stamp.