Ricoh Aficio MP C2800 Security Target - Page 56

FIA_ATD.1 and FIA_USB.1.

Page 56 highlights

Page 56 of 80 d) Reliable record of time of event To fulfil O.AUDIT, a reliable record of the times when events occurred should be available, as this will help identify security breaches. For this, FPT_STM.1 provides a trusted time stamp. O.I&A User identification and authentication Following are the rationale behind the functional requirements corresponding to O.I&A in Table 22, and these requirements are included to fulfil the O.I&A specification. a ) Identify and authenticate users before they use the TOE. To fulfil O.I&A, user identification and authentication shall be performed prior to allowing user access to the TOE Security Functions. For this, FIA_UID.2 identifies users prior to their use of TOE Security Functions, and FIA_UAU.2 authenticates identified users. b) Allow successfully identified and auth enticated users to use the TOE. To fulfil O.I&A, users who authenticate successfully before they use any TOE Security Functions shall be allowed use of the functions they have permission for. For this, FIA_ATD.1 and FIA_USB.1 bind successfully identified and authenticated users with relevant subjects. Association and maintenance of the subjects with security attributes is also performed by FIA_ATD.1 and FIA_USB.1. c ) Complicate decoding of passwords. To fulfil O.I&A, passwords for user authentication shall beprotected from others while they are being entered, and must not be easily guessable. For this, FIA_UAU.7 prevents passwords being viewed by displaying masking characters (*: asterisks or : bullets) in place of each password character entered in the authentication feedback area. FIA_SOS.1 accepts only passwords that satisfy the Minimum Password Length and password character combination specified by the user administrator, and it enables only passwords that are not easily guessable. FIA_AFL.1 also reduces the possibility of users guessing passwords by locking out users when their number of authentication attempts reaches the number specified by the machine administrator. The authentication attempts include user authentication attempts from the Operation Panel, the Web browser of a client computer, or a client computer when printing or faxing. O.DOC_ACC Control of access to protected assets Following are the rationale behind the functional requirements corresponding to O.DOC_ACC inTable 22, and these requirements are included to fulfil the O.DOC_ACC specification. a ) Specify access control to document data and perform operations. To fulfil O.DOC_ACC, each user shall be allowed to perform operations on document data according to the operation permissions for document data set for each type of subject associated with the users and each security attribute associated with the subject. For this, FDP_ACC.1 and FDP_ACF.1 allow the administrator to delete document data if the administrator's role associated with the administrator process is the file administrato.r For general users, FDP_ACC.1 and FDP_ACF.1 allow storage of document data, and when the general user IDs associated with general user processes are registered in the document data ACL of a document, Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

Page 56 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
d)
Reliable record of time of event
To fulfil O.AUDIT, a reliable record of the times when events occurred should be available, as this will
help identify security breaches.
For this, FPT_STM.1 provides a trusted time stamp.
O.I&A
User identification and authentication
Following are the rationale behind the functional requirements corresponding to O.I&A in Table 22, and
these requirements are included to fulfil the O.I&A specification.
a)
Identify and authenticate users before they use the TOE.
To fulfil O.I&A, user identification and authentication shall be performed prior to allowing user access
to the TOE Security Functions.
For this, FIA_UID.2 identifies users prior to their use of TOE Security Functions, and FIA_UAU.2
authenticates identified users.
b)
Allow successfully identified and authenticated users to use the TOE.
To fulfil O.I&A, users who authenticate successfully before they use any TOE Security Functions shall
be allowed use of the functions they have permission for.
For this, FIA_ATD.1 and FIA_USB.1 bind successfully identified and authenticated users with relevant
subjects. Association and maintenance of the subjects with security attributes is also performed by
FIA_ATD.1 and FIA_USB.1.
c)
Complicate decoding of passwords.
To fulfil O.I&A, passwords for user authentication shall beprotected from others while they are being
entered, and must not be easily guessable.
For this, FIA_UAU.7 prevents passwords being viewed by displaying masking characters (*: asterisks
or
?
: bullets) in place of each password character entered in the authentication feedback area.
FIA_SOS.1 accepts only passwords that satisfy the Minimum Password Length and password character
combination specified by the user administrator, and it enables only passwords that are not easily
guessable. FIA_AFL.1 also reduces the possibility of users guessing passwords by locking out users
when their number of authentication attempts reaches the number specified by the machine
administrator. The authentication attempts include user authentication attempts from the Operation
Panel, the Web browser of a client computer, or a client computer when printing or faxing.
O.DOC_ACC
Control of access to protected assets
Following are the rationale behind the functional requirements corresponding to O.DOC_ACC in
Table 22,
and these requirements are included to fulfil the O.DOC_ACC specification.
a )
Specify access control to document data and perform operations.
To fulfil O.DOC_ACC, each user shall be allowed to perform operations on document data according
to the operation permissions for document data set for each type of subject associated with the users and
each security attribute associated with the subject.
For this, FDP_ACC.1 and FDP_ACF.1 allow the administrator to delete document data if the
administrator's role associated with the administrator process is the file administrator
. For general users,
FDP_ACC.1 and FDP_ACF.1 allow storage of document data, and when the general user IDs
associated with general user processes are registered in the document data ACL of a document,