Ricoh Aficio MP C3501 Security Target - Page 38

Organisational Security Policies, Assumptions - reviews

Page 38 highlights

3.2 Organisational Security Policies The following organisational security policies are taken: Page 37 of 93 P.USER.AUTHORIZATION User identification and authentication Only users with operation permission of the TOE shall be authorised to use the TOE. P.SOFTWARE.VERIFICATION Software verification Procedures shall exist to self-verify executable code in the TSF. P.AUDIT.LOGGING Management of audit log records The TOE shall create and maintain a log of TOE use and security-relevant events. The audit log shall be protected from unauthorised disclosure or alteration, and shall be reviewed by authorised persons. P.INTERFACE.MANAGEMENT Management of external interfaces To prevent unauthorised use of the external interfaces of the TOE, operation of those interfaces shall be controlled by the TOE and its IT environment. P.STORAGE.ENCRYPTION Encryption of storage devices The data stored on the HDD inside the TOE shall be encrypted. P.RCGATE.COMM.PROTECT Protection of communication with RC Gate As for communication with RC Gate, the TOE shall protect the communication data between itself and RC Gate. 3.3 Assumptions The assumptions related to this TOE usage environment are identified and described. A.ACCESS.MANAGED Access management According to the guidance document, the TOE is placed in a restricted or monitored area that provides protection from physical access by unauthorised persons. A.USER.TRAINING User training The responsible manager of MFP trains users according to the guidance document and users are aware of the security policies and procedures of their organisation and are competent to follow those policies and procedures. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94

Page 37 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
3.2
Organisational Security Policies
The following organisational security policies are taken:
P.USER.AUTHORIZATION
User identification and authentication
Only users with operation permission of the TOE shall be authorised to use the TOE.
P.SOFTWARE.VERIFICATION
Software verification
Procedures shall exist to self-verify executable code in the TSF.
P.AUDIT.LOGGING
Management of audit log records
The TOE shall create and maintain a log of TOE use and security-relevant events. The
audit log shall be protected from unauthorised disclosure or alteration, and shall be
reviewed by authorised persons.
P.INTERFACE.MANAGEMENT
Management of external interfaces
To prevent unauthorised use of the external interfaces of the TOE, operation of those
interfaces shall be controlled by the TOE and its IT environment.
P.STORAGE.ENCRYPTION
Encryption of storage devices
The data stored on the HDD inside the TOE shall be encrypted.
P.RCGATE.COMM.PROTECT
Protection of communication with RC Gate
As for communication with RC Gate, the TOE shall protect the communication data
between itself and RC Gate.
3.3
Assumptions
The assumptions related to this TOE usage environment are identified and described.
A.ACCESS.MANAGED
Access management
According to the guidance document, the TOE is placed in a restricted or monitored
area that provides protection from physical access by unauthorised persons.
A.USER.TRAINING
User training
The responsible manager of MFP trains users according to the guidance document and
users are aware of the security policies and procedures of their organisation and are
competent to follow those policies and procedures.