Ricoh C400DN Security Target - Page 68
Security Requirements Rationale
![]() |
UPC - 026649029516
View all Ricoh C400DN manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 68 highlights
Assurance Classes AVA: Vulnerability assessment ATE_IND.2 AVA_VAN.2 Assurance Components Independent testing - sample Vulnerability analysis Page 67 of 91 6.3 Security Requirements Rationale This section describes the rationale for security requirements. If all security functional requirements are satisfied as below, the security objectives defined in "4 Security Objectives" are fulfilled. 6.3.1 Tracing Table 31 shows the relationship between the TOE security functional requirements and TOE security objectives. Table 31 shows that each TOE security functional requirement fulfils at least one TOE security objective. Table 31 : Relationship between Security Objectives and Functional Requirements O.DOC.NO_DIS O.DOC.NO_ALT O.FUNC.NO_ALT O.PROT.NO_ALT O.CONF.NO_DIS O.CONF.NO_ALT O.USER.AUTHORIZED O.INTERFACE.MANAGED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT FAU_GEN.1 FAU_GEN.2 FAU_STG.1 FAU_STG.4 FAU_SAR.1 FAU_SAR.2 FCS_CKM.1 FCS_COP.1 FDP_ACC.1(a) FDP_ACC.1(b) FDP_ACF.1(a) FDP_ACF.1(b) X X X X X X X X X X X X X X X X Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
![](/manual_guide/products/ricoh-c400dn-security-target-af27ae2/68.png)