3.1
Threats ......................................................................................................................... 31
3.2
3.3
Assumptions................................................................................................................. 32
4
Security Objectives.............................................................................................................. 34
4.1
4.2
4.2.1
IT Environment .......................................................................................................35
4.2.2
Non-IT Environment ...............................................................................................36
4.3
4.3.1
4.3.2
5
5.1
6
Security Requirements........................................................................................................ 44
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
Class FTA: TOE access............................................................................................61
6.1.8
6.2
6.3
6.3.1
Tracing .....................................................................................................................63
6.3.2
6.3.3
Dependency Analysis...............................................................................................70
6.3.4
7
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Page 3 of 87