Ricoh Aficio MP 7001 SP Manual page 5

With dataoverwritesecurity unit type h security target
Hide thumbs Also See for Aficio MP 7001 SP:
Table of Contents

Advertisement

Page 4 of 87
List of Figures
Figure 1 : Example of TOE Environment ....................................................................................................... 9
Figure 2 : Hardware Configuration of the TOE ............................................................................................ 11
Figure 3 : Logical Scope of the TOE ............................................................................................................ 19
List of Tables
Table 1 : Identification Information of TOE ................................................................................................... 6
Table 2 : Guidance for English Version-1 ..................................................................................................... 13
Table 3 : Guidance for English Version-2 ..................................................................................................... 14
Table 4 : Guidance for English Version-3 ..................................................................................................... 15
Table 5 : Guidance for English Version-4 ..................................................................................................... 16
Table 6 : Definition of Users ......................................................................................................................... 18
Table 7 : List of Administrative Roles .......................................................................................................... 18
Table 8: Definition of User Data ................................................................................................................... 23
Table 9: Definition of TSF Data.................................................................................................................... 24
Table 10: Specific Terms Related to This ST ................................................................................................ 24
Table 11: Rationale for Security Objectives.................................................................................................. 37
Table 12 : List of Auditable Events............................................................................................................... 44
Table 13 : List of Cryptographic Key Generation ......................................................................................... 47
Table 14: List of Cryptographic Operation ................................................................................................... 48
Table 17: Subjects, Objects and Security Attributes (a) ................................................................................ 49
Table 18: Rules on User Documents ............................................................................................................. 50
Table 19: Rules on User Jobs (a)................................................................................................................... 51
Table 20: Rules That Explicitly Authorise Access (a)................................................................................... 51
Table 21: Subjects, Objects and Security Attributes (b)................................................................................ 51
Table 22: Rules Governing the Operation for MFP Application (b) ............................................................. 52
Table 24: List of Actions for Authentication Failure..................................................................................... 53
Table 26: Rules for Initial Association of Attributes ..................................................................................... 55
Table 27: User Roles for Security Attributes (a) ........................................................................................... 55
Table 28: User Roles for Security Attributes (b) ........................................................................................... 56
Table 29: Properties of Static Attribute Initialisation (a)............................................................................... 57
Table 30: Authorised Identified Roles Allowed to Override Default Values................................................. 58
Table 31: List of TSF Data............................................................................................................................ 59
Table 32: List of Specification of Management Functions............................................................................ 60
Table 33: TOE Security Assurance Requirements (EAL3+ALC_FLR.2)..................................................... 62
Table 36: Auditable Events and Audit Data .................................................................................................. 73

Advertisement

Table of Contents
loading

Table of Contents