FAU_SAR.2 Restricted audit review
Hierarchical to:
No other components.
Dependencies:
FAU_SAR.1 Audit review
FAU_SAR.2.1
The TSF shall prohibit all users read access to the audit records, except those users that have
been granted explicit read-access.
6.1.2
Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to:
No other components.
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1
The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorithm in Table 13] and
specified cryptographic key sizes [assignment: cryptographic key sizes in Table 13] that
meet the following: [assignment: standards in Table 13].
Key Type
HDD cryptographic key
FCS_COP.1 Cryptographic operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1
The TSF shall perform [assignment: cryptographic operations shown in Table 14] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in Table 14] and cryptographic key sizes [assignment: cryptographic key sizes shown
in Table 14] that meet the following: [assignment: standards shown in Table 14].
Key Type
HDD
cryptographic
key
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Table 13 : List of Cryptographic Key Generation
Standard
BSI-AIS31
Table 14 : List of Cryptographic Operation
Standard
Cryptographic
Algorithm
FIPS197
AES
Cryptographic Key
Generation Algorithm
TRNG
Cryptographic
Key Size
256 bits
- Encryption when writing the data
on HDD
- Decryption when reading the data
Page 52 of 93
Cryptographic
Key Size
256 bits
Cryptographic Operation