Rationale For Security Assurance Requirements; Table 6.3 Dependent Relations Between - Kyocera TASKalfa 3500i User Manual

Hide thumbs Also See for TASKalfa 3500i:
Table of Contents

Advertisement

TASKalfa 3500i, TASKalfa 4500i, TASKalfa 5500i
Data Security Kit (E) Overseas Version Security Target
Table 6.3 Dependent relations between TOE security functional requirements
TOE Security
No
Functional
Requirements
1
FCS. CKM.1
2
FCS_COP.1
3
FDP_RIP.1
6.3.2.1. Rationale for why dependency on FCS_CKM.4 is not needed
The cryptographic key is generated when the main power is tuned on, and is stored
for encryption operation that is to read and write the image data on the HDD while
the power is turned on. Beside this purpose, there is no interface available to
allow unauthorized users to get access.
cryptographic key destruction is not needed.

6.3.3. Rationale for Security Assurance Requirements

Since this TOE aims to counter the attacks from low level attackers to access
image data, the TOE is required to ensure the counter-measure against the low
level attacks. EAL3 includes analysis of the security measures of the TOE at
development phase (performing and analyzing systematic tests, and evaluating
the management of the development environment and the developed products)
and also includes analysis whether the sufficient guidance information is included
so that the security can be used safely. The assurance requirement conforms to
EAL3. Thus selection of EAL3 is reasonable.
Dependent
Hierarchical
Relations
None
FCS_COP.1
FCS_CKM.4
None
FCS_CKM.1
FCS_CKM.4
None
None
© 2011 KYOCERA MITA Corporation
20
Reference
No.
2
Not needed
Refer to 6.3.2.1
1
Not needed
Refer to 6.3.2.1
Thus the requirement for the
Note

Advertisement

Table of Contents
loading

This manual is also suitable for:

Taskalfa 4500iTaskalfa 5500i

Table of Contents