Samsung Multifunction MultiXpress X4220, X4250, X4300, X401, K4250, K4300, K4350, K401 Series
4.3
Security Objectives Rationale
This section demonstrates that each threat, organizational security policy, and assumption is mitigated
by at least one security objective and that those security objectives counter the threats, enforce the
policies, and uphold the assumptions. Table 21 shows the correspondences of security objectives,
assumptions, threats, and organizational security policies. Table 22 shows that each security problem
is covered by the defined security objectives.
Threats/ Policies/
Assumptions
T.DOC.DIS
T.DOC.ALT
T.FUNC.ALT
T.PROT.ALT
T.CONF.DIS
T.CONF.ALT
P.USER.AUTHORI
ZATION
P.SOFTWARE.VE
RIFICATION
P.AUDIT.LOGGIN
G
P.INTERFACE.MA
NAGEMENT
A.ACCESS.MANA
GED
A.USER.TRAININ
G
A.ADMIN.TRAINI
NG
A.ADMIN.TRUST
Copyright
Table 21: Completeness of Security Objectives
2014 SAMSUNG ELECTRONICS Co., Ltd., All rights reserved
Objective
38