Fuji Xerox C2265 Manual page 106

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Security Objectives
O.CONF.NO_DIS,
O.CONF.NO_ALT
(Protection of TSF
Data from
unauthorized
disclosure or
alteration)
O.AUDIT_STORAGE.
PROTECTED
Fuji Xerox C2265/C2263
Security Functional Requirements Rationale
By FMT_MTD.1 (b), the setting of ID for general users is restricted to
system administrator and owner.
By FMT_SMF.1, TOE security management functions are provided for
system administrator.
By FMT_SMR.1, the roles of key operator, SA, system administrator and
general user are maintained and associated with the key operator, SA,
system administrator and general user.
By FTP_ITC.1, communication data encryption protocol is supported to
protect D.CONF on the internal network between TOE and IT products
from any threat.
Thus, the functional requirements related to this objective are surely
fulfilled.
O.CONF.NO_DIS and O.CONF.NO_ALT are the objectives to protect
D.CONF of TOE from unauthorized disclosure or alteration.
This security objective can be realized by satisfying the following security
functional requirements:
By FIA_UID.1, only the authorized user is permitted to handle D.CONF by
conducting the user identification.
By FMT_MOF.1, the user who enables/disables TOE security functions and
makes functional settings is limited to system administrator.
By FMT_MTD.1(a), the person who can make settings of TOE security
functions is limited to system administrator. Thus, only system
administrators can query and modify D.CONF.
By FMT_MTD.1(b), the setting of ID and password for general users is
restricted to system administrator and owner.
By FMT_SMF.1, TOE security management functions are provided for
system administrator.
By FMT_SMR.1, the roles of key operator, SA, system administrator and
general user are maintained and associated with the key operator, SA,
system administrator and general user.
By FTP_ITC.1, communication data encryption protocol is supported to
protect the security audit log data and D.CONF on the internal network
between TOE and IT products from any threat.
Thus, the functional requirements related to this objective are surely
fulfilled.
O.AUDIT_STORAGE.PROTECTED is the objective that protects the audit
logs from unauthorized access, deletion, and modification.
This security objective can be realized by satisfying the following security
functional requirements:
By FAU_STG.1, the security audit log data stored in an audit log file is
- 101 -
Security Target
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents