Table 42 Dependencies Of Functional Security Requirements - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Table 42 Dependencies of Functional Security Requirements

Functional Requirement
Requirement and its
name
FAU_GEN.1
Audit data generation
FAU_GEN.2
User identity association
FAU_SAR.1
Audit review
FAU_SAR.2
Restricted audit review
FAU_STG.1
Protected audit trail
storage
FAU_STG.4
Prevention of audit data
loss
FCS_CKM.1
Cryptographic key
generation
FCS_COP.1
Cryptographic operation
FDP_ACC.1(a)
Subset access control
FDP_ACC.1(b)
Subset access control
FDP_ACC.1(c)
Subset access control
FDP_ACC.1(d)
Subset access control
FDP_ACC.1(e)
Subset access control
Fuji Xerox C2265/C2263
Dependencies of Functional Requirements
Requirement that
is dependent on
FPT_STM.1
FAU_GEN.1
FIA_UID.1
FAU_GEN.1
FAU_SAR.1
FAU_GEN.1
FAU_STG.1
FCS_COP.1
FCS_CKM.1
FDP_ACF.1(a)
FDP_ACF.1(b)
FDP_ACF.1(c)
FDP_ACF.1(d)
FDP_ACF.1(e)
- 103 -
Security Target
Requirement that is not dependent on
and its rationale
-
-
-
-
-
-
FCS_CKM.4:
A cryptographic key is generated when MFD is
booted, and stored on DRAM (volatile memory). A
cryptographic key does not need to be destructed
because there is no means to access the
cryptographic key from the outside.
FCS_CKM.4:
A cryptographic key is generated when MFD is
booted, and stored on DRAM (volatile memory). A
cryptographic key does not need to be destructed
because there is no means to access the
cryptographic key from the outside.
-
-
-
-
-
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents