Organizational Security Policies; Assumptions - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

3.2.

Organizational Security Policies

Table 8 below describes the organizational security policies the TOE must comply with.
Name
P.USER.AUTHORIZATION
P.SOFTWARE.VERIFICATION
P.AUDIT.LOGGING
P.INTERFACE.MANAGEMENT
P.CIPHER
3.3.

Assumptions

Table 9 shows the assumptions for the operation and use of this TOE.
Assumption
A.ACCESS.MANAGED The TOE is located in a restricted or monitored environment that provides
A.USER.TRAINING
A.ADMIN.TRAINING
A.ADMIN.TRUST
Fuji Xerox C2265/C2263
Table 8 Organizational Security Policies
Definition
To preserve operational accountability and security, Users will
be authorized to use the TOE only as permitted by the TOE
Owner
To detect corruption of the executable code in the TSF,
procedures will exist to self-verify executable code in the TSF
To preserve operational accountability and security, records that
provide an audit trail of TOE use and security-relevant events
will be created, maintained, and protected from unauthorized
disclosure or alteration, and will be reviewed by authorized
personnel
To prevent unauthorized use of the external interfaces of the
TOE, operation of the interfaces will be controlled by the TOE
and its IT environment.
To prevent unauthorized reading-out, the document data and
used document data in the internal HDD will be encrypted by
the TOE.
Table 9 Assumptions
Definition
protection from unmanaged access to the physical components and data
interfaces of the TOE.
TOE Users are aware of the security policies and procedures of their
organization, and are trained and competent to follow those policies and
procedures.
Administrators are aware of the security policies and procedures of their
organization, are trained and competent to follow the manufacturer's
guidance and documentation, and correctly configure and operate the
TOE in accordance with those policies and procedures.
Administrators do not use their privileged access rights for malicious
purposes.
Security Target
- 27 -
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents