Security Objectives For The Environment; Security Objectives Rationale - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

Objective
O.CIPHER
4.2.

Security Objectives for the Environment

Table 11 defines the security objectives for the TOE environment.
Objective
OE.PHYSICAL.MANAGED
OE.USER.AUTHORIZED
OE.USER.TRAINED
OE.ADMIN.TRAINED
OE.ADMIN.TRUSTED
OE.AUDIT.REVIEWED
OE.INTERFACE.MANAGED
4.3.

Security Objectives Rationale

The security objectives are established to correspond to the assumptions specified in Security
Problem Definition, to counter the threats, or to realize the organizational security policies.
Table 12 shows assumptions / threats / organizational security policies and the corresponding
security objectives.) Moreover, Table 13 shows that each defined security problem is covered by
the security objectives.
Fuji Xerox C2265/C2263
Definition
The TOE shall provide the function to encrypt the document
data and used document data in the internal HDD so that they
cannot be read out.
Table 11 Security objectives for the environment
Definition
The TOE shall be placed in a secure or monitored area that provides
protection from unmanaged physical access to the TOE.
The TOE Owner shall grant permission to Users to be authorized to use
the TOE according to the security policies and procedures of their
organization.
The TOE Owner shall ensure that Users are aware of the security
policies and procedures of their organization, and have the training and
competence to follow those policies and procedures.
The TOE Owner shall ensure that TOE Administrators are aware of the
security policies and procedures of their organization, have the training,
competence, and time to follow the manufacturer's guidance and
documentation, and correctly configure and operate the TOE in
accordance with those policies and procedures.
The TOE Owner shall establish trust that TOE Administrators will not
use their privileged access rights for malicious purposes.
The TOE Owner shall ensure that audit logs are reviewed at appropriate
intervals for security violations or unusual patterns of activity.
The IT environment shall provide protection from unmanaged access
to TOE interfaces.
Security Target
- 29 -
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents