Table 12 Assumptions / Threats / Organizational Security policies and the Corresponding Security
Objectives
Threats, Policies,
and Assumptions
T.DOC.DIS
T.DOC.ALT
T.FUNC.ALT
T.PROT.ALT
T.CONF.DIS
T.CONF.ALT
P.USER.AUTHORIZATIO
N
P.SOFTWARE.VERIFICA
TION
P.AUDIT.LOGGING
P.INTERFACE.MANAGE
MENT
P.CIPHER
A.ACCESS.MANAGED
A.ADMIN.TRAINING
A.ADMIN.TRUST
A.USER.TRAINING
Threats, policies, and
assumptions
T.DOC.DIS
Fuji Xerox C2265/C2263
Table 13 Security Objectives Rationale for Security Problem
Summary
User Document Data
may be disclosed to
unauthorized persons.
Security Target
Objectives
Objectives and rationale
O.DOC.NO_DIS protects D.DOC from
unauthorized disclosure.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis
- 30 -
Copyright
2016 by Fuji Xerox Co., Ltd