6.3.
Security Requirement Rationale
6.3.1.
Security Functional Requirements Rationale
Table 40 lists security functional requirements and the corresponding security objectives.
As shown in this table, each security functional requirement corresponds to at least one security
objective of the TOE. Table 41 shows the rationale demonstrating that each security objective is
assured by TOE security functional requirements.
Table 40 Security Functional Requirements and the Corresponding Security Objectives
Objectives
SFRs
FAU_GEN.1
FAU_GEN.2
FAU_SAR.1
FAU_SAR.2
FAU_STG.1
FAU_STG.4
FCS_CKM.1
FCS_COP.1
FDP_ACC.1 (a)
FDP_ACC.1 (b)
FDP_ACC.1 (c)
FDP_ACC.1 (d)
FDP_ACC.1 (e)
FDP_ACC.1 (f)
FDP_ACC.1 (g)
FDP_ACC.1 (h)
FDP_ACF.1 (a)
FDP_ACF.1 (b)
FDP_ACF.1 (c)
FDP_ACF.1 (d)
Fuji Xerox C2265/C2263
- 94 -
Security Target
Copyright
2016 by Fuji Xerox Co., Ltd