Security Requirement Rationale; Security Functional Requirements Rationale - Fuji Xerox C2265 Manual

Hide thumbs Also See for C2265:
Table of Contents

Advertisement

6.3.

Security Requirement Rationale

6.3.1.

Security Functional Requirements Rationale

Table 40 lists security functional requirements and the corresponding security objectives.
As shown in this table, each security functional requirement corresponds to at least one security
objective of the TOE. Table 41 shows the rationale demonstrating that each security objective is
assured by TOE security functional requirements.
Table 40 Security Functional Requirements and the Corresponding Security Objectives
Objectives
SFRs
FAU_GEN.1
FAU_GEN.2
FAU_SAR.1
FAU_SAR.2
FAU_STG.1
FAU_STG.4
FCS_CKM.1
FCS_COP.1
FDP_ACC.1 (a)
FDP_ACC.1 (b)
FDP_ACC.1 (c)
FDP_ACC.1 (d)
FDP_ACC.1 (e)
FDP_ACC.1 (f)
FDP_ACC.1 (g)
FDP_ACC.1 (h)
FDP_ACF.1 (a)
FDP_ACF.1 (b)
FDP_ACF.1 (c)
FDP_ACF.1 (d)
Fuji Xerox C2265/C2263
            
            
            
            
            
            
            
            
            
            

           
            
            
            
            
            
            
            

           
            
- 94 -
Security Target
Copyright
2016 by Fuji Xerox Co., Ltd

Advertisement

Table of Contents
loading

This manual is also suitable for:

C2263

Table of Contents