Concerning The Information Security Standard - Canon imageRUNNER ADVANCE C5560i III User Manual

Hide thumbs Also See for imageRUNNER ADVANCE C5560i III:
Table of Contents

Advertisement

Concerning the Information Security Standard

This machine is compliant with IEEE Std. 2600™-2008 (IEEE 2600), an international standard concerning information
security for multifunctional peripherals and printers. This section describes the security requirements defined in IEEE
2600, and the corresponding machine functions.
Security requirement
Preventing unauthorized access with user
authentication/user information management
Managing access and restricting operations by user
*1
Using audit logs
to record and monitor security-
related user operations
Completely deleting unnecessary data from the hard
disk
Protecting the various types of data and confidential
information stored on the hard disk
Protecting data on the network with encrypted
communication
Self-verification of security functions
*1 Operations for <Scan and Store>, <Network> in <Access Stored Files>, and <Memory Media> are not included in the scope of the audit.
*2 Files stored in memory media are not encrypted.
Managing the Machine
User Authentication
Performs personal authentication based on user authentication information
such as user names and passwords, and manages user information such as
privileges (roles).
ACCESS MANAGEMENT SYSTEM
The availability of functions such as printing and copying can be assigned to
each user, enabling you to manage access to these functions on an
individual user basis. See ACCESS MANAGEMENT SYSTEM Administrator
Guide.
Generating/exporting audit logs
You can record user authentication logs and job logs, and export them from
the Remote UI.
HDD Complete Deletion
Unnecessary data can be deleted from the hard disk by overwriting with
random data multiple times.
Hard disk data encryption
Encryption is used to protect data on the hard disk, such as files stored in
*2
the Mail Box, Address Book data, and password information.
Hard Disk Data(P. 890)
IPSec
By creating security policies for encrypted communication, data can be
protected from various threats when sent and received over an IP network.
Configuring the IPSec Settings(P. 743)
IPSec
When IPSec is enabled, the self-test for the encryption module is
automatically performed when the machine starts.
899
Corresponding machine function
Managing Users(P. 675)
Managing the Logs(P. 822)
Managing Hard Disk Data(P. 890)
4XR3-0H5
Managing

Advertisement

Table of Contents
loading

Table of Contents