Rationale; Security Objectives Policies Rationale; Table 8.1 Correspondence Between Threats, Assumptions, And Security Objectives Policies - Konica Minolta BIZHUB 920 Software Manual

Security target
Hide thumbs Also See for BIZHUB 920:
Table of Contents

Advertisement

8. Rationale

8.1.

Security Objectives Policies Rationale

Table 8.1 shows the correspondence relation of the security objectives policy to the threat and
assumptions.

Table 8.1 Correspondence between Threats, Assumptions, and Security Objectives Policies

Threat/Assumption/
organizational security policy
Security objectives policy
O.IA
(Identification and authentication when using)
O.MANAGE
(Provision of the management function)
O.CE (Provision of the CE function)
O.DATAACCESS
(Access limit to the document data)
O.AUDIT (Record of the audit information)
OE.PLACE (Management of the installed place)
OE.NET (Management of the network)
OE.USR (Instruction for the general user)
OE.ADMIN
(Personal condition for the administrator)
OE.CE (Assurance of CE)
OE.HDD (Access limit to the HDD itself)
Copyright© 2005 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved
T
T
T
A
S
H
A
I
M
D
C
M
D
C
P
P
A
E
A
L
C
S
D
A
C
S
M
C
E
I
E
S
N
S
✔ ✔ ✔
✔ ✔
✔ ✔ ✔
73
A
A
A
A
S
S
S
S
M
M
M
M
N
A
C
U
E
D
E
S
T
M
R
I
N

Advertisement

Table of Contents
loading

Table of Contents