The text in this document is copied directly from the ST (Security Target).
Security Requirements for the IT Environment
This chapter specifies the security functional requirements that are applicable to
the IT environment.
Table A-1
IT Environment Functional Security Requirements
Security Functional Class
Security Audit (FAU)
Cryptographic support (FCS)
User Data Protection (FDP)
Common Criteria Environment:
Security Requirements
Security Functional Components
FAU_GEN.1 Audit data generation (iteration 1)
FAU_GEN.2 User identity association (iteration 1)
FAU_SAR.1 Audit Review
FAU_SAR.3 Selectable audit review
FAU_SEL.1 Selective audit (iteration 1)
FAU_STG.1 Protected audit trail storage (iteration 1)
FAU_STG.4 Prevention of audit data loss (iteration 1)
FCS_CKM.1 Cryptographic key generation
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1 Cryptographic operation
FDP_ACC.1 Subset access control (iteration 1)
FDP_ACF.1 Security attribute based access control (iteration 1)
Appendix A
665