Ricoh Aficio MP C3001 Series Manual page 6

Security target
Hide thumbs Also See for Aficio MP C3001 Series:
Table of Contents

Advertisement

Page 5 of 93
List of Figures
Figure 1 : Example of TOE Environment........................................................................................................9
Figure 2 : Hardware Configuration of the TOE.............................................................................................12
Figure 3 : Logical Scope of the TOE.............................................................................................................21
List of Tables
Table 1 : Identification Information of TOE....................................................................................................7
Table 2 : Guidance for English Version-1......................................................................................................14
Table 3 : Guidance for English Version-2......................................................................................................15
Table 4 : Guidance for English Version-3......................................................................................................17
Table 5 : Guidance for English Version-4......................................................................................................17
Table 6 : Definition of Users .........................................................................................................................19
Table 7 : List of Administrative Roles...........................................................................................................19
Table 8 : Definition of User Data ..................................................................................................................26
Table 9 : Definition of TSF Data ...................................................................................................................27
Table 10 : Specific Terms Related to This ST ...............................................................................................27
Table 11 : Rationale for Security Objectives .................................................................................................42
Table 12 : List of Auditable Events ...............................................................................................................49
Table 13 : List of Cryptographic Key Generation .........................................................................................53
Table 14 : List of Cryptographic Operation...................................................................................................53
Table 17 : Subjects, Objects and Security Attributes (a) ...............................................................................54
Table 20 : Subjects, Objects and Security Attributes (b) ...............................................................................57
Table 21 : Rule to Control Operations on MFP Applications (b) ..................................................................57
Table 22 : List of Authentication Events of Basic Authentication.................................................................58
Table 23 : List of Actions for Authentication Failure ....................................................................................58
Table 25 : Rules for Initial Association of Attributes ....................................................................................61
Table 26 : User Roles for Security Attributes (a)...........................................................................................62
Table 27 : User Roles for Security Attributes (b) ..........................................................................................63
Table 28 : Authorised Identified Roles Allowed to Override Default Values ................................................64
Table 29 : List of TSF Data ...........................................................................................................................65
Table 30 : List of Specification of Management Functions...........................................................................66
Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2) ....................................................69
Table 34 : List of Audit Events......................................................................................................................80
Table 35 : List of Audit Log Items ................................................................................................................81
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Aficio mp c3501 series

Table of Contents