3.1
Threats .......................................................................................................................36
3.2
3.3
Assumptions ...............................................................................................................37
4
Security Objectives............................................................................................................39
4.1
4.2
4.2.1
IT Environment......................................................................................................... 40
4.2.2
Non-IT Environment................................................................................................. 41
4.3
4.3.1
4.3.2
5
5.1
6
Security Requirements......................................................................................................49
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
Class FTA: TOE access ............................................................................................. 68
6.1.8
6.2
6.3
6.3.1
Tracing ....................................................................................................................... 69
6.3.2
6.3.3
Dependency Analysis ................................................................................................ 77
6.3.4
7
7.1
Audit Function ...........................................................................................................80
7.2
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Page 3 of 93