Xerox WorkCentre 5845 User Information page 3

Multi-function device security target
Hide thumbs Also See for WorkCentre 5845:
Table of Contents

Advertisement

Table of Contents
1.
INTRODUCTION ........................................................................................................ 6
1.1.
ST
TOE I
AND
DENTIFICATION
1.2.
TOE O
VERVIEW
1.2.1.
Usage and Security Features ............................................................................................ 7
1.2.2.
TOE Type ........................................................................................................................ 10
1.2.3.
Required Non-TOE Hardware, Software and Firmware ................................................. 10
1.3.
TOE D
ESCRIPTION
1.3.1.
Physical Scope of the TOE .............................................................................................. 11
1.3.2.
Logical Scope of the TOE ................................................................................................ 12
1.4.
E
C
VALUATED
ONFIGURATION
2.
CONFORMANCE CLAIMS ...................................................................................... 16
2.1.
C
C
OMMON
RITERIA
2.2.
P
P
ROTECTION
ROFILE
2.3.
P
C
ACKAGE
LAIMS
2.4.
R
............................................................................................................................. 17
ATIONALE
3.
SECURITY PROBLEM DEFINITION ....................................................................... 19
3.1.
D
........................................................................................................................... 19
EFINITIONS
3.1.1.
Users .............................................................................................................................. 19
3.1.2.
Objects (Assets) .............................................................................................................. 19
3.1.3.
Operations...................................................................................................................... 21
3.1.4.
Channels ......................................................................................................................... 21
3.2.
A
......................................................................................................................... 22
SSUMPTIONS
3.3.
T
................................................................................................................................ 23
HREATS
3.3.1.
Threats Addressed by the TOE ....................................................................................... 23
3.3.2.
Threats Addressed by the IT Environment...................................................................... 23
3.4.
O
RGANIZATIONAL
4.
SECURITY OBJECTIVES ........................................................................................ 25
4.1.
S
O
ECURITY
BJECTIVES FOR THE
4.2.
S
O
ECURITY
BJECTIVES FOR THE
4.3.
S
O
ECURITY
BJECTIVES FOR THE
4.4.
R
ATIONALE FOR
5.
EXTENDED COMPONENTS DEFINITION .............................................................. 33
5.1.
FPT_FDI_EXP R
6.
SECURITY REQUIREMENTS ................................................................................. 36
6.1.
C
........................................................................................................................ 36
ONVENTIONS
6.2.
TOE S
P
ECURITY
6.2.1.
IP Filter SFP ..................................................................................................................... 37
6.2.2.
User Access Control SFP ................................................................................................. 37
6.2.3.
TOE Function Access Control SFP ................................................................................... 39
6.3.
S
F
ECURITY
UNCTIONAL
6.3.1.
Class FAU: Security audit ................................................................................................ 41
6.3.2.
Class FCO: Communication ............................................................................................ 43
6.3.3.
Class FCS: Cryptographic support ................................................................................... 43
Copyright
Xerox Multi-Function Device Security Target
....................................................................................................... 6
........................................................................................................................ 7
................................................................................................................... 11
..................................................................................................... 15
C
C
................................................................................ 16
ONFORMANCE
LAIMS
C
.................................................................................................... 16
LAIMS
.................................................................................................................... 16
S
P
.......................................................................................... 24
ECURITY
OLICIES
TOE ............................................................................................ 25
O
E
PERATIONAL
N
-IT E
ON
NVIRONMENT
S
O
......................................................................................... 27
ECURITY
BJECTIVES
ESTRICTED FORWARDING OF DATA TO EXTERNAL INTERFACES
............................................................................................................ 37
OLICIES
R
....................................................................................... 40
EQUIREMENTS
3
2013 Xerox Corporation. All rights reserved.
.......................................................... 26
NVIRONMENT
.................................................................. 27
.................................... 33

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents