Security Requirements Rationale; Tracing; Table 22: Relationship Between Security Objectives And Functional Requirements - Ricoh Gestetner MP 4001 Manual

Table of Contents

Advertisement

6.3

Security Requirements Rationale

This section describes the rationale behind the security requirements. If all security functional requirements
are satisfied as below, the security objectives defined in "4.1 Security Objectives for TOE" are fulfilled.
6.3.1

Tracing

Table 22 shows the relationship between the TOE security f u nctional requirements and TOE security
objectives. The "v" in the table indicates that the TOE security functional requirement fulfils the TOE
security objective.
Table 22 shows that each TOE security functional requirement fulfils at least one TOE security objective.

Table 22: Relationship between security objectives and functional requirements

FAU_GEN.1
FAU_SAR.1
FAU_SAR.2
FAU_STG.1
FAU_STG.4
FCS_CKM.1
FCS_COP.1
FDP_ACC.1
FDP_ACF.1
FDP_IFC.1
FDP_IFF.1
FIA_AFL.1
FIA_ATD.1
FIA_SOS.1
FIA_UAU.2
FIA_UAU.7
FIA_UID.2
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
v
v
v
v
v
v
v
v
v
v
v
v
v
v
v
v
v
Page 55 of 81

Advertisement

Table of Contents
loading

Table of Contents