3.1
Threats .......................................................................................................................34
3.2
3.3
Assumptions ...............................................................................................................35
4
Security Objectives............................................................................................................37
4.1
4.2
4.2.1
IT Environment......................................................................................................... 38
4.2.2
Non-IT Environment................................................................................................. 39
4.3
4.3.1
4.3.2
5
5.1
6
Security Requirements......................................................................................................47
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
Class FTA: TOE access ............................................................................................. 66
6.1.8
6.2
6.3
6.3.1
Tracing ....................................................................................................................... 67
6.3.2
6.3.3
Dependency Analysis ................................................................................................ 75
6.3.4
7
7.1
Audit Function ...........................................................................................................78
7.2
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Page 3 of 91