Ricoh Aficio MP 2852SP Manual page 6

Security target
Table of Contents

Advertisement

Page 5 of 91
List of Figures
Figure 1 : Example of TOE Environment........................................................................................................9
Figure 2 : Hardware Configuration of the TOE.............................................................................................12
Figure 3 : Logical Scope of the TOE.............................................................................................................19
List of Tables
Table 1 : Identification Information of MFP ...................................................................................................7
Table 2 : Guidance for English Version-1......................................................................................................14
Table 3 : Guidance for English Version-2......................................................................................................15
Table 4 : Guidance for English Version-3......................................................................................................16
Table 5 : Definition of Users .........................................................................................................................17
Table 6 : List of Administrative Roles...........................................................................................................18
Table 7 : Definition of User Data ..................................................................................................................24
Table 8 : Definition of TSF Data ...................................................................................................................25
Table 9 : Specific Terms Related to This ST .................................................................................................25
Table 10 : Rationale for Security Objectives.................................................................................................40
Table 11 : List of Auditable Events ...............................................................................................................48
Table 12 : List of Cryptographic Key Generation .........................................................................................51
Table 13 : List of Cryptographic Operation...................................................................................................51
Table 16 : Subjects, Objects and Security Attributes (a) ...............................................................................53
Table 19 : Subjects, Objects and Security Attributes (b) ...............................................................................55
Table 20 : Rule to Control Operations on MFP Applications (b) ..................................................................55
Table 21 : List of Authentication Events of Basic Authentication.................................................................56
Table 22 : List of Actions for Authentication Failure ....................................................................................56
Table 24 : Rules for Initial Association of Attributes ....................................................................................59
Table 25 : User Roles for Security Attributes (a)...........................................................................................60
Table 26 : User Roles for Security Attributes (b) ..........................................................................................61
Table 27 : Authorised Identified Roles Allowed to Override Default Values ................................................62
Table 28 : List of TSF Data ...........................................................................................................................63
Table 29 : List of Specification of Management Functions...........................................................................64
Table 30 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2) ....................................................67
Table 33 : List of Audit Events......................................................................................................................78
Table 34 : List of Audit Log Items ................................................................................................................79
Table 35 : Unlocking Administrators for Each User Role .............................................................................81
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents