Security Requirements Rationale; Tracing; Table 34: Relationship Between Security Objectives And Functional Requirements - Ricoh Aficio MP 7001 SP Manual

With dataoverwritesecurity unit type h security target
Hide thumbs Also See for Aficio MP 7001 SP:
Table of Contents

Advertisement

Assurance Classes
ATE:
Tests
AVA:
Vulnerability assessment
6.3

Security Requirements Rationale

This section describes the rationale for security requirements.
If all security functional requirements are satisfied as below, the security objectives defined in "4 Security
Objectives" are fulfilled.
6.3.1

Tracing

Table 34 shows the relationship between the TOE security functional requirements and TOE security
objectives. Table 34 shows that each TOE security functional requirement fulfils at least one TOE security
objective.

Table 34: Relationship between Security Objectives and Functional Requirements

FAU_GEN.1
FAU_GEN.2
FAU_STG.1
FAU_STG.4
FAU_SAR.1
FAU_SAR.2
FCS_CKM.1
FCS_COP.1
FDP_ACC.1(a)
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
ASE_TSS.1
TOE summary specification
ATE_COV.2
Analysis of coverage
ATE_DPT.1
Testing: basic design
ATE_FUN.1
Functional testing
ATE_IND.2
Independent testing - sample
AVA_VAN.2
Vulnerability analysis
X
X
X
Assurance Components
Page 63 of 87
X
X
X
X
X
X
X
X

Advertisement

Table of Contents
loading

Table of Contents