2
2
2-2
2-2
Functions > Basic Function > What is IEEE2600? > IEEE2600.1
Functions > Basic Function > What is IEEE2600? > IEEE2600.1
Basic Function
What is IEEE2600?
■
Background
In addition to paper documents, MFPs contain user information and information saved in the
MFPs as the assets to be protected.
The security requirements which the users request for the assets to be protected differ
depending on the conditions.
■
Field status
The security requirements of MFPs that can be used by the users are not unified by each
manufacturer.
Users request that the necessary functions be clearly specified.
Manufacturers want to clarify which functions are needed by the users.
■
Security standard for MFP
The security standard in which these needs are organized had been requested.
In the light of this circumstance, IEEE2600 was established as the security standard for the
hard copy devices.
■
IEEE2600.1
IEEE 2600.1 describes security requirements of MFPs and printers, and is one of the PPs
(Protection Profiles) of IEEE 2600 series.
PP is a document that describes a set of security requirements in certain product range which
satisfies consumers' needs.
In IEEE 2600 series, PPs are classified into 4 categories as shown below depending on the
operation environment of the usage type.
Protection Profile
2600.1
Protection Profile
2600.2
Protection Profile
2600.3
Protection Profile
2600.4
Security Target
Specifications of
Company A
Security Target
Security Target
ST:
Each Benda defines it
every product.
CC(Common Criteria (ISO 15408))
Specifications of
Company B
Specifications of
Company C
In IEEE2600, a security requirement for CC certification (Protection Profile (PP)) which
is common to MFP vendors has been established. IEEE2600 divides the operational
environment into 4 categories.
IEEE2600.1
Protection Profile for
Operational Environment A
Assumed to be used in the military or government,
which is a large-scale environment with high-level
awareness against security.
IEEE2600.2
Protection Profile for
Operational Environment B
Assumed to be used in a general office, which
is a large-scale environment with medium-level
awareness against security.
IEEE2600.3
Protection Profile for
Operational Environment C
Assumed to be used in the public, which is a middle-
scale environment.
IEEE2600.4
Protection Profile for
Operational Environment D
Assumed to be used in SOHO, which is a small-scale
environment.
F-2-1
T-2-1