Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
33
Asset
Asset Description
The data which is provided by the TOE during security audit
logging.
Security properties to be maintained by the TOE: confidentiality,
availability, integrity.
3.3.2 Secondary Assets
The owner of the TOE presumably places value upon the following secondary entities.
All these secondary assets represent user data in the sense of the CC.
Table 9 Secondary assets to be protected
Asset
Asset Description
Auth data
Secondary asset, TSF data
The data which is used by the TOE to identify and authenticate the
external entities which interact with the TOE.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Crypto data
Secondary asset, TSF data
The data which is used by the TOE for digital signature handling and
encryption/decryption purposes.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Ctrl data
Secondary asset, TSF data
The data which is used by the TOE for firmware updates, firmware
registration, and firmware identity checking purposes.
Security properties to be maintained by the TOE: availability,
integrity.
3.4 Assumptions
The specific conditions listed in the following subsections are assumed to exist in the
TOE’s environment. These assumptions include both practical realities in the
development of the TOE security requirements and the essential environmental
conditions on the use of the TOE.
Table 10 Operational Assumptions
Assumption
Assumption Definition
A.NO_GENERAL_PURPOSE It is assumed that there are no general-purpose
computing capabilities (e.g., compilers or user
applications) available on the TOE, other than