
Fuji Xerox C2265/C2263
Security Target
- 103 -
Copyright
2016 by Fuji Xerox Co., Ltd
Table 42 Dependencies of Functional Security Requirements
Functional Requirement
Dependencies of Functional Requirements
Requirement and its
name
Requirement that
is dependent on
Requirement that is not dependent on
and its rationale
FAU_GEN.1
Audit data generation
FPT_STM.1 -
FAU_GEN.2
User identity association
FAU_GEN.1
FIA_UID.1
-
FAU_SAR.1
Audit review
FAU_GEN.1 -
FAU_SAR.2
Restricted audit review
FAU_SAR.1 -
FAU_STG.1
Protected audit trail
storage
FAU_GEN.1 -
FAU_STG.4
Prevention of audit data
loss
FAU_STG.1 -
FCS_CKM.1
Cryptographic key
generation
FCS_COP.1
FCS_CKM.4:
A cryptographic key is generated when MFD is
booted, and stored on DRAM (volatile memory). A
cryptographic key does not need to be destructed
because there is no means to access the
cryptographic key from the outside.
FCS_COP.1
Cryptographic operation
FCS_CKM.1
FCS_CKM.4:
A cryptographic key is generated when MFD is
booted, and stored on DRAM (volatile memory). A
cryptographic key does not need to be destructed
because there is no means to access the
cryptographic key from the outside.
FDP_ACC.1(a)
Subset access control
FDP_ACF.1(a) -
FDP_ACC.1(b)
Subset access control
FDP_ACF.1(b) -
FDP_ACC.1(c)
Subset access control
FDP_ACF.1(c) -
FDP_ACC.1(d)
Subset access control
FDP_ACF.1(d) -
FDP_ACC.1(e)
Subset access control
FDP_ACF.1(e) -