
- i -
- Table of Contents -
1.
ST INTRODUCTION ................................................................................................................ 1
1.1.
ST Reference .................................................................................................................................................. 1
1.2.
TOE Reference ............................................................................................................................................... 1
1.3.
TOE Overview ................................................................................................................................................ 2
1.3.1.
TOE Type and Major Security Features ...................................................................................................... 2
1.3.2.
Environment Assumptions ............................................................................................................................... 5
1.3.3.
Required Non-TOE Hardware and Software ............................................................................................ 6
1.4.
TOE Description ............................................................................................................................................ 8
1.4.1.
User Assumptions ................................................................................................................................................ 8
1.4.2.
Logical Scope and Boundary .......................................................................................................................... 8
1.4.3.
Physical Scope and Boundary ..................................................................................................................... 17
1.4.4.
Guidance .............................................................................................................................................................. 18
2.
CONFORMANCE CLAIM ..................................................................................................... 20
2.1.
CC Conformance Claim .......................................................................................................................... 20
2.2.
PP claim, Package Claim ........................................................................................................................ 20
2.2.1.
PP Claim ............................................................................................................................................................... 20
2.2.2.
Package Claim ................................................................................................................................................... 20
2.2.3.
Conformance Rationale ................................................................................................................................. 21
3.
SECURITY PROBLEM DEFINITION ................................................................................ 23
3.1.
Threats .......................................................................................................................................................... 23
3.1.1.
Assets Protected by TOE ................................................................................................................................ 23
3.1.2.
Threats agents ................................................................................................................................................... 26
3.1.3.
Threats .................................................................................................................................................................. 26
3.2.
Organizational Security Policies .......................................................................................................... 27
3.3.
Assumptions ............................................................................................................................................... 27
4.
Security Objectives ................................................................................................................ 28
4.1.
Security Objectives for the TOE ........................................................................................................... 28
4.2.
Security Objectives for the Environment ......................................................................................... 29
4.3.
Security Objectives Rationale .............................................................................................................. 29
5.
EXTENDED COMPONENTS DEFINITION .................................................................... 34
5.1.
FPT_FDI_EXP Restricted forwarding of data to external interfaces .................................... 34
6.
SECURITY REQUIREMENTS .............................................................................................. 36
6.1.
Security Functional Requirements ..................................................................................................... 40
6.1.1.
Class FAU: Security Audit .............................................................................................................................. 43