
Fuji Xerox C2265/C2263
Security Target
- 27 -
Copyright
2016 by Fuji Xerox Co., Ltd
3.2.
Organizational Security Policies
Table 8 below describes the organizational security policies the TOE must comply with.
Table 8 Organizational Security Policies
Name
Definition
P.USER.AUTHORIZATION
To preserve operational accountability and security, Users will
be authorized to use the TOE only as permitted by the TOE
Owner
P.SOFTWARE.VERIFICATION
To detect corruption of the executable code in the TSF,
procedures will exist to self-verify executable code in the TSF
P.AUDIT.LOGGING
To preserve operational accountability and security, records that
provide an audit trail of TOE use and security-relevant events
will be created, maintained, and protected from unauthorized
disclosure or alteration, and will be reviewed by authorized
personnel
P.INTERFACE.MANAGEMENT
To prevent unauthorized use of the external interfaces of the
TOE, operation of the interfaces will be controlled by the TOE
and its IT environment.
P.CIPHER
To prevent unauthorized reading-out, the document data and
used document data in the internal HDD will be encrypted by
the TOE.
3.3.
Assumptions
Table 9 shows the assumptions for the operation and use of this TOE.
Table 9 Assumptions
Assumption
Definition
A.ACCESS.MANAGED The TOE is located in a restricted or monitored environment that provides
protection from unmanaged access to the physical components and data
interfaces of the TOE.
A.USER.TRAINING
TOE Users are aware of the security policies and procedures of their
organization, and are trained and competent to follow those policies and
procedures.
A.ADMIN.TRAINING
Administrators are aware of the security policies and procedures of their
organization, are trained and competent to follow the manufacturer’s
guidance and documentation, and correctly configure and operate the
TOE in accordance with those policies and procedures.
A.ADMIN.TRUST
Administrators do not use their privileged access rights for malicious
purposes.