Page 40 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
4.3
Security Objectives Rationale
This section describes the rationale for security objectives. The security objectives are for upholding the
assumptions, countering the threats, and enforcing the organisational security policies that are defined.
4.3.1
Correspondence Table of Security Objectives
Table 10 describes the correspondence between the assumptions, threats and organisational security policies,
and each security objective.
Table 10 : Rationale for Security Objectives
O
.D
O
C
.N
O
_
D
IS
O
.D
O
C
.N
O
_
A
L
T
O
.F
U
N
C
.N
O
_
A
L
T
O
.P
R
O
T
.N
O
_
A
L
T
O
.C
O
N
F.
N
O
_
D
IS
O
.C
O
N
F.
N
O
_
A
L
T
O
.U
S
E
R
.A
U
T
H
O
R
IZ
E
D
O
E
.U
S
E
R
.A
U
T
H
O
R
IZ
E
D
O
.S
O
F
T
W
A
R
E
.V
E
R
IF
IE
D
O
.A
U
D
IT
.L
O
G
G
E
D
O
E
.A
U
D
IT
_
S
T
O
R
A
G
E
.P
R
O
T
C
T
E
D
O
E
.A
U
D
IT
_
A
C
C
E
S
S
_
A
U
T
H
O
R
IZ
E
D
O
E
.A
U
D
IT
.R
E
V
IE
W
E
D
O
.I
N
T
E
R
F
A
C
E
.M
A
N
A
G
E
D
O
E
.P
H
Y
S
IC
A
L
.M
A
N
A
G
E
D
O
E
.I
N
T
E
R
F
A
C
E
.M
A
N
A
G
E
D
O
.S
T
O
R
A
G
E
.E
N
C
R
Y
P
T
E
D
O
.R
C
G
A
T
E
.C
O
M
M
.P
R
O
T
E
C
T
O
E
.A
D
M
IN
.T
R
A
IN
E
D
O
E
.A
D
M
IN
.T
R
U
S
T
E
D
O
E
.U
S
E
R
.T
R
A
IN
E
D
T.DOC.DIS
X
X
X
T.DOC.ALT
X
X
X
T.FUNC.ALT
X
X
X
T.PROT.ALT
X
X
X
T.CONF.DIS
X
X
X
T.CONF.ALT
X
X
X
P.USER.AUTHORIZATION
X
X
P.SOFTWARE.VERIFICATION
X
P.AUDIT.LOGGING
X
X
X
X
P.INTERFACE.MANAGEMENT
X
X
P.STORAGE.ENCRYPTION
X
P.RCGATE.COMM.PROTECT
X
A.ACCESS.MANAGED
X
A.ADMIN.TRAINING
X
A.ADMIN.TRUST
X
A.USER.TRAINING
X