Page 5 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
List of Figures
Figure 1 : Example of TOE Environment ....................................................................................................... 9
Figure 2 : Hardware Configuration of the TOE ............................................................................................ 12
Figure 3 : Logical Scope of the TOE ............................................................................................................ 19
List of Tables
Table 1 : Identification Information of MFP ................................................................................................... 7
Table 2 : Guidance for English Version-1 ..................................................................................................... 14
Table 3 : Guidance for English Version-2 ..................................................................................................... 15
Table 4 : Guidance for English Version-3 ..................................................................................................... 16
Table 5 : Definition of Users ......................................................................................................................... 18
Table 6 : List of Administrative Roles .......................................................................................................... 18
Table 7 : Definition of User Data .................................................................................................................. 24
Table 8 : Definition of TSF Data................................................................................................................... 25
Table 9 : Specific Terms Related to This ST ................................................................................................. 25
Table 10 : Rationale for Security Objectives................................................................................................. 40
Table 11 : List of Auditable Events ............................................................................................................... 48
Table 12 : List of Cryptographic Key Generation ......................................................................................... 51
Table 13 : List of Cryptographic Operation .................................................................................................. 51
Table 14 : List of Subjects, Objects, and Operations among Subjects and Objects (a) ................................. 52
Table 15 : List of Subjects, Objects, and Operations among Subjects and Objects (b)................................. 52
Table 16 : Subjects, Objects and Security Attributes (a) ............................................................................... 52
Table 17 : Rules to Control Operations on Document Data and User Jobs (a) ............................................. 53
Table 18 : Additional Rules to Control Operations on Document Data and User Jobs (a)............................ 54
Table 19 : Subjects, Objects and Security Attributes (b)............................................................................... 55
Table 20 : Rule to Control Operations on MFP Applications (b) .................................................................. 55
Table 21 : List of Authentication Events of Basic Authentication ................................................................ 56
Table 22 : List of Actions for Authentication Failure.................................................................................... 56
Table 23 : List of Security Attributes for Each User That Shall Be Maintained ........................................... 56
Table 24 : Rules for Initial Association of Attributes .................................................................................... 59
Table 25 : User Roles for Security Attributes (a) .......................................................................................... 60
Table 26 : User Roles for Security Attributes (b) .......................................................................................... 61
Table 27 : Authorised Identified Roles Allowed to Override Default Values................................................ 61
Table 28 : List of TSF Data........................................................................................................................... 62
Table 29 : List of Specification of Management Functions........................................................................... 63
Table 30 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2).................................................... 66
Table 31 : Relationship between Security Objectives and Functional Requirements ................................... 67
Table 32 : Results of Dependency Analysis of TOE Security Functional Requirements .............................. 75
Table 33 : List of Audit Events...................................................................................................................... 78
Table 34 : List of Audit Log Items ................................................................................................................ 79
Table 35 : Unlocking Administrators for Each User Role............................................................................. 81