Page 67 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
Assurance Classes
Assurance Components
ATE_IND.2
Independent testing - sample
AVA:
Vulnerability assessment
AVA_VAN.2
Vulnerability analysis
6.3
Security Requirements Rationale
This section describes the rationale for security requirements.
If all security functional requirements are satisfied as below, the security objectives defined in "4 Security
Objectives" are fulfilled.
6.3.1
Tracing
Table 31 shows the relationship between the TOE security functional requirements and TOE security
objectives. Table 31 shows that each TOE security functional requirement fulfils at least one TOE security
objective.
Table 31 : Relationship between Security Objectives and Functional Requirements
O
.D
O
C
.N
O
_
D
IS
O
.D
O
C
.N
O
_
A
L
T
O
.F
U
N
C
.N
O
_
A
L
T
O
.P
R
O
T
.N
O
_
A
L
T
O
.C
O
N
F
.N
O
_
D
IS
O
.C
O
N
F
.N
O
_
A
L
T
O
.U
S
E
R
.A
U
T
H
O
R
IZ
E
D
O
.I
N
T
E
R
F
A
C
E
.M
A
N
A
G
E
D
O
.S
O
F
T
W
A
R
E
.V
E
R
IF
IE
D
O
.A
U
D
IT
.L
O
G
G
E
D
O
.S
T
O
R
A
G
E
.E
N
C
R
Y
P
T
E
D
O
.R
C
G
A
T
E
.C
O
M
M
.P
R
O
T
E
C
T
FAU_GEN.1
X
FAU_GEN.2
X
FAU_STG.1
X
FAU_STG.4
X
FAU_SAR.1
X
FAU_SAR.2
X
FCS_CKM.1
X
FCS_COP.1
X
FDP_ACC.1(a)
X
X
X
FDP_ACC.1(b)
X
FDP_ACF.1(a)
X
X
X
FDP_ACF.1(b)
X