Page 70 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table 32 : Relationship between Security Objectives and Functional Requirements
O.
DOC.
NO_
DI
S
O.
DOC.
NO_
ALT
O.
F
UNC.
NO_
ALT
O.
P
R
OT.
NO_
ALT
O.
CONF
.NO_
DI
S
O.
CONF
.NO_
ALT
O.
US
ER.
AUTHORI
ZED
O.
IN
TERF
A
CE.
M
ANAGED
O
.SO
FTWA
RE.V
ERI
F
IE
D
O.
AUDI
T.
LOGGED
O.
S
T
ORAGE.
E
NCRYP
TED
O.RCGATE.COM
M
.PROTECT
FAU_GEN.1
X
FAU_GEN.2
X
FAU_STG.1
X
FAU_STG.4
X
FAU_SAR.1
X
FAU_SAR.2
X
FCS_CKM.1
X
FCS_COP.1
X
FDP_ACC.1(a)
X
X
X
FDP_ACC.1(b)
X
FDP_ACF.1(a)
X
X
X
FDP_ACF.1(b)
X
FDP_RIP.1
X
X
FIA_AFL.1
X
FIA_ATD.1
X
FIA_SOS.1
X
FIA_UAU.1(a)
X
X
FIA_UAU.1(b)
X
X
FIA_UAU.2
X
X
FIA_UAU.7
X
FIA_UID.1(a)
X
X
FIA_UID.1(b)
X
X
FIA_UID.2
X
X
FIA_USB.1
X
FPT_FDI_EXP.1
X
FMT_MSA.1(a)
X
X
X
FMT_MSA.1(b)
X
FMT_MSA.3(a)
X
X
X