Page 2 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1
ST Introduction.................................................................................... 7
1.1
ST Reference.................................................................................. 7
1.2
TOE Reference................................................................................ 7
1.3
TOE Overview................................................................................ 9
1.3.1
TOE Type....................................................................................................9
1.3.2
TOE Usage and Major Security Features of TOE............................................9
1.3.3
Environment for TOE Usage and Non-TOE Configuration Items....................10
1.4
TOE Description.............................................................................12
1.4.1
Physical Boundary of TOE..........................................................................12
1.4.2
Guidance Documents..................................................................................15
1.4.3
User Roles.................................................................................................17
1.4.3.1
Responsible Manager of MFP................................................................17
1.4.3.2
Administrator......................................................................................17
1.4.3.3
Supervisor...........................................................................................17
1.4.3.4
General User.......................................................................................18
1.4.3.5
Customer Engineer..............................................................................18
1.4.4
Logical Boundaries of TOE..........................................................................18
1.4.4.1
Basic Functions...................................................................................19
1.4.4.2
Security Functions...............................................................................21
1.4.5
Protected Assets.........................................................................................25
1.4.5.1
Document Data....................................................................................25
1.4.5.2
Print Data...........................................................................................25
2
Conformance Claim ..............................................................................26
2.1
CC Conformance Claim.....................................................................26
2.2
PP Claims, Package Claims................................................................26
2.3
Conformance Rationale.....................................................................26
3
Security Problem Definitions ...................................................................27
3.1
Threats.......................................................................................27
3.2
Organisational Security Policies...........................................................27