Page 40 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
FAU_STG.1.2 The TSF shall be able to
[selection: prevent]
unauthorised modifications to the stored audit
records in the audit trail.
FAU_STG.4 Prevention of audit data loss
Hierarchical to:
FAU_STG.3 Action in case of possible audit data loss.
Dependencies:
FAU_STG.1 Protected audit trail storage.
FAU_STG.4.1 The TSF shall
[selection: overwrite the oldest stored audit records]
and
[assignment: no
other actions to be taken in case of audit storage failure]
if the audit trail is full.
6.1.2
Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to:
No other components.
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction.
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic
key generation algorithm
[assignment: cryptographic key generation algorithm shown
in Table 6] and specified cryptographic key size [assignment: cryptographic key size
shown in Table 6] that meet the following: [assignment: standard shown in Table 6].
Table 6: List of cryptographic key generation
Key type
Standard
Cryptographic key
generation algorithm
Cryptographic
key size
HDD cryptographic key
BSI-AIS31
TRNG
256 bits
FCS_COP.1 Cryptographic operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction.
FCS_COP.1.1 The TSF shall
perform
[assignment: cryptographic operations shown in Table 7 ]
in
accordance with a specified cryptographic algorithm
[assignment: cryptographic
algorithm shown in Table 7]
and cryptographic key sizes
[assignment: cryptographic
key size shown in Table 7]
that meet the following:
[assignment: standards shown in
Table 7].