Page 65 of
89
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Assurance Classes
Assurance Components
ALC_DEL.1 Delivery
procedures
ALC_DVS.1
Identification of security measures
ALC_LCD.1
Developer defined life-cycle model
ALC_FLR.2 Flaw
reporting
procedures
ASE_CCL.1 Conformance
claims
ASE_ECD.1 Extended
components
definition
ASE_INT.1 ST
introduction
ASE_OBJ.2 Security
objectives
ASE_REQ.2
Derived security requirements
ASE_SPD.1
Security problem definition
ASE:
Security Target evaluation
ASE_TSS.1 TOE
summary
specification
ATE_COV.2 Analysis
of
coverage
ATE_DPT.1
Testing: basic design
ATE_FUN.1 Functional
testing
ATE:
Tests
ATE_IND.2
Independent testing - sample
AVA:
Vulnerability assessment
AVA_VAN.2 Vulnerability
analysis
6.3
Security Requirements Rationale
This section describes the rationale for security requirements.
If all security functional requirements are satisfied as below, the security objectives defined in "4 Security
Objectives" are fulfilled.
6.3.1 Tracing
Table 28 shows the relationship between the TOE security functional requirements and TOE security
objectives. Table 28 shows that each TOE security functional requirement fulfils at least one TOE security
objective.