Samsung Multifunction MultiXpress X4220, X4250, X4300, X401, K4250, K4300, K4350, K401 Series
3
Copyright
2014 SAMSUNG ELECTRONICS Co., Ltd., All rights reserved
CONTENTS
1
Introduction ................................................................................................................................... 7
1.1
S
ECURITY
T
ARGET
R
EFERENCES
..................................................................................... 7
1.2
TOE
R
EFERENCES
............................................................................................................ 7
1.3
TOE
O
VERVIEW
............................................................................................................... 7
1.3.1
TOE Type, Usage and Security features ........................................................................................ 7
1.4
TOE
D
ESCRIPTION
........................................................................................................... 9
1.4.1
TOE Operational Environment ..................................................................................................... 9
1.4.2
Non-TOE Hardware/Software required by the TOE ................................................................... 11
1.4.3
Physical Scope............................................................................................................................. 12
1.4.4
Logical Scope .............................................................................................................................. 15
1.5
C
ONVENTIONS
................................................................................................................ 19
1.6
T
ERMS AND
D
EFINITIONS
............................................................................................... 21
1.7
A
CRONYMS
.................................................................................................................... 23
1.8
O
RGANIZATION
.............................................................................................................. 24
2
Conformance Claims ................................................................................................................... 25
2.1
C
ONFORMANCE TO
C
OMMON
C
RITERIA
........................................................................ 25
2.2
C
ONFORMANCE TO
P
ROTECTION
P
ROFILES
................................................................... 25
2.3
C
ONFORMANCE TO
P
ACKAGES
...................................................................................... 25
2.4
C
ONFORMANCE
C
LAIM
R
ATIONALE
.............................................................................. 26
2.4.1
Security Problem Definition Related Conformance Claim Rationale ......................................... 26
2.4.2
Security Objectives Related Conformance Claim Rationale ....................................................... 27
2.4.3
Security Functional Requirements related Conformance Claim Rationale................................. 28
2.4.4
Security Assurance Requirements related Conformance Claim Rationale ................................. 30
2.4.5
TOE type related Conformance Claim Rationale ........................................................................ 31
3
Security Problem Definition ....................................................................................................... 32
3.1
T
HREATS AGENTS
........................................................................................................... 32
3.1.1
Threats to TOE Assets ................................................................................................................. 32
3.2
O
RGANIZATIONAL
S
ECURITY
P
OLICIES
......................................................................... 33
3.3
A
SSUMPTIONS
................................................................................................................ 33
3.3.1
Assumptions for the TOE ............................................................................................................. 33
4
Security Objectives ...................................................................................................................... 35
4.1
S
ECURITY
O
BJECTIVES FOR THE
TOE ............................................................................ 35
4.1.1
Security Objectives for the TOE .................................................................................................. 35
4.1.2
Security Objectives for the TOE (Additional) .............................................................................. 36
4.2
S
ECURITY
O
BJECTIVES FOR
O
PERATIONAL
E
NVIRONMENT
.......................................... 36
4.2.1
Security Objectives for Operational Environment ...................................................................... 36
4.3
S
ECURITY
O
BJECTIVES
R
ATIONALE
.............................................................................. 38
5
Extended Component Definition ................................................................................................ 41
5.1
FPT_FDI_EXP
R
ESTRICTED FORWARDING OF DATA TO EXTERNAL INTERFACES
........ 41
6
Security Requirements ................................................................................................................ 43
6.1
S
ECURITY
F
UNCTIONAL
R
EQUIREMENTS
...................................................................... 47
6.1.1
Class FAU: Security Audit .......................................................................................................... 48
6.1.2
Class FCS: Cryptographic support ............................................................................................. 51
6.1.3
Class FDP: User data protection ................................................................................................ 52
6.1.4
Class FIA: Identification and authentication .............................................................................. 57