![Samsung K401 series Instruction Manual Download Page 33](http://html.mh-extra.com/html/samsung/k401-series/k401-series_instruction-manual_352208033.webp)
Samsung Multifunction MultiXpress X4220, X4250, X4300, X401, K4250, K4300, K4350, K401 Series
33
Copyright
2014 SAMSUNG ELECTRONICS Co., Ltd., All rights reserved
3.2
Organizational Security Policies
This chapter describes the Organizational Security Policies (OSPs) that apply to the TOE. OSPs are
used to provide a basis for Security Objectives that are commonly desired by TOE Owners in this
operational environment but for which it is not practical to universally define the assets being
protected or the threats to those assets.
This Security Target conforms to all organizational security policies mentioned in the PP. There are
no additional organizational security policies in this Security Target.
Table 16: Organizational Security Policies
Name
Definition
P.USER.AUTHORIZATION
To preserve operational accountability and security, Users will be
authorized to use the TOE only as permitted by the TOE Owner.
P.SOFTWARE.VERIFICATION
To detect corruption of the executable code in the TSF, procedures will
exist to self-verify executable code in the TSF.
P.AUDIT.LOGGING
To preserve operational accountability and security, records that
provide an audit trail of TOE use and security-relevant events will be
created, maintained, and protected from unauthorized disclosure or
alteration, and will be reviewed by authorized personnel.
P.INTERFACE.MANAGEMENT
To prevent unauthorized use of the external interfaces of the TOE,
operation of those interfaces will be controlled by the TOE and its IT
environment.
3.3
Assumptions
The following conditions are assumed to exist in the operational environment of the TOE.
This Security Target conforms to all assumptions in the PP.
3.3.1
Assumptions for the TOE
The assumptions taken from the PP to which this Security Target conforms are as shown in the
following Table 17.
Table 17: Assumptions for the TOE
Assumption
Definition
A.ACCESS.MANAGED
The TOE is located in a restricted or monitored environment that
provides protection from unmanaged access to the physical components
and data interfaces of the TOE.
A.USER.TRAINING
TOE Users are aware of the security policies and procedures of their