
Fuji Xerox C2265/C2263
Security Target
- 94 -
Copyright
2016 by Fuji Xerox Co., Ltd
6.3.
Security Requirement Rationale
6.3.1.
Security Functional Requirements Rationale
Table 40 lists security functional requirements and the corresponding security objectives.
As shown in this table, each security functional requirement corresponds to at least one security
objective of the TOE. Table 41 shows the rationale demonstrating that each security objective is
assured by TOE security functional requirements.
Table 40 Security Functional Requirements and the Corresponding Security Objectives
Objectives
SFRs
O.DOC.NO
_DIS
O.DOC.NO
_AL
T
O.FUNC.NO_AL
T
O.PROT.NO_AL
T
O.CONF
.NO_DIS
O.CONF
.NO_AL
T
O.USER.AUT
HORIZED
O.INTERF
ACE.MANAGED
O.SOFTW
A
RE.VERIFIE
D
O.AUDIT.
LO
GG
ED
O.AUDIT
_
ST
ORAGE.PROTECTED
O.AUDIT
_
ACCESS
.AUTHO
RIZED
O.CIPH
ER
FAU_GEN.1
FAU_GEN.2
FAU_SAR.1
FAU_SAR.2
FAU_STG.1
FAU_STG.4
FCS_CKM.1
FCS_COP.1
FDP_ACC.1 (a)
FDP_ACC.1 (b)
FDP_ACC.1 (c)
FDP_ACC.1 (d)
FDP_ACC.1 (e)
FDP_ACC.1 (f)
FDP_ACC.1 (g)
FDP_ACC.1 (h)
FDP_ACF.1 (a)
FDP_ACF.1 (b)
FDP_ACF.1 (c)
FDP_ACF.1 (d)