background image

Lexmark International, Inc. 

Common Criteria Validated Devices with Hard Disks 

Lexmark workgroup devices are designed with security options and solutions to help 
customers ensure secure management, secure network communications and secure 
information storage. As of September 21, 2007, Lexmark has successfully completed 
Common Criteria certification for its workgroup monochrome and color laser 
multifunction products (devices). Common Criteria is an internationally recognized 
standard for security assessment and is used as a third-party validation of the security 
functionality of information technology products.  

 
The certification involves rigorous testing and evaluation by the Common Criteria Testing 
Laboratory, which is overseen by the National Information Assurance Partnership 
(NIAP), a U.S. government initiative. NIAP certification was obtained for the following 
Lexmark devices with hard hard disks:  
 
Lexmark X646dte (firmware revision LC2.MC.P239b) Multifunction Printer  
Lexmark X646e (firmware revision LC2.MC.P239b) Multifunction Printer  
Lexmark X646ef (firmware revision LC2.TI.P239b) Multifunction Printer  
Lexmark X772e (firmware revision LC2.TR.P275) Multifunction Printer  
Lexmark X850e (firmware revision LC2.BE.P238b) Multifunction Printer  
LexmarkX852e (firmware revision LC2.BE.P238b) Multifunction Printer  
Lexmark X854e (firmware revision LC2.BE.P238b) Multifunction Printer  
Lexmark X940e (firmware revision LC.BR.P060) Multifunction Printer  
Lexmark X945e (firmware revision LC.BR.P060) Multifunction Printer  
 
The NIAP also certified six specific security functions on each Lexmark device:  
 

  Fax Communications Control (Separation of Fax and Network Communications) 

  User Authentication  

  Device Configuration Protection 

  Hard Disk Encryption  

  Hard Disk Sanitization 

  TSF Self Protection (Device Operating System Protections from 

Virus/Malware/Hacking/Unauthorized Software/Bypassing Security Functions 
through Backdoors) 

 
Validation Report 
 

http://www.niap-ccevs.org/cc-scheme/st/st_vid10196-vr.pdf

 

 
Security Target 

http://www.niap-ccevs.org/cc-scheme/st/st_vid10196-st.pdf

 

 
Validation Certificate 

http://www.niap-ccevs.org/cc-scheme/st/st_vid10196-ci.pdf

 

Содержание X646

Страница 1: ...and Multifunction Products Hard Disk and Non Volatile Memory Guide This guide applies to the following Lexmark devices Printers Multifunction Products C780 X646 C782 X772 C935 X782 T640 X850 T642 X85...

Страница 2: ...s use two forms of non volatile memory EEPROM and NAND These components store the device operating system device settings information network information embedded solution applications various scanner...

Страница 3: ...ta that may be actively used by the device sitting idle on a device and or used by the device in a previous job Disk encryption provides the comfort that the hard disk can never be used in a device ot...

Страница 4: ...ock or bar indicator appears Once the clock or bar indicator appears then you may release the buttons 3 You should see the Config Menu appear on the device control panel 4 To locate the Disk Encryptio...

Страница 5: ...irmation of Disk Encryption Activities The only method to confirm that Hard Disk Encryption has been enabled is via MarkVision Professional A plug in has been developed for MarkVision which will allow...

Страница 6: ...pport a mechanism for protecting residual data hard disk wiping Hard disk wiping actively overwrites the deleted job data with multiple passes of random data removing all residue of prior information...

Страница 7: ...e check mark and the right arrow while powering on the device hold the buttons down until a clock or bar indicator appears Once the clock or bar indicator appears then you may release the buttons 3 Yo...

Страница 8: ...inter Lexmark X646e firmware revision LC2 MC P239b Multifunction Printer Lexmark X646ef firmware revision LC2 TI P239b Multifunction Printer Lexmark X772e firmware revision LC2 TR P275 Multifunction P...

Страница 9: ...highly recommended to be used when the device is taken out of service or removed from a secure location Destroying the device controller is the best method to ensure that your data can not be compromi...

Отзывы: