Page 42 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
4.3
Security Objectives Rationale
This section describes the rationale for security objectives. The security objectives are for upholding the
assumptions, countering the threats, and enforcing the organisational security policies that are defined.
4.3.1
Correspondence Table of Security Objectives
Table 11 describes the correspondence between the assumptions, threats and organisational security policies,
and each security objective.
Table 11 : Rationale for Security Objectives
O.
DOC.
NO_
DIS
O.
DOC.
NO_
AL
T
O.
F
UNC.
NO_
AL
T
O.
P
R
OT
.N
O_
AL
T
O.
CONF
.NO_
DI
S
O.
CONF
.NO_
AL
T
O.
US
E
R
.A
UT
HORIZ
E
D
OE
.U
S
E
R.
AUT
HORI
Z
E
D
O
.SO
FT
W
A
R
E
.V
ER
IF
IE
D
O.
AUDIT
.L
OGGE
D
OE
.AUDIT
_
S
T
O
RAGE
.P
ROT
C
T
E
D
OE
.AUDIT
_
A
CCE
S
S
_
A
UT
HORIZ
E
D
OE
.AUDIT
.R
E
V
IE
W
E
D
O.
INT
E
R
F
A
CE
.M
ANAGE
D
OE
.P
HYS
ICAL
.M
ANAGE
D
OE
.I
NT
E
R
F
A
CE
.M
ANAGE
D
O.
S
T
ORAGE
.E
NCR
Y
P
T
E
D
O
.RCG
A
TE.CO
MM.
PRO
TEC
T
OE
.ADM
IN.
T
RAINE
D
OE
.ADM
IN.
T
RU
S
T
E
D
OE
.U
S
E
R.
T
R
AINE
D
T.DOC.DIS
X
X
X
T.DOC.ALT
X
X
X
T.FUNC.ALT
X
X
X
T.PROT.ALT
X
X
X
T.CONF.DIS
X
X
X
T.CONF.ALT
X
X
X
P.USER.AUTHORIZATION
X
X
P.SOFTWARE.VERIFICATION
X
P.AUDIT.LOGGING
X
X
X
X
P.INTERFACE.MANAGEMENT
X
X
P.STORAGE.ENCRYPTION
X
P.RCGATE.COMM.PROTECT
X
A.ACCESS.MANAGED
X
A.ADMIN.TRAINING
X
A.ADMIN.TRUST
X
A.USER.TRAINING
X