Page 3 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
3.3
Assumptions .................................................................................28
4
Security Objectives...............................................................................29
4.1
Security Objectives for TOE................................................................29
4.2
Security Objectives of Operational Environment........................................30
4.3
Security Objectives Rationale..............................................................30
4.3.1
Tracing......................................................................................................30
4.3.2
Tracing Justification...................................................................................31
5
Extended Components Definition...............................................................34
6
Security Requirements ..........................................................................35
6.1
Security Functional Requirements........................................................35
6.1.1
Class FAU: Security audit...........................................................................35
6.1.2
Class FCS: Cryptographic support...............................................................40
6.1.3
Class FDP: User data protection..................................................................41
6.1.4
Class FIA: Identification and authentication................................................44
6.1.5
Class FMT: Security management...............................................................46
6.1.6
Class FPT: Protection of the TSF.................................................................53
6.1.7
Class FTP: Trusted path/channels...............................................................53
6.2
Security Assurance Requirements.........................................................55
6.3
Security Requirements Rationale..........................................................56
6.3.1
Tracing......................................................................................................56
6.3.2
Justification of Traceability.........................................................................57
6.3.3
Dependency Analysis..................................................................................61
6.3.4
Security Assurance Requirements Rationale.................................................63
7
TOE Summary Specification....................................................................64
7.1
TOE Security Function .....................................................................64
7.1.1
SF.AUDIT Audit Function........................................................................65
7.1.1.1
Generation of Audit Logs......................................................................66
7.1.1.2
Reading Audit Logs..............................................................................67
7.1.1.3
Protection of Audit Logs.......................................................................67
7.1.1.4
Time Stamps.......................................................................................67
7.1.2
SF.I&A User Identification and Authentication Function.............................67
7.1.2.1
User Identification and Authentication ..................................................68
7.1.2.2
Actions in Event of Identification and Authentication Failure..................68