Page 41 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table 7: List of cryptographic operations
Key type
Standard
Cryptographic
algorithm
Cryptographic
key size
Cryptographic operations
HDD
cryptographic
key
FIPS197
AES
256 bits
- Encryption when writing the
document data on HDD.
- Encryption when reading the
document data from HDD.
6.1.3
Class FDP: User data protection
FDP_ACC.1 Subset access control
Hierarchical to:
No other components.
Dependencies:
FDP_ACF.1 Security attribute based access control.
FDP_ACC.1.1 The TSF shall enforce the
[assignment: MFP access control SFP]
on
[assignment: List of
Subjects, Objects, and Operation among Subjects and Objects in Table 8
].
Table 8: List of subjects, objects, and operations among subjects and objects
Subjects
Objects
Operations among subjects and objects
Administrator process
Document data
Deleting document data
General user process
Document data
Storing document data
Reading document data
Deleting document data
FDP_ACF.1 Security attribute based access control
Hierarchical to:
No other components.
Dependencies:
FDP_ACC.1 Subset access control
FMT_MSA.3 Static attribute initialisation.
FDP_ACF.1.1 The TSF shall enforce the
[assignment: MFP access control SFP]
to objects based on the
following:
[assignment: subjects or objects, and their corresponding security attributes
shown Table 9
].
Table 9: Subjects, objects and security attributes
Types
Subjects or objects
Security attributes
Subjects
Administrator process
- Administrator IDs
- Administrator roles
Subjects
General user process
- General user ID
- Document data default ACL
Objects
Document data
- Document data ACL