Page 43 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
[assignment: subjects, information, and an operation listed in Table 12
].
Table 12: List of subjects, information and operation
Subjects
Information
Operation
- Fax process on Fax Unit
- Fax reception process on Controller Board
Data received from a telephone
line
Transferring
(Note: "Transferring" means the Controller Board is receiving data through the Fax Unit from a telephone
line.)
FDP_IFF.1
Simple security attributes
Hierarchical to:
No other components.
Dependencies:
FDP_IFC.1 Subset information flow control
FMT_MSA.3 Static attribute initialisation.
FDP_IFF.1.1
The TSF shall enforce the
[assignment: telephone line information flow SFP]
based on
the following types of subject and information security attributes:
[assignment: subjects or
information and their corresponding security attributes shown in Table 13
].
Table 13: Security attributes corresponding to subjects or information
Type
Subjects of information
Security attributes
Subject
Fax process on Fax Unit
No security attributes
Subject
Fax reception process on Controller Board
No security attributes
Information
Data received from a telephone line
Data type
(Note: "Data type" means the type of data received from a telephone line and indicates whether this is
fax or non-fax data.)
FDP_IFF.1.2
The TSF shall permit an information flow between a controlled subject and controlled
information via a controlled operation if the following rules hold:
[assignment: after the
type of received data from a telephone line is recognised as fax data, the fax process on
the Fax Unit allows Fax Reception on the Controller Board to let data received from a
telephone line pass]
.
FDP_IFF.1.3
The TSF shall enforce the
[assignment: no additional information flow control SFP
rules]
.
FDP_IFF.1.4
The TSF shall explicitly authorise an information flow based on the following rules:
[assignment: no rules, based on security attributes that explicitly authorise
information flows]
.
FDP_IFF.1.5
The TSF shall
explicitly deny an information flow based on the following rules:
[assignment: no rules, based on security attributes that explicitly deny information
flows]
.