Page 3 of
89
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
3.1
Threats ......................................................................................................................... 32
3.2
Organisational Security Policies.................................................................................. 33
3.3
Assumptions................................................................................................................. 33
4
Security Objectives.............................................................................................................. 35
4.1
Security Objectives for TOE......................................................................................... 35
4.2
Security Objectives of Operational Environment........................................................ 36
4.2.1 IT
Environment .......................................................................................................36
4.2.2 Non-IT
Environment ...............................................................................................37
4.3
Security Objectives Rationale ...................................................................................... 38
4.3.1
Correspondence Table of Security Objectives.........................................................38
4.3.2 Security
Objectives Descriptions ............................................................................39
5
Extended Components Definition....................................................................................... 43
5.1
Restricted forwarding of data to external interfaces (FPT_FDI_EXP) ....................... 43
6
Security Requirements........................................................................................................ 45
6.1
Security Functional Requirements .............................................................................. 45
6.1.1 Class
FAU:
Security audit.......................................................................................45
6.1.2
Class FCS: Cryptographic support .........................................................................48
6.1.3 Class
FDP:
User data protection ............................................................................49
6.1.4
Class FIA: Identification and authentication.........................................................54
6.1.5
Class FMT: Security management..........................................................................57
6.1.6 Class
FPT:
Protection of the TSF............................................................................63
6.1.7 Class
FTA: TOE access............................................................................................64
6.1.8 Class
FTP:
Trusted path/channels..........................................................................64
6.2
Security Assurance Requirements............................................................................... 64
6.3
Security Requirements Rationale................................................................................ 65
6.3.1 Tracing .....................................................................................................................65
6.3.2 Justification
of Traceability.....................................................................................67
6.3.3 Dependency Analysis...............................................................................................73
6.3.4 Security
Assurance
Requirements Rationale .........................................................75
7
TOE Summary Specification............................................................................................... 76
7.1
Audit Function ............................................................................................................. 76
7.2
Identification and Authentication Function ................................................................ 78