Page 66 of
89
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Table 28 : Relationship between Security Objectives and Functional Requirements
O.
DOC.
N
O_
D
IS
O.
DOC.
N
O_
A
LT
O.F
U
NC.N
O
_
ALT
O.PR
OT.
N
O_
ALT
O.CO
NF
.N
O
_
DIS
O.CO
NF
.N
O
_
ALT
O.
USER.
A
UT
HOR
IZE
D
O.I
N
T
E
RFAC
E.M
A
NA
GE
D
O.S
O
FT
W
A
R
E
.VER
IF
IED
O.
AU
DI
T.L
O
GGE
D
O.ST
OR
AGE
.E
NCRYP
T
E
D
O.RCG
ATE
.C
O
M
M
.PRO
T
E
C
T
FAU_GEN.1
X
FAU_GEN.2
X
FAU_STG.1
X
FAU_STG.4
X
FAU_SAR.1
X
FAU_SAR.2
X
FCS_CKM.1
X
FCS_COP.1
X
FDP_ACC.1(a)
X
X
X
FDP_ACC.1(b)
X
FDP_ACF.1(a)
X
X
X
FDP_ACF.1(b)
X
FDP_RIP.1
X
X
FIA_AFL.1
X
FIA_ATD.1
X
FIA_SOS.1
X
FIA_UAU.1(a)
X
X
FIA_UAU.1(b)
X
X
FIA_UAU.2
X
X
FIA_UAU.7
X
FIA_UID.1(a)
X
X
FIA_UID.1(b)
X
X
FIA_UID.2
X
X
FIA_USB.1
X
FPT_FDI_EXP.1
X
FMT_MSA.1(a)
X
X
X
FMT_MSA.1(b)
X
FMT_MSA.3(a)
X
X
X