Samsung Multifunction MultiXpress X4220, X4250, X4300, X401, K4250, K4300, K4350, K401 Series
38
Copyright
2014 SAMSUNG ELECTRONICS Co., Ltd., All rights reserved
4.3
Security Objectives Rationale
This section demonstrates that each threat, organizational security policy, and assumption is mitigated
by at least one security objective and that those security objectives counter the threats, enforce the
policies, and uphold the assumptions. Table 21 shows the correspondences of security objectives,
assumptions, threats, and organizational security policies. Table 22 shows that each security problem
is covered by the defined security objectives.
Table 21: Completeness of Security Objectives
Threats/ Policies/
Assumptions
Objective
O.
DOC.NO_
DI
S
O.
DOC.NO_
AL
T
O.
FUNC
.N
O
_
AL
T
O.
PR
OT
.NO_
AL
T
O.
C
ONF.
N
O_
DI
S
O.
C
ONF.
N
O_
AL
T
O.
USER.AU
T
H
OR
IZ
E
D
OE
.USER.AU
T
HO
R
IZ
E
D
O.
SOFTW
AR
E
.VE
R
IFIE
D
O.
AUDI
T
.L
OGGE
D
O.
AUDI
T
_
STORAGE
.P
R
OT
E
C
T
ED
O.
AUDI
T
_
AC
C
E
SS
.AUT
HO
R
IZ
E
D
OE
.AUDI
T
_
STORAGE
.P
R
O
T
E
C
TED
OE
.AUDI
T
_
AC
C
E
S
S.AU
T
H
OR
IZ
ED
OE
.AUDI
T
.R
E
VI
E
W
E
D
OE
.I
NT
E
R
FAC
E
.MA
NAGE
D
OE
.PHYSIC
AL
.MA
NAGE
D
O.
INT
E
R
FAC
E
.M
ANAG
E
D
OE
.USER.T
R
AI
NE
D
OE
.ADM
IN.
T
R
AI
NE
D
OE
.ADM
IN.
T
R
USTE
D
T.DOC.DIS
T.DOC.ALT
T.FUNC.ALT
T.PROT.ALT
T.CONF.DIS
T.CONF.ALT
P.USER.AUTHORI
ZATION
P.SOFTWARE.VE
RIFICATION
P.AUDIT.LOGGIN
G
P.INTERFACE.MA
NAGEMENT
A.ACCESS.MANA
GED
A.USER.TRAININ
G
A.ADMIN.TRAINI
NG
A.ADMIN.TRUST