Xerox Multi-Function Device Security Target
24
Copyright
2013 Xerox Corporation. All rights reserved.
3.4.
Organizational Security Policies
This section describes the Organizational Security Policies (OSPs) that apply
to the TOE. OSPs are used to provide a basis for security objectives that are
commonly desired by TOE Owners in this operational environment, but for
which it is not practical to universally define the assets being protected or the
threats to those assets.
Table 15: Organizational Security Policies
Name
Definition
P.USER.AUTHORIZATION
To preserve operational accountability and security,
Users will be authorized to use the TOE only as
permitted by the TOE Owner.
P.SOFTWARE.VERIFICATION
To detect corruption of the executable code in the
TSF, procedures will exist to self-verify executable
code in the TSF.
P.AUDIT.LOGGING
To preserve operational accountability and security,
records that provide an audit trail of TOE use and
security-relevant events will be created, maintained,
and protected from unauthorized disclosure or
alteration, and will be reviewed by authorized
personnel.
P.INTERFACE.MANAGEMENT
To prevent unauthorized use of the external
interfaces of the TOE, operation of those interfaces
will be controlled by the TOE and its IT
environment.