Xerox Multi-Function Device Security Target
25
Copyright
2013 Xerox Corporation. All rights reserved.
4. Security Objectives
The purpose of the security objectives is to detail the planned response to a
security problem or threat. Threats can be directed against the TOE or the
security environment or both, therefore, the CC identifies two categories of
security objectives:
1. Security objectives for the TOE, and
2. Security objectives for the environment.
4.1.
Security Objectives for the TOE
This section describes the security objectives that the TOE shall fulfill.
Table 16: Security objectives for the TOE
Objective
Definition
O.DOC.NO_DIS
The TOE shall protect User Document Data from
unauthorized disclosure.
O.DOC.NO_ALT
The TOE shall protect User Document Data from
unauthorized alteration.
O.FUNC.NO_ALT
The TOE shall protect User Function Data from
unauthorized alteration.
O.PROT.NO_ALT
The TOE shall protect TSF Protected Data from
unauthorized alteration.
O.CONF.NO_DIS
The TOE shall protect TSF Confidential Data from
unauthorized disclosure.
O.CONF.NO_ALT
The TOE shall protect TSF Confidential Data from
unauthorized alteration.
O.USER.AUTHORIZED
The TOE shall require identification and authentication of
Users, and shall ensure that Users are authorized in
accordance with security policies before allowing them to
use the TOE.
O.INTERFACE.MANAGED
The TOE shall manage the operation of external interfaces
in accordance with security policies.
O.SOFTWARE.VERIFIED
The TOE shall provide procedures to self-verify executable
code in the TSF.
O.AUDIT.LOGGED
The TOE shall create and maintain a log of TOE use and
security-relevant events, and prevent its unauthorized
disclosure or alteration.