Xerox Multi-Function Device Security Target
28
Copyright
2013 Xerox Corporation. All rights reserved.
Table 19: Completeness of security objectives
Objectives
O
.DO
C.NO
_DI
S
O
.DO
C.NO
_A
LT
O
.FU
NC.NO
_
A
LT
O
.P
RO
T
.NO
_
A
LT
O
.CO
NF
.NO
_DI
S
O
.CO
NF
.NO
_A
LT
O
.US
E
R.A
UT
HO
RIZ
E
D
O
E
.US
E
R.
A
UT
HO
RIZ
E
D
O
.S
O
F
T
W
A
RE
.V
E
RIF
IE
D
O
.A
UDIT
.LO
G
G
E
D
O
.A
UDIT
_
S
T
O
RA
G
E
.P
RO
T
E
CT
E
D
O
E
.A
U
DIT
_
S
T
O
RA
G
E
.P
R
O
T
E
CT
E
D
O
E
.A
U
DIT
_
A
CCE
S
S
.A
UT
HO
RIZ
E
D
O
E
.A
U
DIT
.R
E
V
IE
W
E
D
O
E
.INTE
RF
A
C
E
.M
A
N
A
G
E
D
O
E
.US
E
R.
A
UT
H
E
NT
IC
A
T
E
D
O
E
.P
H
Y
IS
CA
L.M
A
N
A
G
E
D
O
E
.INTE
RF
A
C
E
.M
A
N
A
G
E
D
O
E
.A
D
MIN.TR
A
IN
E
D
O
E
.A
D
MIN.TR
US
T
E
D
O
E
.US
E
R.T
R
A
IN
E
D
Threats, policies and
assumptions
T.DOC.DIS
X
X X
X
T.DOC.ALT
X
X X
X
T.FUNC.ALT
X
X X
X
T.PROT.ALT
X
X X
X
T.CONF.DIS
X X X
X
T.CONF.ALT
X X X
X
P.USER.AUTHORIZATION
X X
X
P.SOFTWARE.VERIFICATION
X
P.AUDIT.LOGGING
X X X X X
P.INTERFACE.MANAGEMENT
X
X
A.ACCESS.MANAGED
X
A.ADMIN.TRAINING
X
A.ADMIN.TRUST
X
A.USER.TRAINING
X
Table 20: Sufficiency of security objectives
Threats. Policies, and
Assumptions
Summary
Objectives and rationale
T.DOC.DIS
User Document Data
may be disclosed to
unauthorized persons
O.DOC.NO_DIS protects D.DOC
from unauthorized disclosure
O.USER.AUTHORIZED
establishes user identification and
authentication as the basis for
authorization
OE.USER.AUTHORIZED
establishes responsibility of the
TOE Owner to appropriately grant
authorization