Xerox Multi-Function Device Security Target
36
Copyright
2013 Xerox Corporation. All rights reserved.
6. Security Requirements
This section defines the IT security requirements that shall be satisfied by the
TOE or its environment:
The CC divides TOE security requirements into two categories:
1. Security functional requirements (SFRs) (such as, identification and
authentication, security management, and user data protection) that
the TOE and the supporting evidence need to satisfy to meet the
security objectives of the TOE.
2. Security assurance requirements (SARs) that provide grounds for
confidence that the TOE and its supporting IT environment meet its
security objectives (e.g., configuration management, testing, and
vulnerability assessment).
These requirements are discussed separately within the following
subsections.
6.1.
Conventions
All operations performed on the SFRs or the SARs need to be identified. For
this purpose the following conventions shall be used.
Assignments will be written in [normal text with brackets]
Selections will be written in
underlined and italic text
.
Refinements will be written
bold
Iterations will be performed on components and functional elements.
The component ID defined by the Common Criteria (e.g. FDP_IFC.1)
will be extended by an ID for the iteration (e.g. “(FILTER)”). The
resulting component ID would be “FDP_IFC.1 (FILTER)”.
Where an iteration is identified in rationale discussion as “all”, the
statement applies to all
iterations of the requirement (e.g. “FMT_MTD.1
(all)”)