Xerox Multi-Function Device Security Target
4
Copyright
2013 Xerox Corporation. All rights reserved.
6.3.4.
Class FDP: User data protection ..................................................................................... 45
6.3.5.
Class FIA: Identification and authentication .................................................................. 48
6.3.6.
Class FMT: Security management .................................................................................. 50
6.3.7.
Class FPR: Privacy ........................................................................................................... 54
6.3.8.
Class FPT: Protection of the TSF ..................................................................................... 54
6.3.9.
Class FTA: TOE access ..................................................................................................... 55
6.3.10.
Class FTP: Trusted paths/channels ............................................................................ 55
6.4.
E
XPLICITLY
S
TATED
R
EQUIREMENTS FOR THE
TOE .......................................................................... 56
6.4.1.
FPT_FDI_EXP.1 Restricted forwarding of data to external interfaces ............................ 56
6.5.
TOE
S
ECURITY
A
SSURANCE
R
EQUIREMENTS
................................................................................. 56
6.6.
R
ATIONALE FOR
S
ECURITY
F
UNCTIONAL
R
EQUIREMENTS
................................................................. 57
6.7.
R
ATIONALE FOR
S
ECURITY
A
SSURANCE
R
EQUIREMENTS
................................................................... 64
6.8.
R
ATIONALE FOR
D
EPENDENCIES
.................................................................................................. 65
6.8.1.
Security Functional Requirement Dependencies ............................................................ 65
6.8.2.
Security Assurance Requirement Dependencies ............................................................ 67
7.
TOE SUMMARY SPECIFICATION .......................................................................... 69
7.1.
TOE
S
ECURITY
F
UNCTIONS
........................................................................................................ 69
7.1.1.
Image Overwrite (TSF_IOW) .......................................................................................... 69
7.1.2.
Information Flow Security (TSF_FLOW) .......................................................................... 70
7.1.3.
Authentication (TSF_ AUT) ............................................................................................. 71
7.1.4.
Network Identification (TSF_NET_ID) ............................................................................. 71
7.1.5.
Security Audit (TSF_FAU) ................................................................................................ 72
7.1.6.
Cryptographic Operations (TSF_FCS) ............................................................................. 72
7.1.7.
User Data Protection – Disk Encryption (TSF_FDP_UDE) ............................................... 73
7.1.8.
User Data Protection – IP Filtering (TSF_FDP_FILTER) ................................................... 73
7.1.9.
Network Security (TSF_NET_SEC) ................................................................................... 73
7.1.10.
Security Management (TSF_FMT) ............................................................................. 73
8.
GLOSSARY.............................................................................................................. 77
9.
ACRONYMS ............................................................................................................. 81
10.
BIBLIOGRAPHY ...................................................................................................... 83