Xerox Multi-Function Device Security Target
43
Copyright
2013 Xerox Corporation. All rights reserved.
FAU_STG.1.2:
The TSF shall be able to
prevent
unauthorized
modifications to the stored audit records in the audit trail.
6.3.1.4. FAU_STG.4 Prevention of audit data loss
Hierarchical to:
FAU_STG.3.
Dependencies:
FAU_STG.1 Protected audit trail storage
FAU_STG.4.1:
The TSF shall
overwrite the oldest stored audit records
and [generate an email warning at 90%] if the audit trail is
full.
6.3.2.
Class FCO: Communication
There are no Class FCO security functional requirements for this ST.
6.3.3.
Class FCS: Cryptographic support
6.3.3.1. FCS_COP.1 Cryptographic operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1
The TSF shall perform [the cryptographic operations
listed in the Cryptographic Operations column of Table
25] in accordance with a specified cryptographic
algorithm [the cryptographic algorithms listed in the
Cryptographic Algorithm column of Table 25] and
cryptographic key sizes [the cryptographic key sizes
listed in the Key Sizes (bits) column of Table 25] that
meet the following: [the list of standards in the Standards
column of Table 25].
Table 25: Cryptographic operations
Cryptographic
Operations
Cryptographic
Algorithm
Key Sizes
(bits)
Standards & Certs.*
Symmetric encryption and
decryption
Triple DES (CBC)
168
FIPS 46-3 (cert #826
and #1174)
AES (CBC)
256
FIPS 197 (cert #1131
and #1821)