Xerox Multi-Function Device Security Target
45
Copyright
2013 Xerox Corporation. All rights reserved.
FCS_CKM.2.1
The TSF shall distribute cryptographic keys in
accordance with a specified cryptographic key distribution
method [the method shown for each related protocol in
Table 27] that meet the following: [standards shown in
Table 27].
Table 27: Cryptographic key distribution
Related Protocol
Key Distribution Method
Standards
TLS (client server
authentication)
RSA encrypted exchange of
session keys for TLS handshake
RFC 4366
TLS (public keys)
Digital certificates for public keys
RFC 5280
(certificate format)
IPsec
Diffie-Hellman key exchange
RFC 2631
SFTP
Diffie-Hellman key exchange
RFC 2631
6.3.3.4. FCS_CKM.4 Cryptographic key destruction
Hierarchical to:
No other components
Dependencies:
[FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4.1
The TSF shall destroy cryptographic keys in accordance
with a specified cryptographic key destruction method
[semiconductor memory state loss at power-down,
semiconductor memory zeroization at power-up] that
meets the following: [None].
6.3.4.
Class FDP: User data protection
6.3.4.1. FDP_ACC.1 (USER) Subset access control
Hierarchical to:
No other components.
Dependencies:
FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1 (USER)
The TSF shall enforce the [User Access Control
SFP in Table 21] on [the list of users as subjects, objects,
and operations among subjects and objects covered by
the User Access Control SFP in Table 21].
Application Note:
This SFR covers FDP_ACC.1 (a) and FDP_ACC.1 from
all claimed packages (PRT, SCN, CPY, FAX, DSR) in the IEEE Std. 2600.2
PP.