Xerox Multi-Function Device Security Target
5
Copyright
2013 Xerox Corporation. All rights reserved.
List of Figures
F
IGURE
1:
X
EROX
W
ORK
C
ENTRE
5845/5855/5865/5875/5890 ...................................................................... 7
F
IGURE
2:
X
EROX
W
ORK
C
ENTRE
7220/7225 .................................................................................................. 8
F
IGURE
3:
X
EROX
W
ORK
C
ENTRE
7830/7835/7845/7855 ............................................................................... 8
F
IGURE
4:
X
EROX
C
OLOR
Q
UBE
9301/9302/9303 ........................................................................................... 8
List of Tables
T
ABLE
1:
ST
AND
TOE
IDENTIFICATION
............................................................................................................. 6
T
ABLE
2:
M
ODELS AND CAPABILITIES
............................................................................................................... 9
T
ABLE
3:
E
VALUATED SOFTWARE VERSION
...................................................................................................... 11
T
ABLE
4:
S
YSTEM
U
SER AND
A
DMINISTRATOR
G
UIDANCE
.................................................................................. 11
T
ABLE
5:
IEEE
S
TD
.
2600.2-2009
COMMON
SFR
AUGMENTATIONS
.................................................................. 17
T
ABLE
6:
IEEE
S
TD
.
2600.2-2009
PACKAGE AUGMENTATIONS
.......................................................................... 18
T
ABLE
7:
U
SERS
......................................................................................................................................... 19
T
ABLE
8:
U
SER DATA
.................................................................................................................................. 20
T
ABLE
9:
TSF
DATA
.................................................................................................................................... 20
T
ABLE
10:
TSF
DATA CATEGORIZATION
.......................................................................................................... 20
T
ABLE
11:
SFR
PACKAGE FUNCTIONS FOR
IEEE
S
TD
.
2600.2-2009 ................................................................... 21
T
ABLE
12:
A
SSUMPTIONS FOR THE
TOE ......................................................................................................... 22
T
ABLE
13:
T
HREATS TO USER DATA
................................................................................................................ 23
T
ABLE
14:
T
HREATS TO
TSF
DATA
................................................................................................................. 23
T
ABLE
15:
O
RGANIZATIONAL
S
ECURITY
P
OLICIES
.............................................................................................. 24
T
ABLE
16:
S
ECURITY OBJECTIVES FOR THE
TOE ................................................................................................ 25
T
ABLE
17:
S
ECURITY OBJECTIVES FOR THE
IT
ENVIRONMENT
............................................................................... 26
T
ABLE
18:
S
ECURITY OBJECTIVES FOR THE NON
-IT
ENVIRONMENT
....................................................................... 27
T
ABLE
19:
C
OMPLETENESS OF SECURITY OBJECTIVES
......................................................................................... 28
T
ABLE
20:
S
UFFICIENCY OF SECURITY OBJECTIVES
............................................................................................. 28
T
ABLE
21:
U
SER
A
CCESS
C
ONTROL
SFP .......................................................................................................... 37
T
ABLE
22:
A
TTRIBUTES
D
EFINITION
................................................................................................................ 38
T
ABLE
23:
TOE
SECURITY FUNCTIONAL REQUIREMENTS
..................................................................................... 40
T
ABLE
24:
A
UDIT DATA REQUIREMENTS
.......................................................................................................... 42
T
ABLE
25:
C
RYPTOGRAPHIC OPERATIONS
........................................................................................................ 43
T
ABLE
26:
C
RYPTOGRAPHIC KEY GENERATION
.................................................................................................. 44
T
ABLE
27:
C
RYPTOGRAPHIC KEY DISTRIBUTION
................................................................................................. 45
T
ABLE
28:
IEEE
2600.2
SECURITY ASSURANCE REQUIREMENTS
........................................................................... 56
T
ABLE
29:
C
OMPLETENESS OF SECURITY FUNCTIONAL REQUIREMENTS
................................................................... 58
T
ABLE
30:
S
UFFICIENCY OF SECURITY FUNCTIONAL REQUIREMENTS
....................................................................... 59
T
ABLE
31:
SFR
DEPENDENCIES SATISFIED
........................................................................................................ 65
T
ABLE
32:
EAL2
(
AUGMENTED WITH
ALC_FLR.3)
SAR
DEPENDENCIES SATISFIED
.................................................. 67
T
ABLE
33:
A
CRONYMS
................................................................................................................................. 81