EasyManua.ls Logo

Fuji Xerox C2265 - Default Chapter; Table of Contents

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
- i -
- Table of Contents -
1. ST INTRODUCTION ................................................................................................................ 1
1.1. ST Reference .................................................................................................................................................. 1
1.2. TOE Reference ............................................................................................................................................... 1
1.3. TOE Overview ................................................................................................................................................ 2
1.3.1. TOE Type and Major Security Features ...................................................................................................... 2
1.3.2. Environment Assumptions ............................................................................................................................... 5
1.3.3. Required Non-TOE Hardware and Software ............................................................................................ 6
1.4. TOE Description ............................................................................................................................................ 8
1.4.1. User Assumptions ................................................................................................................................................ 8
1.4.2. Logical Scope and Boundary .......................................................................................................................... 8
1.4.3. Physical Scope and Boundary ..................................................................................................................... 17
1.4.4. Guidance .............................................................................................................................................................. 18
2. CONFORMANCE CLAIM ..................................................................................................... 20
2.1. CC Conformance Claim .......................................................................................................................... 20
2.2. PP claim, Package Claim ........................................................................................................................ 20
2.2.1. PP Claim ............................................................................................................................................................... 20
2.2.2. Package Claim ................................................................................................................................................... 20
2.2.3. Conformance Rationale ................................................................................................................................. 21
3. SECURITY PROBLEM DEFINITION ................................................................................ 23
3.1. Threats .......................................................................................................................................................... 23
3.1.1. Assets Protected by TOE ................................................................................................................................ 23
3.1.2. Threats agents ................................................................................................................................................... 26
3.1.3. Threats .................................................................................................................................................................. 26
3.2. Organizational Security Policies .......................................................................................................... 27
3.3. Assumptions ............................................................................................................................................... 27
4. Security Objectives ................................................................................................................ 28
4.1. Security Objectives for the TOE ........................................................................................................... 28
4.2. Security Objectives for the Environment ......................................................................................... 29
4.3. Security Objectives Rationale .............................................................................................................. 29
5. EXTENDED COMPONENTS DEFINITION .................................................................... 34
5.1. FPT_FDI_EXP Restricted forwarding of data to external interfaces .................................... 34
6. SECURITY REQUIREMENTS .............................................................................................. 36
6.1. Security Functional Requirements ..................................................................................................... 40
6.1.1. Class FAU: Security Audit .............................................................................................................................. 43

Table of Contents

Related product manuals