EasyManua.ls Logo

Fuji Xerox C2265 - Security Objectives

Fuji Xerox C2265
136 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Fuji Xerox C2265/C2263 Security Target
- 30 - Copyright
2016 by Fuji Xerox Co., Ltd
Table 12 Assumptions / Threats / Organizational Security policies and the Corresponding Security
Objectives
Objectives
Threats, Policies,
and Assumptions
O.DOC.NO_DIS
O.DOC.NO_ALT
O.FUNC.NO_ALT
O.PROT.NO_ALT
O.CONF.NO_DIS
O.CONF.NO_ALT
O.USER.AUTHORIZED
OE.USER.AUTHORIZED
O.SOFTWARE.VERIFIED
O.AUDIT.LOGGED
O.AUDIT_STORAGE.PROTECTED
O.AUDIT_ACCESS.AUTHORIZED
OE.AUDIT.REVIEWED
OE.INTERFACE.MANAGED
O.INTERFACE.MANAGED
OE.PHYISCAL.MANAGED
OE.ADMIN.TRAINED
OE.ADMIN.TRUSTED
OE.USER.TRAINED
O.CIPHER
T.DOC.DIS 
T.DOC.ALT 
T.FUNC.ALT 
T.PROT.ALT 
T.CONF.DIS 
T.CONF.ALT 
P.USER.AUTHORIZATIO
N 





P.SOFTWARE.VERIFICA
TION 





P.AUDIT.LOGGING 

P.INTERFACE.MANAGE
MENT 





P.CIPHER 
A.ACCESS.MANAGED 
A.ADMIN.TRAINING 
A.ADMIN.TRUST 
A.USER.TRAINING 
Table 13 Security Objectives Rationale for Security Problem
Threats, policies, and
assumptions
Summary
Objectives and rationale
T.DOC.DIS
User Document Data
may be disclosed to
unauthorized persons.
O.DOC.NO_DIS protects D.DOC from
unauthorized disclosure.
O.USER.AUTHORIZED establishes user
identification and authentication as the basis

Table of Contents

Related product manuals