Fuji Xerox C2265/C2263 Security Target
- 70 - Copyright
2016 by Fuji Xerox Co., Ltd
- storing the fax data received from public telephone line
FIA_UID.1.2 The TSF shall require each user to be successfully identified before
allowing any other TSF-mediated actions on behalf of that user.
FIA_USB.1 User-subject binding
Hierarchical to: No other components.
Dependencies: FIA_ATD.1 User attribute definition
FIA_USB.1.1 The TSF shall associate the following user security attributes with
subjects acting on the behalf of that user: [assignment: list of user
security attributes].
[assignment: list of user security attributes]
- Key Operator role
- SA role
- U.NORMAL role
FIA_USB.1.2 The TSF shall enforce the following rules on the initial association of
user security attributes with the subjects acting on behalf of users:
[assignment: rules for the initial association of attributes].
[assignment: rules for the initial association of attributes]
- none
FIA_USB.1.3 The TSF shall enforce the following rules governing changes to the
user security attributes with the subjects acting on behalf of users:
[assignment: rules for the changing of attributes].
[assignment: rules for the changing of attributes]
- none
6.1.5. Class FMT: Security Management
FMT_MOF.1 Management of security functions behavior
Hierarchical to: No other components
Dependencies: FMT_SMR.1 Security roles
FMT_SMF.1 Specification of Management Functions
FMT_MOF.1.1 The TSF shall restrict the ability to [selection: determine the behavior
of, disable, enable, modify the behavior of] the functions
[assignment: list of functions] to [assignment: the authorized