EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
HP LaserJet Enterprise MFP M527 Series, Color
LaserJet Enterprise MFP M577 Series, and PageWide
Enterprise Color MFP 586 Series Firmware with
Jetdirect Inside Security Target
Version:
2.0
Status:
Final
Last Update:
2016-06-07
Question and Answer IconNeed help?

Do you have a question about the HP M527dn and is the answer not in the manual?

HP M527dn Specifications

General IconGeneral
Print TechnologyLaser
Print ResolutionUp to 1200 x 1200 dpi
Duplex PrintingYes
Scanner TypeFlatbed, ADF
Fax Modem Speed33.6 kbps
Standard Input Capacity550 sheets
Processor Frequency1.2 GHz
Ethernet LANYes
FunctionsPrint, copy, scan
Maximum Scan Size216 x 356 mm
Mobile Printing TechnologiesHP ePrint, Apple AirPrint
ConnectivityUSB, Ethernet, Wi-Fi
Supported Operating SystemsWindows, Mac

Summary

Introduction to HP LaserJet Enterprise MFP Firmware

Security Target Identification

Identifies the title, version, status, date, sponsor, developer, certification body, and keywords for the security target.

TOE Overview and Functionality

Describes enterprise MFPs, their functions, components like firmware, OS, and control panel, and intended use.

TOE Architecture and Components

Explains the TOE as firmware, its functions, connection methods, and overall architecture.

Common Criteria Conformance Claim

Protection Profile Tailoring and Additions

Details modifications to PP2600.2 for NIAP CCEVS Policy Letter #20 and mappings of SFRs.

Security Problem Definition and Environment

Threat Environment and Countermeasures

Identifies threat agents and lists specific threats the TOE is designed to protect against.

Assumptions for TOE Operation

Lists assumptions about the environment, personnel, and connectivity for the TOE's operation.

Organizational Security Policies

Lists organizational policies, including those from PP2600.2 and additional requirements.

Security Objectives for TOE and Environment

TOE Security Objectives

Lists security objectives for the TOE, covering audit logging, data protection, and user authorization.

Operational Environment Security Objectives

Lists security objectives for the operational environment, focusing on admin computer security and user training.

Security Objectives Rationale: Sufficiency

Justifies how security objectives counter specific threats and contribute to mitigation.

Extended Components Definition

Protection of the TSF: Restricted Data Forwarding

Describes functional requirements for restricting data forwarding to external interfaces, specifically FDI.

Security Requirements

TOE Security Functional Requirements Overview

Lists TOE security functional requirements and operations performed on components.

Cryptographic Support Functions

Details key generation, distribution, and operations for IPsec and job decryption.

User Data Protection and Access Control

Covers common access control, function access control, and residual information protection for user data.

Identification and Authentication Mechanisms

Covers authentication failure handling, user attributes, timing, and IPsec identification.

Security Management Functions

Details management of authentication, fax archive, permission sets, TSF data, and security roles.

Protection of the TSF and Access Control

Covers restricted data forwarding, TSF self-testing, and TOE access protection mechanisms.

Security Requirements Rationale

Provides rationale for security objectives, including coverage, sufficiency, and dependency analysis.

Security Assurance Requirements

Lists security assurance requirements as Evaluation Assurance Level 2 components, augmented by ALC_FLR.2.

TOE Summary Specification and Functionality

TOE Security Functionality Overview

Explains how the TOE's security functions are implemented across various SFR classes.

Identification and Authentication (I&A) Methods

Covers Control Panel and IPsec sign-in methods, local/remote access, and user attributes.

Data Protection and Access Control Mechanisms

Covers permission sets, job PINs, job encryption passwords, and common access control.

Protection of the TSF and Access Control

Covers restricted data forwarding, TSF self-testing, and TOE access protection.

User and Access Management Capabilities

Explains management capabilities and supported user roles (administrators, users).

Document Reference Information

Abbreviations Used in Document

Lists common abbreviations used throughout the document.

Glossary of Technical Terms

Provides definitions of technical terms specific to this document.

Related product manuals