EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 37 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
3.3 Assumptions
3.3.1 Environment of use of the TOE
Physical 3.3.1.1
A.ACCESS.MANAGED
The TOE is located in a restricted or monitored environment that provides protection from
unmanaged access to the physical components and data interfaces of the TOE.
A.ADMIN.PC.SECURE
The administrative computer is in a physically secured and managed environment and only the
authorized administrator has access to it.
A.USER.PC.POLICY
User computers are configured and used in conformance with the organization's security policies.
Personnel 3.3.1.2
A.USER.TRAINING
TOE Users are aware of the security policies and procedures of their organization, and are trained
and competent to follow those policies and procedures.
A.ADMIN.TRAINING
Administrators are aware of the security policies and procedures of their organization, are trained
and competent to follow the manufacturer's guidance and documentation, and correctly configure
and operate the TOE in accordance with those policies and procedures.
A.ADMIN.TRUST
Administrators do not use their privileged access rights for malicious purposes.
Connectivity 3.3.1.3
A.SERVICES.RELIABLE
When the TOE uses any of the network services SMB, FTP, DNS, Kerberos, LDAP, SMTP,
SharePoint, syslog, and/or WINS, these services provide reliable information and responses to the
TOE.
3.4 Organizational Security Policies
3.4.1 Included in the PP2600.2 protection profile
P.USER.AUTHORIZATION
To preserve operational accountability and security, Users will be authorized to use the TOE only
as permitted by the TOE Owner.
P.SOFTWARE.VERIFICATION
To detect corruption of the executable code in the TSF, procedures will exist to self-verify
executable code in the TSF.
P.AUDIT.LOGGING

Related product manuals