EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 4 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
4.3 Security Objectives Rationale ................................................................................................... 40
4.3.1 Coverage ........................................................................................................................................ 40
4.3.2 Sufficiency ...................................................................................................................................... 42
5 Extended Components Definition ................................................................................................ 48
5.1 Class FPT: Protection of the TSF ............................................................................................. 48
5.1.1 Restricted forwarding of data to external interfaces (FDI) .............................................................. 48
FPT_FDI_EXP.1 - Restricted forwarding of data to external interfaces ................................................... 48 5.1.1.1
6 Security Requirements ................................................................................................................. 49
6.1 TOE Security Functional Requirements.................................................................................... 49
6.1.1 Security audit (FAU) ....................................................................................................................... 52
Audit data generation (FAU_GEN.1) ....................................................................................................... 52 6.1.1.1
User identity association (FAU_GEN.2) .................................................................................................. 53 6.1.1.2
6.1.2 Cryptographic support (FCS) ......................................................................................................... 53
Cryptographic key generation (FCS_CKM.1) .......................................................................................... 53 6.1.2.1
Cryptographic key distribution (FCS_CKM.2) .......................................................................................... 54 6.1.2.2
Cryptographic operation (FCS_COP.1-ipsec) ......................................................................................... 54 6.1.2.3
Cryptographic operation (FCS_COP.1-job) ............................................................................................. 55 6.1.2.4
6.1.3 User data protection (FDP) ............................................................................................................ 55
Common access control SFP (FDP_ACC.1-cac) .................................................................................... 55 6.1.3.1
TOE function access control SFP (FDP_ACC.1-tfac) .............................................................................. 58 6.1.3.2
Common access control functions (FDP_ACF.1-cac) ............................................................................. 58 6.1.3.3
TOE function access control functions (FDP_ACF.1-tfac) ....................................................................... 58 6.1.3.4
Subset residual information protection (FDP_RIP.1) ............................................................................... 59 6.1.3.5
6.1.4 Identification and authentication (FIA) ............................................................................................ 59
Authentication failure handling (FIA_AFL.1) ............................................................................................ 59 6.1.4.1
Local user attribute definition (FIA_ATD.1) ............................................................................................. 60 6.1.4.2
Verification of secrets (FIA_SOS.1) ........................................................................................................ 61 6.1.4.3
Timing of Control Panel authentication (FIA_UAU.1) .............................................................................. 61 6.1.4.4
IPsec authentication before any action (FIA_UAU.2) .............................................................................. 61 6.1.4.5
Control Panel protected authentication feedback (FIA_UAU.7) ............................................................... 61 6.1.4.6
Timing of Control Panel identification (FIA_UID.1) .................................................................................. 61 6.1.4.7
IPsec identification before any action (FIA_UID.2) .................................................................................. 61 6.1.4.8
User-subject binding (FIA_USB.1) .......................................................................................................... 62 6.1.4.9
6.1.5 Security management (FMT) .......................................................................................................... 62
Management of authentication security functions behavior (FMT_MOF.1-auth) ...................................... 62 6.1.5.1
Management of Fax Archive security functions behavior (FMT_MOF.1-faxarchive) ................................ 62 6.1.5.2
Management of Permission Set security attributes (FMT_MSA.1-perm) ................................................. 62 6.1.5.3
Management of TOE function security attributes (FMT_MSA.1-tfac) ....................................................... 62 6.1.5.4
Management of TSF data (FMT_MTD.1-auth) ........................................................................................ 63 6.1.5.5
Management of TSF data (FMT_MTD.1-users) ...................................................................................... 63 6.1.5.6
Specification of management functions (FMT_SMF.1) ............................................................................ 63 6.1.5.7
Security roles (FMT_SMR.1) .................................................................................................................. 63 6.1.5.8
6.1.6 Protection of the TSF (FPT) ........................................................................................................... 64
Restricted forwarding of data to external interfaces (FPT_FDI_EXP.1) ................................................... 64 6.1.6.1
Reliable time stamps (FPT_STM.1) ........................................................................................................ 64 6.1.6.2
TSF testing (FPT_TST.1) ....................................................................................................................... 64 6.1.6.3
6.1.7 TOE access (FTA) .......................................................................................................................... 64
Control Panel TSF-initiated termination (FTA_SSL.3) ............................................................................. 64 6.1.7.1
6.1.8 Trusted path/channels (FTP) .......................................................................................................... 65
Inter-TSF trusted channel (FTP_ITC.1) ................................................................................................... 65 6.1.8.1
6.2 Security Functional Requirements Rationale ............................................................................ 65
6.2.1 Coverage ........................................................................................................................................ 65
6.2.2 Sufficiency ...................................................................................................................................... 68
6.2.3 Security requirements dependency analysis .................................................................................. 73
6.3 Security Assurance Requirements ............................................................................................ 77
6.4 Security Assurance Requirements Rationale ........................................................................... 78
7 TOE Summary Specification ........................................................................................................ 79
7.1 TOE Security Functionality ....................................................................................................... 79
7.1.1 Auditing .......................................................................................................................................... 79
7.1.2 Cryptography .................................................................................................................................. 79

Related product manuals