HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 4 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
4.3 Security Objectives Rationale ................................................................................................... 40
4.3.1 Coverage ........................................................................................................................................ 40
4.3.2 Sufficiency ...................................................................................................................................... 42
5 Extended Components Definition ................................................................................................ 48
5.1 Class FPT: Protection of the TSF ............................................................................................. 48
5.1.1 Restricted forwarding of data to external interfaces (FDI) .............................................................. 48
FPT_FDI_EXP.1 - Restricted forwarding of data to external interfaces ................................................... 48 5.1.1.1
6 Security Requirements ................................................................................................................. 49
6.1 TOE Security Functional Requirements.................................................................................... 49
6.1.1 Security audit (FAU) ....................................................................................................................... 52
Audit data generation (FAU_GEN.1) ....................................................................................................... 52 6.1.1.1
User identity association (FAU_GEN.2) .................................................................................................. 53 6.1.1.2
6.1.2 Cryptographic support (FCS) ......................................................................................................... 53
Cryptographic key generation (FCS_CKM.1) .......................................................................................... 53 6.1.2.1
Cryptographic key distribution (FCS_CKM.2) .......................................................................................... 54 6.1.2.2
Cryptographic operation (FCS_COP.1-ipsec) ......................................................................................... 54 6.1.2.3
Cryptographic operation (FCS_COP.1-job) ............................................................................................. 55 6.1.2.4
6.1.3 User data protection (FDP) ............................................................................................................ 55
Common access control SFP (FDP_ACC.1-cac) .................................................................................... 55 6.1.3.1
TOE function access control SFP (FDP_ACC.1-tfac) .............................................................................. 58 6.1.3.2
Common access control functions (FDP_ACF.1-cac) ............................................................................. 58 6.1.3.3
TOE function access control functions (FDP_ACF.1-tfac) ....................................................................... 58 6.1.3.4
Subset residual information protection (FDP_RIP.1) ............................................................................... 59 6.1.3.5
6.1.4 Identification and authentication (FIA) ............................................................................................ 59
Authentication failure handling (FIA_AFL.1) ............................................................................................ 59 6.1.4.1
Local user attribute definition (FIA_ATD.1) ............................................................................................. 60 6.1.4.2
Verification of secrets (FIA_SOS.1) ........................................................................................................ 61 6.1.4.3
Timing of Control Panel authentication (FIA_UAU.1) .............................................................................. 61 6.1.4.4
IPsec authentication before any action (FIA_UAU.2) .............................................................................. 61 6.1.4.5
Control Panel protected authentication feedback (FIA_UAU.7) ............................................................... 61 6.1.4.6
Timing of Control Panel identification (FIA_UID.1) .................................................................................. 61 6.1.4.7
IPsec identification before any action (FIA_UID.2) .................................................................................. 61 6.1.4.8
User-subject binding (FIA_USB.1) .......................................................................................................... 62 6.1.4.9
6.1.5 Security management (FMT) .......................................................................................................... 62
Management of authentication security functions behavior (FMT_MOF.1-auth) ...................................... 62 6.1.5.1
Management of Fax Archive security functions behavior (FMT_MOF.1-faxarchive) ................................ 62 6.1.5.2
Management of Permission Set security attributes (FMT_MSA.1-perm) ................................................. 62 6.1.5.3
Management of TOE function security attributes (FMT_MSA.1-tfac) ....................................................... 62 6.1.5.4
Management of TSF data (FMT_MTD.1-auth) ........................................................................................ 63 6.1.5.5
Management of TSF data (FMT_MTD.1-users) ...................................................................................... 63 6.1.5.6
Specification of management functions (FMT_SMF.1) ............................................................................ 63 6.1.5.7
Security roles (FMT_SMR.1) .................................................................................................................. 63 6.1.5.8
6.1.6 Protection of the TSF (FPT) ........................................................................................................... 64
Restricted forwarding of data to external interfaces (FPT_FDI_EXP.1) ................................................... 64 6.1.6.1
Reliable time stamps (FPT_STM.1) ........................................................................................................ 64 6.1.6.2
TSF testing (FPT_TST.1) ....................................................................................................................... 64 6.1.6.3
6.1.7 TOE access (FTA) .......................................................................................................................... 64
Control Panel TSF-initiated termination (FTA_SSL.3) ............................................................................. 64 6.1.7.1
6.1.8 Trusted path/channels (FTP) .......................................................................................................... 65
Inter-TSF trusted channel (FTP_ITC.1) ................................................................................................... 65 6.1.8.1
6.2 Security Functional Requirements Rationale ............................................................................ 65
6.2.1 Coverage ........................................................................................................................................ 65
6.2.2 Sufficiency ...................................................................................................................................... 68
6.2.3 Security requirements dependency analysis .................................................................................. 73
6.3 Security Assurance Requirements ............................................................................................ 77
6.4 Security Assurance Requirements Rationale ........................................................................... 78
7 TOE Summary Specification ........................................................................................................ 79
7.1 TOE Security Functionality ....................................................................................................... 79
7.1.1 Auditing .......................................................................................................................................... 79
7.1.2 Cryptography .................................................................................................................................. 79