HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 58 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
Table 29: Common Access Control SFP
TOE function access control SFP (FDP_ACC.1-tfac) 6.1.3.2
The TSF shall enforce the TOE Function Access Control SFP on users as subjects,
TOE functions as objects, and the right to use the functions as operations.
Common access control functions (FDP_ACF.1-cac) 6.1.3.3
The TSF shall enforce the Common Access Control SFP in Table 29: Common Access
Control SFP to objects based on the following: the list of users as subjects and objects
controlled under the Common Access Control SFP in Table 29: Common Access
Control SFP, and for each, the indicated security attributes in Table 29: Common
Access Control SFP .
The TSF shall enforce the following rules to determine if an operation among controlled
subjects and controlled objects is allowed: rules specified in the Common Access
Control SFP in Table 29: Common Access Control SFP governing access among
controlled users as subjects and controlled objects using controlled operations on
controlled objects.
The TSF shall explicitly authorise access of subjects to objects based on the following
additional rules:
U.ADMINISTRATOR can delete any D.DOC without providing a Job PIN or
Job Encryption Password.
The TSF shall explicitly deny access of subjects to objects based on the following
additional rules: none.
TOE function access control functions (FDP_ACF.1-tfac) 6.1.3.4
The TSF shall enforce the TOE Function Access Control SFP to objects based on the
following: users and the following TOE functions and security attributes:
Users: Control Panel users;
Functions: F.CPY, F.DSR, F.FAX, F.PRT, F.SCN, F.SMI;
Security attributes:
o User Role as defined by the user's Permission Set
o Association of a sign in method to a Control Panel application
Users: Network Client Computers, Administrative Computer;
Functions: F.DSR, F.PRT, F.SMI;
Security attributes:
o User Role as defined by the user's IPsec/Firewall service templates.
Application Note: The "Allow users to choose alternate sign-in methods" function affects
the sign in processing behavior of Control Panel users, but is considered a function instead