EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 6 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
List of Tables
Table 1: TOE Reference ....................................................................................................................... 9
Table 2: IPsec user mappings to allowed network protocols ............................................................. 19
Table 3: English-only guidance documentation.................................................................................. 22
Table 4: Users .................................................................................................................................... 24
Table 5: User Data ............................................................................................................................. 25
Table 6: TSF Data .............................................................................................................................. 27
Table 7: TSF Data Listing ................................................................................................................... 27
Table 8: SFR package functions ........................................................................................................ 28
Table 9: SFR package attributes ........................................................................................................ 28
Table 10: SFR mappings between 2600.2 and the ST ...................................................................... 32
Table 11: SFR mappings of non-PP2600.2 SFRs and the ST (in the ST, but not required by or
hierarchical to SFRs in PP2600.2) ..................................................................................................... 33
Table 12: SFR mappings between 2600.2-CPY and the ST .............................................................. 33
Table 13: SFR mappings between 2600.2-DSR and the ST ............................................................. 34
Table 14: SFR mapping between 2600.2-FAX and the ST ................................................................ 34
Table 15: SFR mappings between 2600.2-PRT and the ST .............................................................. 34
Table 16: SFR mappings between 2600.2-SCN and the ST ............................................................. 34
Table 17: SFR mappings between 2600.2-SMI and the ST ............................................................... 35
Table 18: Mapping of security objectives to threats and policies ....................................................... 41
Table 19: Mapping of security objectives for the Operational Environment to assumptions, threats and
policies ................................................................................................................................................ 42
Table 20: Sufficiency of objectives countering threats ....................................................................... 44
Table 21: Sufficiency of objectives holding assumptions ................................................................... 45
Table 22: Sufficiency of objectives enforcing Organizational Security Policies ................................. 47
Table 23: Security functional requirements for the TOE .................................................................... 52
Table 24: Auditable events ................................................................................................................. 53
Table 25: Cryptographic key generation ............................................................................................ 54
Table 26: Cryptographic key distribution ............................................................................................ 54
Table 27: Cryptographic operations ................................................................................................... 55
Table 28: Cryptographic operations ................................................................................................... 55
Table 29: Common Access Control SFP ............................................................................................ 58
Table 30: Simplified Account Lockout for each sign in method.......................................................... 60
Table 31: Mapping of security functional requirements to security objectives ................................... 68
Table 32: Security objectives for the TOE rationale ........................................................................... 73
Table 33: TOE SFR dependency analysis ......................................................................................... 77
Table 34: Security assurance requirements ....................................................................................... 78
Table 35: Trusted channel connections ............................................................................................. 88

Related product manuals