HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 6 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
List of Tables
Table 1: TOE Reference ....................................................................................................................... 9
Table 2: IPsec user mappings to allowed network protocols ............................................................. 19
Table 3: English-only guidance documentation.................................................................................. 22
Table 4: Users .................................................................................................................................... 24
Table 5: User Data ............................................................................................................................. 25
Table 6: TSF Data .............................................................................................................................. 27
Table 7: TSF Data Listing ................................................................................................................... 27
Table 8: SFR package functions ........................................................................................................ 28
Table 9: SFR package attributes ........................................................................................................ 28
Table 10: SFR mappings between 2600.2 and the ST ...................................................................... 32
Table 11: SFR mappings of non-PP2600.2 SFRs and the ST (in the ST, but not required by or
hierarchical to SFRs in PP2600.2) ..................................................................................................... 33
Table 12: SFR mappings between 2600.2-CPY and the ST .............................................................. 33
Table 13: SFR mappings between 2600.2-DSR and the ST ............................................................. 34
Table 14: SFR mapping between 2600.2-FAX and the ST ................................................................ 34
Table 15: SFR mappings between 2600.2-PRT and the ST .............................................................. 34
Table 16: SFR mappings between 2600.2-SCN and the ST ............................................................. 34
Table 17: SFR mappings between 2600.2-SMI and the ST ............................................................... 35
Table 18: Mapping of security objectives to threats and policies ....................................................... 41
Table 19: Mapping of security objectives for the Operational Environment to assumptions, threats and
policies ................................................................................................................................................ 42
Table 20: Sufficiency of objectives countering threats ....................................................................... 44
Table 21: Sufficiency of objectives holding assumptions ................................................................... 45
Table 22: Sufficiency of objectives enforcing Organizational Security Policies ................................. 47
Table 23: Security functional requirements for the TOE .................................................................... 52
Table 24: Auditable events ................................................................................................................. 53
Table 25: Cryptographic key generation ............................................................................................ 54
Table 26: Cryptographic key distribution ............................................................................................ 54
Table 27: Cryptographic operations ................................................................................................... 55
Table 28: Cryptographic operations ................................................................................................... 55
Table 29: Common Access Control SFP ............................................................................................ 58
Table 30: Simplified Account Lockout for each sign in method.......................................................... 60
Table 31: Mapping of security functional requirements to security objectives ................................... 68
Table 32: Security objectives for the TOE rationale ........................................................................... 73
Table 33: TOE SFR dependency analysis ......................................................................................... 77
Table 34: Security assurance requirements ....................................................................................... 78
Table 35: Trusted channel connections ............................................................................................. 88