EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 69 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
Security objectives
Rationale
protection by restricting access.
FMT_SMF.1 which supports control of security attributes by
requiring functions to control attributes.
FMT_SMR.1 which supports control of security attributes by
requiring security roles.
FTP_ITC.1 which enforces protection by requiring the use of
trusted channels for communication of data over Shared-medium
Interfaces.
O.CONF.NO_DIS
The objective:
The TOE shall protect TSF Confidential Data from unauthorized
disclosure.
is met by:
FCS_CKM.1 which specifies the type of cryptographic keys
generated by the TOE for use with AES in IPsec.
FCS_CKM.2 which specifies the cryptographic key distribution
methods used by the TOE in IKEv1 and IKEv2 in IPsec.
FCS_COP.1-ipsec which specifies the AES encryption/decryption
algorithms and the RSA decryption algorithms used by the TOE
in IPsec.
FIA_UAU.7 which masks the display of certain passwords and
PINs during authentication.
FIA_UID.1 and FIA_UID.2 which support access control and
security roles by requiring user identification.
FMT_MTD.1-auth and FMT_MTD.1-users which enforce
protection by restricting access.
FMT_SMF.1 which supports control of security attributes by
requiring functions to control attributes.
FMT_SMR.1 which supports control of security attributes by
requiring security roles.
FTP_ITC.1 which enforces protection by requiring the use of
trusted channels for communication of data over Shared-medium
Interfaces.
O.DOC.NO_ALT
The objective:
The TOE shall protect User Document Data from unauthorized
alteration.
is met by:
FCS_CKM.1 which specifies the type of cryptographic keys
generated by the TOE for use with HMAC algorithms in IPsec.
FCS_CKM.2 which specifies the cryptographic key distribution

Related product manuals