- TABLE OF CONTENTS -
1.
ST INTRODUCTION .............................................. 1
1.1.
ST
R
EFERENCE
................................................................................................................................ 1
1.2.
TOE
R
EFERENCE
.............................................................................................................................. 1
1.3.
TOE
O
VERVIEW
............................................................................................................................... 1
1.3.1
TOE Type
............................................................................................................................... 1
1.3.2
Usage and Major Security Features of TOE
................................................................... 1
1.3.3
Required Non-TOE Hardware/Software/Firmware
....................................................... 2
1.4.
TOE
D
ESCRIPTION
.......................................................................................................................... 3
1.4.1.
People Associated with the TOE
....................................................................................... 3
1.4.2.
Physical Configuration of the TOE
................................................................................... 4
1.4.3.
Logical Configuration of the TOE
..................................................................................... 5
1.4.4.
Guidance
............................................................................................................................... 7
1.4.5.
Assets Protected by the TOE
............................................................................................ 8
2.
CONFORMANCE CLAIMS ....................................... 9
2.1.
CC
C
ONFORMANCE
C
LAIMS
............................................................................................................. 9
2.2.
PP
C
LAIMS
....................................................................................................................................... 9
2.3.
P
ACKAGE
C
LAIMS
............................................................................................................................. 9
2.4.
C
ONFORMANCE
R
ATIONALE
.............................................................................................................. 9
3.
SECURITY PROBLEM DEFINITION ........................ 10
3.1.
T
HREATS
........................................................................................................................................ 10
3.2.
O
RGANIZATIONAL
S
ECURITY
P
OLICIES
........................................................................................... 10
3.3.
A
SSUMPTIONS
................................................................................................................................ 10
4.
SECURITY OBJECTIVES ...................................... 11
4.1.
S
ECURITY
O
BJECTIVES FOR THE
TOE..............................................................................................11
4.2.
S
ECURITY
O
BJECTIVES FOR THE
O
PERATIONAL
E
NVIRONMENT
........................................................11
4.3.
S
ECURITY
O
BJECTIVES
R
ATIONALE
.................................................................................................11