EasyManua.ls Logo

Ricoh Aficio MP 2852 User Manual

Ricoh Aficio MP 2852
92 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
Aficio MP 2352/2852/3352 series
Security Target
Author : RICOH COMPANY, LTD.
Date : 2011-12-19
Version : 1.00
Portions of Aficio MP 2352/2852/3352
series Security Target are reprinted
with written permission from IEEE, 445 Hoes Lane, Piscataway, New Jerse
y
08855, from IEEE 2600.1, Protection Profile for Hardcopy Devices,
Operational Environment A, Copyright © 2009 IEEE. All rights reserved.
This document is a translation of the evaluated and certified security target
written in Japanese.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Ricoh Aficio MP 2852 and is the answer not in the manual?

Ricoh Aficio MP 2852 Specifications

General IconGeneral
Print Resolution600 x 600 dpi
Copy Resolution600 x 600 dpi
Scan Resolution600 x 600 dpi
Duplex PrintingYes
Monthly Duty Cycle50, 000 pages
FunctionsPrint, Copy, Scan, Fax
Warm-Up Time20 seconds
First Print Time4.5 seconds
Fax Modem Speed33.6 Kbps
Maximum Paper SizeA3
Print Speed28 ppm
Copy Speed28 cpm
Original SizeA3
Zoom25% to 400%
Scan Speed50 images per minute
Fax Transmission Speed3 seconds per page
Network ConnectivityEthernet 10/100Base-TX
Operating System CompatibilityWindows, Mac
Power Consumption1.2 kW

Summary

1 ST Introduction

1.1 ST Reference

Identification information of the ST, including title, version, date, and author.

1.2 TOE Reference

Identifies the TOE by MFP names and component versions.

1.3 TOE Overview

Defines TOE Type, Usage, and Major Security Features.

1.4 TOE Description

1.4.1 Physical Boundary of TOE

Defines the physical components constituting the TOE.

1.4.2 Guidance Documents

Lists the available user guidance documents for the TOE.

1.4.3 Definition of Users

1.4.3.1 Direct User

Defines direct users: normal users, administrators, and RC Gate.

1.4.3.2 Indirect User

Defines indirect users: responsible manager and customer engineer.

1.4.4 Logical Boundary of TOE

1.4.4.1 Basic Functions

Overview of basic functions like Copy, Printer, Scanner, Fax.

1.4.4.2 Security Functions

Describes security functions like Audit, Identification, Document Access Control.

1.4.5 Protected Assets

1.4.5.1 User Data

Classifies user data into document and function data.

1.4.5.2 TSF Data

Classifies TSF data into protected and confidential data.

1.4.5.3 Functions

Lists MFP applications as protected assets subject to restrictions.

1.5 Glossary

1.5.1 Glossary for This ST

Provides definitions for specific terms used in the ST.

2 Conformance Claim

2.1 CC Conformance Claim

States CC conformance for ST and TOE based on CC versions.

2.2 PP Claims

Identifies the Protection Profile (PP) the ST conforms to.

2.3 Package Claims

Lists selected SFR Packages from the PP.

2.4 Conformance Claim Rationale

2.4.1 Consistency Claim with TOE Type in PP

Explains TOE type consistency with the PP.

2.4.2 Consistency Claim with Security Problems and Security Objectives in PP

Rationale for augmented security problems and objectives.

2.4.3 Consistency Claim with Security Requirements in PP

Discusses consistency of SFRs, including augmentations and refinements.

3 Security Problem Definitions

3.1 Threats

Defines assumed threats related to the TOE use and environment.

3.2 Organisational Security Policies

Lists the organizational security policies relevant to the TOE.

3.3 Assumptions

Identifies and describes assumptions related to the TOE usage environment.

4 Security Objectives

4.1 Security Objectives for TOE

Lists the security objectives specifically for the TOE.

4.2 Security Objectives of Operational Environment

Defines security objectives for the TOE's operational environment.

4.2.1 IT Environment

Security objectives for the IT environment.

4.2.2 Non-IT Environment

Security objectives for the non-IT environment.

4.3 Security Objectives Rationale

4.3.1 Correspondence Table of Security Objectives

Maps security objectives to assumptions, threats, and policies.

4.3.2 Security Objectives Descriptions

Describes the rationale for each security objective satisfying threats, assumptions, policies.

5 Extended Components Definition

5.1 Restricted forwarding of data to external interfaces (FPT_FDI_EXP)

Defines requirements to restrict data forwarding between external interfaces.

6 Security Requirements

6.1 Security Functional Requirements

Lists TOE security functional requirements from CC Part2 and PP.

6.2 Security Assurance Requirements

Lists the evaluation assurance level and components.

6.3 Security Requirements Rationale

Provides rationale for security requirements.

6.3.1 Tracing

Shows relationship between security objectives and functional requirements.

6.3.2 Justification of Traceability

Explains how TOE security objectives are fulfilled by functional requirements.

6.3.3 Dependency Analysis

Analyzes dependencies between TOE security functional requirements.

6.3.4 Security Assurance Requirements Rationale

Provides rationale for the chosen security assurance requirements.

7 TOE Summary Specification

7.1 Audit Function

Summarizes the audit function, including log generation and management.

7.2 Identification and Authentication Function

Summarizes user identification and authentication methods.

7.3 Document Access Control Function

Explains how the TOE controls access to document data and user jobs.

7.4 Use-of-Feature Restriction Function

Authorizes users to use specific functions based on roles and privileges.

7.5 Network Protection Function

Provides network monitoring to prevent information leakage and detect tampering.

7.6 Residual Data Overwrite Function

Overwrites data on HDD to prevent reuse of residual data.

7.7 Stored Data Protection Function

Encrypts data on HDD to prevent data leakage.

7.8 Security Management Function

Manages TSF data, user roles, and security attributes.

7.9 Software Verification Function

Verifies the integrity of MFP and FCU control software.

7.10 Fax Line Separation Function

Receives only faxes from phone lines, prevents unauthorized intrusion.

Related product manuals