Page 6 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
List of Figures
Figure 1: Example TOE environment ..............................................................................................................9
Figure 2: Hardware configuration of TOE.....................................................................................................11
Figure 3: Logical boundaries of TOE.............................................................................................................17
List of Tables
Table 1: List of administrator roles ................................................................................................................16
Table 2: Correspondence between operations authorised by permissions to process document data and
operations possible on document data............................................................................................................21
Table 3: Relationship between security environment and security objectives...............................................30
Table 4: List of auditable events....................................................................................................................34
Table 5: List of cryptographic key generation................................................................................................39
Table 6: List of cryptographic operations.......................................................................................................39
Table 7: List of subjects, objects, and operations among subjects and objects..............................................40
Table 8: Subjects, objects and security attributes...........................................................................................40
Table 9: Rules governing access....................................................................................................................40
Table 10: Rules governing access explicitly ..................................................................................................41
Table 11: list of subjects, information and operation.....................................................................................41
Table 12: Security attributes corresponding to subjects or information.........................................................42
Table 13: List of authentication events...........................................................................................................42
Table 14: Lockout release actions..................................................................................................................43
Table 15: Rules for initial association of attributes........................................................................................45
Table 16: Management roles of security attributes.........................................................................................45
Table 17: Characteristics of static attribute initialisation...............................................................................46
Table 18: List of TSF data management.........................................................................................................47
Table 19: List of specifications of Management Functions............................................................................48
Table 20: Services requiring trusted paths.....................................................................................................53
Table 21: TOE security assurance requirements (EAL3)...............................................................................54
Table 22: Relationship between security objectives and functional requirements.........................................55
Table 23: Correspondence of dependencies of TOE security functional requirements..................................60
Table 24: Relationship between TOE security functional requirements and TOE Security Functions..........63
Table 25: Auditable events and auditable information...................................................................................65
Table 26: User roles and authentication methods...........................................................................................67
Table 27: Unlocking administrators for each user role..................................................................................68
Table 28: Default value for document data ACL...........................................................................................69
Table 29: Operations of document data ACL and authorised users................................................................70
Table 30: Access to administrator information...............................................................................................71
Table 31: Authorised operations on general user information........................................................................72
Table 32: Administrators authorised to specify machine control data............................................................73
Table 33: List of encryption operations on data stored on the HDD..............................................................74
Table 34: Specific terms used in this ST........................................................................................................77