Page 5 of 93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
List of Figures
Figure 1 : Example of TOE Environment .......................................................................................................9
Figure 2 : Hardware Configuration of the TOE ............................................................................................12
Figure 3 : Logical Scope of the TOE ............................................................................................................ 20
List of Tables
Table 1 : Identification Information of TOE ...................................................................................................7
Table 2 : Guidance for English Version-1 .....................................................................................................14
Table 3 : Guidance for English Version-2 .....................................................................................................15
Table 4 : Guidance for English Version-3 .....................................................................................................16
Table 5 : Guidance for English Version-4 .....................................................................................................17
Table 6 : Definition of Users.........................................................................................................................18
Table 7 : List of Administrative Roles ..........................................................................................................18
Table 8 : Definition of User Data..................................................................................................................25
Table 9 : Definition of TSF Data...................................................................................................................25
Table 10 : Specific Terms Related to This ST...............................................................................................26
Table 11 : Rationale for Security Objectives.................................................................................................41
Table 12 : List of Auditable Events...............................................................................................................49
Table 13 : List of Cryptographic Key Generation.........................................................................................52
Table 14 : List of Cryptographic Operation ..................................................................................................52
Table 15 : List of Subjects, Objects, and Operations among Subjects and Objects (a).................................53
Table 16 : List of Subjects, Objects, and Operations among Subjects and Objects (b).................................53
Table 17 : Subjects, Objects and Security Attributes (a)...............................................................................54
Table 18 : Rules to Control Operations on Document Data and User Jobs (a) ............................................. 54
Table 19 : Additional Rules to Control Operations on Document Data and User Jobs (a)............................55
Table 20 : Subjects, Objects and Security Attributes (b)...............................................................................56
Table 21 : Rule to Control Operations on MFP Applications (b)..................................................................56
Table 22 : List of Authentication Events of Basic Authentication.................................................................57
Table 23 : List of Actions for Authentication Failure....................................................................................57
Table 24 : List of Security Attributes for Each User That Shall Be Maintained ........................................... 58
Table 25 : Rules for Initial Association of Attributes....................................................................................60
Table 26 : User Roles for Security Attributes (a) ..........................................................................................61
Table 27 : User Roles for Security Attributes (b)..........................................................................................62
Table 28 : Authorised Identified Roles Allowed to Override Default Values................................................63
Table 29 : List of TSF Data...........................................................................................................................64
Table 30 : List of Specification of Management Functions...........................................................................65
Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2)....................................................68
Table 32 : Relationship between Security Objectives and Functional Requirements ................................... 69
Table 33 : Results of Dependency Analysis of TOE Security Functional Requirements..............................77
Table 34 : List of Audit Events......................................................................................................................80
Table 35 : List of Audit Log Items................................................................................................................81