Page 3 of 87
3.1 Threats .........................................................................................................................31
3.2 Organisational Security Policies.................................................................................. 32
3.3 Assumptions................................................................................................................. 32
4
Security Objectives.............................................................................................................. 34
4.1 Security Objectives for TOE......................................................................................... 34
4.2 Security Objectives of Operational Environment........................................................ 35
4.2.1 IT Environment .......................................................................................................35
4.2.2 Non-IT Environment ...............................................................................................36
4.3 Security Objectives Rationale...................................................................................... 37
4.3.1 Correspondence Table of Security Objectives.........................................................37
4.3.2 Security Objectives Descriptions ............................................................................38
5
Extended Components Definition....................................................................................... 42
5.1 Restricted forwarding of data to external interfaces (FPT_FDI_EXP) ....................... 42
6
Security Requirements........................................................................................................ 44
6.1 Security Functional Requirements.............................................................................. 44
6.1.1 Class FAU: Security audit.......................................................................................44
6.1.2 Class FCS: Cryptographic support .........................................................................47
6.1.3 Class FDP: User data protection ............................................................................48
6.1.4 Class FIA: Identification and authentication.........................................................52
6.1.5 Class FMT: Security management..........................................................................55
6.1.6 Class FPT: Protection of the TSF............................................................................61
6.1.7 Class FTA: TOE access............................................................................................61
6.1.8 Class FTP: Trusted path/channels..........................................................................62
6.2 Security Assurance Requirements............................................................................... 62
6.3 Security Requirements Rationale................................................................................ 63
6.3.1 Tracing .....................................................................................................................63
6.3.2 Justification of Traceability.....................................................................................64
6.3.3 Dependency Analysis...............................................................................................70
6.3.4 Security Assurance Requirements Rationale.........................................................72
7
TOE Summary Specification............................................................................................... 73
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.