Page 2 of 82
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1 ST Introduction....................................................................................7
1.1 ST Reference..................................................................................7
1.2 TOE Reference................................................................................7
1.3 TOE Overview................................................................................9
1.3.1 TOE Type....................................................................................................9
1.3.2 TOE Usage and Major Security Features of TOE............................................9
1.3.3 Environment for TOE Usage and Non-TOE Configuration Items....................10
1.4 TOE Description.............................................................................12
1.4.1 Physical Boundary of TOE..........................................................................12
1.4.2 Guidance Documents..................................................................................15
1.4.3 User Roles.................................................................................................17
1.4.3.1 Responsible Manager of MFP................................................................17
1.4.3.2 Administrator......................................................................................17
1.4.3.3 Supervisor...........................................................................................17
1.4.3.4 General User.......................................................................................18
1.4.3.5 Customer Engineer..............................................................................18
1.4.4 Logical Boundaries of TOE..........................................................................18
1.4.4.1 Basic Functions...................................................................................19
1.4.4.2 Security Functions...............................................................................21
1.4.5 Protected Assets.........................................................................................25
1.4.5.1 Document Data....................................................................................25
1.4.5.2 Print Data...........................................................................................25
2 Conformance Claim ..............................................................................26
2.1 CC Conformance Claim.....................................................................26
2.2 PP Claims, Package Claims................................................................26
2.3 Conformance Rationale.....................................................................26
3 Security Problem Definitions...................................................................27
3.1 Threats.......................................................................................27
3.2 Organisational Security Policies...........................................................27