Page 3 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1 ST Introduction.........................................................................................................7
1.1 ST Reference.......................................................................................................7
1.2 TOE Reference....................................................................................................7
1.3 TOE Overview....................................................................................................8
1.3.1 TOE Type.......................................................................................................................................8
1.3.2 TOE Usage and Major Security Features of TOE.............................................................8
1.3.3 Environment for TOE Usage and Non-TOE Configuration Items...............................8
1.4 TOE Description...............................................................................................10
1.4.1 Physical Boundaries of TOE.................................................................................................10
1.4.2 Guidance Documents..............................................................................................................13
1.4.3 User Roles...................................................................................................................................15
1.4.3.1 Responsible Manager of MFP......................................................................................15
1.4.3.2 Administrator....................................................................................................................15
1.4.3.3 Supervisor..........................................................................................................................15
1.4.3.4 General User.....................................................................................................................15
1.4.3.5 Customer Engineer..........................................................................................................16
1.4.4 Logical Boundaries of TOE....................................................................................................16
1.4.4.1 Basic Functions ................................................................................................................16
1.4.4.2 Security Functions...........................................................................................................18
1.4.5 Protected Assets........................................................................................................................22
1.4.5.1 Document Data.................................................................................................................22
1.4.5.2 Print Data..........................................................................................................................22
2 Conformance Claims ................................................................................................24
2.1 CC Conformance Claim......................................................................................24
2.2 PP Claims, Package Claims................................................................................24
2.3 Conformance Rationale......................................................................................24
3 Security Problem Definitions....................................................................................25
3.1 Threats............................................................................................................25
3.2 Organisational Security Policies.........................................................................25