Page 4 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
3.3 Assumptions.....................................................................................................26
4 Security Objectives ..................................................................................................27
4.1 Security Objectives for TOE...............................................................................27
4.2 Security Objectives of Operational Environment..................................................28
4.3 Security Objectives Rationale.............................................................................28
4.3.1 Tracing.........................................................................................................................................28
4.3.2 Tracing Justification................................................................................................................29
5 Extended Components Definition..............................................................................32
6 Security Requirements.............................................................................................33
6.1 Security Functional Requirements......................................................................33
6.1.1 Class FAU: Security audit.....................................................................................................33
6.1.2 Class FCS: Cryptographic support.....................................................................................38
6.1.3 Class FDP: User data protection.........................................................................................39
6.1.4 Class FIA: Identification and Authentication.................................................................42
6.1.5 Class FMT: Security management......................................................................................44
6.1.6 Class FPT: Protection of the TSF........................................................................................51
6.1.7 Class FTP: Trusted path/channels......................................................................................51
6.2 Security Assurance Requirements.......................................................................53
6.3 Security Requirements Rationale........................................................................54
6.3.1 Tracing.........................................................................................................................................54
6.3.2 Justification of Traceability..................................................................................................55
6.3.3 Dependency Analysis...............................................................................................................59
6.3.4 Security Assurance Requirements Rationale..................................................................61
7 TOE Summary Specification.....................................................................................62
7.1 TOE Security Function......................................................................................62
7.1.1 SF.AUDIT Audit Function..................................................................................................63
7.1.1.1 Generation of Audit Logs...............................................................................................63
7.1.1.2 Reading Audit Logs .........................................................................................................65
7.1.1.3 Protection of Audit Logs.................................................................................................65
7.1.1.4 Time Stamps......................................................................................................................65
7.1.2 SF.I&A User Identification and Authentication Function........................................65
7.1.2.1 User Identification and Authentication....................................................................66
7.1.2.2 Actions in Event of Identification and Authentication Failure.........................66