Page 6 of 80
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
List of Figures
Figure 1: Example TOE environment..............................................................................................................9
Figure 2: Hardware configuration of TOE.....................................................................................................11
Figure 3: Logical boundaries of TOE.............................................................................................................16
List of Tables
Table 1: List of administrator roles................................................................................................................15
Table 2: Correspondence between operations authorised by permissions to process document data............20
Table 3: Relationship between security environment and security objectives...............................................29
Table 4: List of auditable events....................................................................................................................33
Table 5: List of cryptographic key generation................................................................................................38
Table 6: List of cryptographic operations.......................................................................................................38
Table 7: List of subjects, objects, and operations among subjects and objects..............................................39
Table 8: Subjects, objects and security attributes...........................................................................................39
Table 9: Rules governing access ....................................................................................................................40
Table 10: Rules governing access explicitly ..................................................................................................40
Table 11: List of subjects, information and operation....................................................................................41
Table 12: Security attributes corresponding to subjects or information.........................................................41
Table 13: List of authentication events...........................................................................................................42
Table 14: Lockout release actions..................................................................................................................42
Table 15: Rules for initial association of attributes........................................................................................44
Table 16: Management roles of security attributes.........................................................................................45
Table 17: Characteristics of static attribute initialisation...............................................................................46
Table 18: List of TSF data management.........................................................................................................46
Table 19: List of specifications of Management Functions............................................................................48
Table 20: Services requiring trusted paths.....................................................................................................52
Table 21: TOE security assurance requirements (EAL3)...............................................................................53
Table 22: Relationship between security objectives and functional requirements.........................................54
Table 23: Correspondence of dependencies of TOE security functional requirements..................................59
Table 24: Relationship between TOE security functional requirements and TOE Security Functions..........62
Table 25: Auditable events and auditable information...................................................................................64
Table 26: User roles and authentication methods...........................................................................................66
Table 27: Unlocking administrators for each user role..................................................................................67
Table 28: Default value for document data ACL...........................................................................................68
Table 29: Operations of document data ACL and authorised users................................................................69
Table 30: Access to administrator information...............................................................................................70
Table 31: Authorised operations on general user information........................................................................71
Table 32: Administrators authorised to specify machine control data............................................................72
Table 33: List of encryption operations on data stored on the HDD..............................................................73
Table 34: Specific terms used in this ST........................................................................................................76