Page 3 of 91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
3.1 Threats .........................................................................................................................34
3.2 Organisational Security Policies.................................................................................. 35
3.3 Assumptions................................................................................................................. 35
4
Security Objectives.............................................................................................................. 37
4.1 Security Objectives for TOE......................................................................................... 37
4.2 Security Objectives of Operational Environment........................................................ 38
4.2.1 IT Environment .......................................................................................................38
4.2.2 Non-IT Environment ...............................................................................................39
4.3 Security Objectives Rationale...................................................................................... 40
4.3.1 Correspondence Table of Security Objectives.........................................................40
4.3.2 Security Objectives Descriptions ............................................................................41
5
Extended Components Definition....................................................................................... 45
5.1 Restricted forwarding of data to external interfaces (FPT_FDI_EXP) ....................... 45
6
Security Requirements........................................................................................................ 47
6.1 Security Functional Requirements.............................................................................. 47
6.1.1 Class FAU: Security audit.......................................................................................47
6.1.2 Class FCS: Cryptographic support .........................................................................50
6.1.3 Class FDP: User data protection ............................................................................51
6.1.4 Class FIA: Identification and authentication.........................................................56
6.1.5 Class FMT: Security management..........................................................................59
6.1.6 Class FPT: Protection of the TSF............................................................................65
6.1.7 Class FTA: TOE access............................................................................................66
6.1.8 Class FTP: Trusted path/channels..........................................................................66
6.2 Security Assurance Requirements............................................................................... 66
6.3 Security Requirements Rationale................................................................................ 67
6.3.1 Tracing .....................................................................................................................67
6.3.2 Justification of Traceability.....................................................................................69
6.3.3 Dependency Analysis...............................................................................................75
6.3.4 Security Assurance Requirements Rationale.........................................................77
7
TOE Summary Specification............................................................................................... 78
7.1 Audit Function ............................................................................................................. 78
7.2 Identification and Authentication Function ................................................................ 80