Xerox  Multi-Function Device Security Target 
 
34 
Copyright
 2013 Xerox Corporation. All rights reserved. 
The following actions could be considered for the management functions in 
FMT: 
a)  definition  of the role(s) that are allowed to perform the  management 
activities; 
b)  management of the conditions  under which direct forwarding can be 
allowed by an administrative role; 
c)  revocation of such an allowance. 
Audit:  FPT_FDI_EXP.1 
The following actions should be auditable if FAU_GEN Security Audit Data 
Generation is included in the PP/ST: 
a)  There are no auditable events foreseen. 
Rationale: 
Quite often a TOE is supposed to perform specific checks and process data 
received on one external interface before such (processed) data is allowed to 
be transferred to  another external interface.  Examples are  firewall systems 
but also other systems that require a specific work flow for the incoming data 
before  it  can  be  transferred.  Direct  forwarding  of  such  data  (i.e.  without 
processing the data first) between different external interfaces is therefore a 
function that – if allowed at all – can only be allowed by an authorized role. 
It has been viewed as useful to have this functionality as a single component 
that allows specifying the property to disallow direct forwarding and require 
that only an authorized role can allow this. Since this is a function that is quite 
common for a number of products, it has been viewed as useful to define an 
extended component. 
The Common Criteria defines attribute-based control of user data flow in its 
FDP class. However, in this Security Target, the authors needed to express 
the control of both user data and TSF data flow using administrative control 
instead  of  attribute-based  control.  It  was  found  that  using  FDP_IFF  and 
FDP_IFC  for  this  purpose  resulted  in  SFRs  that  were  too  unwieldy  for 
refinement in a Security Target. Therefore, the authors decided to define an 
extended component to address this functionality. 
This extended component protects both user data and TSF data, and could 
therefore be placed in either the FDP or FPT class. Since its purpose is to 
protect  the  TOE  from  misuse,  the  authors  believed  that  it  was  most 
appropriate to place it in the FPT class. It did not fit well in any of the existing 
families in either class, and this lead the authors to define a new family with 
just one member. 
FPT_FDI_EXP.1  Restricted forwarding of data to external interfaces 
Hierarchical to:  No other components. 
Dependencies:  FMT_SMF.1  Specification  of  Management  Functions 
FMT_SMR.1 Security roles.