EasyManua.ls Logo

Xerox WorkCentre 5875 User Manual

Xerox WorkCentre 5875
83 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Document Version 2.0, Revision 2.0
Xerox Multi-Function Device
Security Target
WorkCentre 5845, 5855, 5865, 5875,
5890, 7220, 7225, 7830, 7835, 7845, 7855
& ColorQube 9301, 9302, 9303
Prepared by:
Xerox Corporation
Computer Sciences Corporation
800 Phillips Road
7231 Parkway Drive
Webster, New York 14580
Hanover, Maryland 21076

Table of Contents

Other manuals for Xerox WorkCentre 5875

Question and Answer IconNeed help?

Do you have a question about the Xerox WorkCentre 5875 and is the answer not in the manual?

Xerox WorkCentre 5875 Specifications

General IconGeneral
FunctionsPrint, Copy, Scan, Fax
Print Resolution1200 x 1200 dpi
Monthly Duty Cycle300, 000 pages
Duplex PrintingYes
Scan Resolution600 x 600 dpi
Memory (Standard)2 GB
Hard Drive160 GB
Print Speed (Black)75 pages per minute
Maximum Paper Capacity4, 700 sheets
Scan Speed (Black)200 images per minute
Scan Speed (Color)200 images per minute
ConnectivityUSB 2.0, 10/100/1000Base-T Ethernet
Control PanelTouchscreen
Processor1.2 GHz
Operating System CompatibilityWindows, Mac, Linux

Summary

Introduction

ST and TOE Identification

Identifies the Security Target and Target of Evaluation details for CC evaluation.

TOE Overview

Describes the Target of Evaluation, its capabilities, and features.

TOE Description

Details the physical and logical scope of the TOE.

Evaluated Configuration

Lists features enabled and not included in the evaluated configuration.

Conformance Claims

Common Criteria Conformance Claims

Claims conformance to Common Criteria version 3.1.

Protection Profile Claims

Claims conformance to the IEEE Standard Protection Profile for Hardcopy Devices.

Package Claims

Claims conformance to EAL2 package and additional packages.

Rationale

Explains rationale for TOE type, SPD, objectives, and requirements.

Security Problem Definition

Definitions

Defines key terms like Users, Objects (Assets), Functions, Operations, and Channels.

Assumptions

Lists conditions assumed to be true for the security objectives and SFRs.

Threats

Identifies threat agents and threats to user and TSF data.

Organizational Security Policies

Outlines organizational security policies applied to the TOE.

Security Objectives

Security Objectives for the TOE

Specifies security objectives the TOE must fulfill.

Security Objectives for the Operational Environment

Lists security objectives for the IT environment supporting the TOE.

Security Objectives for the Non-IT Environment

Lists security objectives for non-IT methods in the TOE environment.

Rationale for Security Objectives

Demonstrates how objectives mitigate threats, enforce policies, and uphold assumptions.

Extended Components Definition

FPT_FDI_EXP Restricted forwarding of data to external interfaces

Defines requirements to restrict data forwarding between external interfaces.

Security Requirements

Conventions

Defines conventions used for identifying SFRs and SARs.

TOE Security Policies

Defines security policies enforced by the TSF.

Security Functional Requirements

Details the security functions the TOE must perform.

Explicitly Stated Requirements for the TOE

Lists specific requirements not covered by standard CC classes.

TOE Security Assurance Requirements

Lists security assurance requirements from IEEE Std. 2600.2 and EAL2+.

Rationale for Security Functional Requirements

Provides rationale for completeness and sufficiency of SFRs.

Rationale for Security Assurance Requirements

Explains rationale for the chosen security assurance requirements and EAL level.

Rationale for Dependencies

Cross-references SFR dependencies and their satisfaction status.

TOE Summary Specification

TOE Security Functions

Overviews the security functions performed by the TOE.

Image Overwrite (TSF_IOW)

Details the image overwrite security function for temporary files.

Information Flow Security (TSF_FLOW)

Describes how the TOE controls data flow via network interfaces.

Authentication (TSF_AUT)

Explains the role-based access control and authentication mechanisms.

Network Identification (TSF_NET_ID)

Covers configuration for external identity servers for network authentication.

Security Audit (TSF_FAU)

Describes the generation, availability, and storage of audit logs.

Cryptographic Operations (TSF_FCS)

Details cryptographic operations like encryption, signing, and key establishment.

User Data Protection – Disk Encryption (TSF_FDP_UDE)

Explains the use of AES encryption for temporary user data on the hard disk.

User Data Protection – IP Filtering (TSF_FDP_FILTER)

Describes the configuration of network traffic filtering rules.

Network Security (TSF_NET_SEC)

Covers support for secure communication protocols like TLS, SFTP, and IPsec.

Security Management (TSF_FMT)

Outlines how security functions and attributes are managed by administrators.

Controlling Access to MFD Functions

Explains role-based access control for MFD functions.

Copy

Details how copy operations are performed and controlled.

Print

Describes submission and control of print jobs, including secure print.

Scan

Explains scan operations, mailbox access, and image transfer.

Fax

Covers fax submission, reception, and forwarding processes.

Self Test

Describes self-test procedures for verifying TOE integrity.

Related product manuals