Xerox  Multi-Function Device Security Target 
 
4 
Copyright
 2013 Xerox Corporation. All rights reserved. 
6.3.4.  Class FDP: User data protection ..................................................................................... 45 
6.3.5.  Class FIA: Identification and authentication .................................................................. 48 
6.3.6.  Class FMT: Security management .................................................................................. 50 
6.3.7.  Class FPR: Privacy ........................................................................................................... 54 
6.3.8.  Class FPT: Protection of the TSF ..................................................................................... 54 
6.3.9.  Class FTA: TOE access ..................................................................................................... 55 
6.3.10.  Class FTP: Trusted paths/channels ............................................................................ 55 
6.4.  EXPLICITLY STATED REQUIREMENTS FOR THE TOE .......................................................................... 56 
6.4.1.  FPT_FDI_EXP.1 Restricted forwarding of data to external interfaces ............................ 56 
6.5.  TOE SECURITY ASSURANCE REQUIREMENTS ................................................................................. 56 
6.6.  RATIONALE FOR SECURITY FUNCTIONAL REQUIREMENTS ................................................................. 57 
6.7.  RATIONALE FOR SECURITY ASSURANCE REQUIREMENTS ................................................................... 64 
6.8.  RATIONALE FOR DEPENDENCIES .................................................................................................. 65 
6.8.1.  Security Functional Requirement Dependencies ............................................................ 65 
6.8.2.  Security Assurance Requirement Dependencies ............................................................ 67 
7.  TOE SUMMARY SPECIFICATION .......................................................................... 69 
7.1.  TOE SECURITY FUNCTIONS ........................................................................................................ 69 
7.1.1.  Image Overwrite (TSF_IOW) .......................................................................................... 69 
7.1.2.  Information Flow Security (TSF_FLOW) .......................................................................... 70 
7.1.3.  Authentication (TSF_ AUT) ............................................................................................. 71 
7.1.4.  Network Identification (TSF_NET_ID) ............................................................................. 71 
7.1.5.  Security Audit (TSF_FAU) ................................................................................................ 72 
7.1.6.  Cryptographic Operations (TSF_FCS) ............................................................................. 72 
7.1.7.  User Data Protection – Disk Encryption (TSF_FDP_UDE) ............................................... 73 
7.1.8.  User Data Protection – IP Filtering (TSF_FDP_FILTER) ................................................... 73 
7.1.9.  Network Security (TSF_NET_SEC) ................................................................................... 73 
7.1.10.  Security Management (TSF_FMT) ............................................................................. 73 
8.  GLOSSARY.............................................................................................................. 77 
9.  ACRONYMS ............................................................................................................. 81 
10.  BIBLIOGRAPHY ...................................................................................................... 83