Xerox  Multi-Function Device Security Target 
 
43 
Copyright
 2013 Xerox Corporation. All rights reserved. 
FAU_STG.1.2:  The  TSF  shall  be  able  to  prevent  unauthorized 
modifications to the stored audit records in the audit trail. 
6.3.1.4.  FAU_STG.4  Prevention of audit data loss 
Hierarchical to:  FAU_STG.3. 
Dependencies:  FAU_STG.1 Protected audit trail storage 
FAU_STG.4.1:  The TSF  shall overwrite the oldest stored audit  records 
and [generate an email warning at 90%] if the audit trail is 
full. 
6.3.2.  Class FCO: Communication 
There are no Class FCO security functional requirements for this ST. 
6.3.3.  Class FCS: Cryptographic support 
6.3.3.1.  FCS_COP.1  Cryptographic operation 
Hierarchical to:   No other components. 
Dependencies:  [FDP_ITC.1  Import  of  user  data  without  security 
attributes, or 
  FDP_ITC.2 Import of user data with security attributes, or  
  FCS_CKM.1 Cryptographic key generation]  
  FCS_CKM.4 Cryptographic key destruction 
FCS_COP.1.1  The  TSF  shall  perform  [the  cryptographic  operations 
listed  in  the  Cryptographic  Operations  column  of  Table 
25]  in  accordance  with  a  specified  cryptographic 
algorithm  [the  cryptographic  algorithms  listed  in  the 
Cryptographic  Algorithm  column  of  Table  25]  and 
cryptographic  key  sizes  [the  cryptographic  key  sizes 
listed  in  the  Key  Sizes  (bits)  column  of  Table  25]  that 
meet the following: [the list of standards in the Standards 
column of Table 25]. 
Table 25: Cryptographic operations 
Symmetric encryption and 
decryption 
FIPS 46-3 (cert #826 
and #1174) 
FIPS 197 (cert #1131 
and #1821)