Xerox  Multi-Function Device Security Target 
 
5 
Copyright
 2013 Xerox Corporation. All rights reserved. 
List of Figures 
FIGURE 1: XEROX WORKCENTRE 5845/5855/5865/5875/5890 ...................................................................... 7 
FIGURE 2: XEROX WORKCENTRE 7220/7225 .................................................................................................. 8 
FIGURE 3: XEROX WORKCENTRE 7830/7835/7845/7855 ............................................................................... 8 
FIGURE 4: XEROX COLORQUBE 9301/9302/9303 ........................................................................................... 8 
 
 
List of Tables 
TABLE 1: ST AND TOE IDENTIFICATION ............................................................................................................. 6 
TABLE 2: MODELS AND CAPABILITIES ............................................................................................................... 9 
TABLE 3: EVALUATED SOFTWARE VERSION ...................................................................................................... 11 
TABLE 4: SYSTEM USER AND ADMINISTRATOR GUIDANCE .................................................................................. 11 
TABLE 5: IEEE STD. 2600.2-2009 COMMON SFR AUGMENTATIONS .................................................................. 17 
TABLE 6: IEEE STD. 2600.2-2009 PACKAGE AUGMENTATIONS .......................................................................... 18 
TABLE 7: USERS ......................................................................................................................................... 19 
TABLE 8: USER DATA .................................................................................................................................. 20 
TABLE 9: TSF DATA .................................................................................................................................... 20 
TABLE 10: TSF DATA CATEGORIZATION .......................................................................................................... 20 
TABLE 11: SFR PACKAGE FUNCTIONS FOR IEEE STD. 2600.2-2009 ................................................................... 21 
TABLE 12: ASSUMPTIONS FOR THE TOE ......................................................................................................... 22 
TABLE 13: THREATS TO USER DATA ................................................................................................................ 23 
TABLE 14: THREATS TO TSF DATA ................................................................................................................. 23 
TABLE 15: ORGANIZATIONAL SECURITY POLICIES.............................................................................................. 24 
TABLE 16: SECURITY OBJECTIVES FOR THE TOE ................................................................................................ 25 
TABLE 17: SECURITY OBJECTIVES FOR THE IT ENVIRONMENT ............................................................................... 26 
TABLE 18: SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT ....................................................................... 27 
TABLE 19: COMPLETENESS OF SECURITY OBJECTIVES ......................................................................................... 28 
TABLE 20: SUFFICIENCY OF SECURITY OBJECTIVES ............................................................................................. 28 
TABLE 21: USER ACCESS CONTROL SFP .......................................................................................................... 37 
TABLE 22: ATTRIBUTES DEFINITION ................................................................................................................ 38 
TABLE 23: TOE SECURITY FUNCTIONAL REQUIREMENTS ..................................................................................... 40 
TABLE 24: AUDIT DATA REQUIREMENTS .......................................................................................................... 42 
TABLE 25: CRYPTOGRAPHIC OPERATIONS ........................................................................................................ 43 
TABLE 26: CRYPTOGRAPHIC KEY GENERATION .................................................................................................. 44 
TABLE 27: CRYPTOGRAPHIC KEY DISTRIBUTION ................................................................................................. 45 
TABLE 28: IEEE 2600.2 SECURITY ASSURANCE REQUIREMENTS ........................................................................... 56 
TABLE 29: COMPLETENESS OF SECURITY FUNCTIONAL REQUIREMENTS ................................................................... 58 
TABLE 30: SUFFICIENCY OF SECURITY FUNCTIONAL REQUIREMENTS ....................................................................... 59 
TABLE 31: SFR DEPENDENCIES SATISFIED ........................................................................................................ 65 
TABLE 32: EAL2 (AUGMENTED WITH ALC_FLR.3) SAR DEPENDENCIES SATISFIED .................................................. 67 
TABLE 33: ACRONYMS ................................................................................................................................. 81