ZXR10M6000&T8000&8900ESecurityTarget
isalsoclearsincetheSecurityObjectivesfortheOperationalenvironmentaresimply
arestatementoftheapplicableassumption,thateachobjectiveissuitabletomeetits
correspondingassumption.
Table7-2MappingofAssumptionstoSecurityObjectivesfortheOperationalEnvironment
OE.NO_EVIL&TR-
AIN
OE.CONNECTIVITYOE.PHYSICALOE.TIMESOE.USERS
A.NO_EVIL&TR-
AIN
×
A.CONNECTIVITY×
A.PHYSICAL×
A.TIMES×
P .USERS×
7.2SECURITYREQUIREMENTSRATIONALE
7.2.1RationaleforTOEsecurityfunctionalrequirements
Thefollowingtableprovidesthecorrespondencemappingbetweensecurityobjectivesfor
theTOEandtherequirementsthatsatisfythem.
Table7-3MappingofSecurityFunctionalRequirementstoTOESecurityObjectives
O.AUDIT_RE-
VIEW
O.MANAGEO.IDAUTHO.MEDIATEO.TOE_AC-
CESS
O.ROUTE
FAU_GEN.1×
FAU_GEN.2×
FAU_SAR.1×
FAU_STG.1×
FAU_STG.4×
FDP_IFC.1(1)×
FDP_IFF.1(1)×
FDP_IFC.1(2)×
FDP_IFF.1(2)×
FDP_UIT.1×
FIA_AFL.1×
FIA_SOS.1×
FIA_UAU.2×
7-2
SJ-20110815105844-030|2011/08/19(R1.6)ZTECORPORATION