EasyManua.ls Logo

Zte ZXR10 M6000 Series - Table 7-2 Mapping of Assumptions to Security Objectives for the Operational Environment; Table 7-3 Mapping of Security Functional Requirements to TOE Security Objectives; Security Requirements Rationale; Rationale for TOE Security Functional Requirements

Zte ZXR10 M6000 Series
57 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZXR10M6000&T8000&8900ESecurityTarget
isalsoclearsincetheSecurityObjectivesfortheOperationalenvironmentaresimply
arestatementoftheapplicableassumption,thateachobjectiveissuitabletomeetits
correspondingassumption.
Table7-2MappingofAssumptionstoSecurityObjectivesfortheOperationalEnvironment
OE.NO_EVIL&TR-
AIN
OE.CONNECTIVITYOE.PHYSICALOE.TIMESOE.USERS
A.NO_EVIL&TR-
AIN
×
A.CONNECTIVITY×
A.PHYSICAL×
A.TIMES×
P .USERS×
7.2SECURITYREQUIREMENTSRATIONALE
7.2.1RationaleforTOEsecurityfunctionalrequirements
Thefollowingtableprovidesthecorrespondencemappingbetweensecurityobjectivesfor
theTOEandtherequirementsthatsatisfythem.
Table7-3MappingofSecurityFunctionalRequirementstoTOESecurityObjectives
O.AUDIT_RE-
VIEW
O.MANAGEO.IDAUTHO.MEDIATEO.TOE_AC-
CESS
O.ROUTE
FAU_GEN.1×
FAU_GEN.2×
FAU_SAR.1×
FAU_STG.1×
FAU_STG.4×
FDP_IFC.1(1)×
FDP_IFF.1(1)×
FDP_IFC.1(2)×
FDP_IFF.1(2)×
FDP_UIT.1×
FIA_AFL.1×
FIA_SOS.1×
FIA_UAU.2×
7-2
SJ-20110815105844-030|2011/08/19R1.6ZTECORPORATION

Table of Contents

Related product manuals