Table 27: Management of security attributes ...................................................... 75
Table 28: Access Control .................................................................................. 76
Table 29: Details of Security Audit Log Data ....................................................... 80
iii
Dell C7765dn Security Target
1. ST INTRODUCTION
This chapter describes Security Target (ST) Reference, TOE Reference, TOE Overview, and TOE
Description.
1.1. ST Reference
This section provides information needed to identify this ST.
ST Title: Dell C7765dn Color Multifunction Printer Security Target
ST Version: V 1.1.3
Publication Date: September 8, 2014
Author: Fuji Xerox Co., Ltd.
1.2. TOE Reference
This section provides information needed to identify this TOE.
The TOE is C7765dn Color Multifunction Printer.
The TOE is identified by the following TOE name and ROM versions.
TOE
Identification:
Version:
Manufacturer: Fuji Xerox Co., Ltd.
Dell C7765dn Color Multifunction Printer
Controller ROM Ver. 2.205.5
IOT ROM Ver. 41.1.0
ADF ROM Ver. 12.5.0
1.3. TOE Overvi ew
1.3.1. TOE Type and Major Security Features
1.3.1.1. TOE Type
This TOE, categorized as an IT product, is the Dell C7765dn Color Multifunction Printer (hereinafter
referred to as “MFD”) which has the copy, print, scan, and fax functions.
The TOE is the product which controls the whole MFD and protects the following against threats:
The document data stored on the internal HDD, the used document data, the security audit log data,
the document data exists on the internal network between the TOE and the remote, and the TOE
setting data.
1.3.1.2.
Table 1 shows the function types and functions provided by the TOE.
Function Types
- 1 -
Dell C7765dn Security Target
Table 1: Function Types and Functions Provided by the TOE
Function types Functions provided by the TOE
- Control Panel
- Copy
- Print
- Scan
Basic Function
- Network Scan
- Fax
- Direct Fax (with local authentication only)
- Internet Fax
- Remote Configuration
- Hard Disk Data Overwrite
- Hard Disk Data Encryption
- User Authentication
- Administrator’s Security Management
Security Function
- Customer Engineer Operation Restriction
- Security Audit Log
- Internal Network Data Protection
- Fax Flow Security
- Self Test
・Optional Fax board (out of the TOE boundary) is required to use Fax, Direct Fax, Internet Fax,
and Fax Flow Security functions.
・To use print, scan, and Direct Fax functions, the following items shall be installed to the
external client for general user and that for system administrator: printer driver, Network Scan
Utility, and fax driver.
・There are two types of user authentication, local authentication and remote authentication, and
the TOE behaves with either one of the authentication types depending on the setting.
In this ST, the difference of the TOE behavior is described if the TOE behaves differently
depending on the type of authentication being used. Unless specified, the behavior of the TOE
is the same for both authentication types.
There are two types of Remote Authentication: LDAP Authentication and Kerberos
Authentication. To set SA (system administrator privilege) as user role assumption in Kerberos
authentication, LDAP server is also necessary.
・For Kerberos authentication, it is also possible to use Smart Card (CAC/PIV) instead of
authentication from the control panel with an ID and a password. User information and
certificates in Smart Card and an OCSP server are used for authentication.
In the same way as other types of authentication, LDAP server is required for setting SA. For
Smart Card authentication, an optional card reader (not included in TOE) needs to be
connected.
・
- 2 -
Dell C7765dn Security Target
1.3.1.3. Usage and Major Security Features of TOE
The TOE is mainly used to perform the following functions:
・Copy function and Control Panel function are to read the original data from IIT and print them
out from IOT according to the general user’s instruction from the control panel. When more
than one copy of an original data is ordered, the data read from IIT are first stored into the
MFD internal HDD. Then, the stored data are read out from the internal HDD for the required
number of times so that the required number of copies can be made.
・ Print function is to decompose and print out the print data transmitted by a general user client.
・ Configuration Web Tool is to retrieve the document data scanned by MFD from Mailbox.
It also enables a system administrator to refer to and rewrite TOE setting data via Web
browser.
・Scan function and Control Panel function are to read the original data from IIT and store them
into Mailbox within the MFD internal HDD, according to the general user’s instruction from
the control panel.
The stored document data can be retrieved via standard Web browser by using Configuration
Web Tool or Network Scan Utility (with local authentication only).
・Network Scan function and Control Panel function are to read the original data from IIT and
transmit the document data to FTP server, SMB server, or Mail server, according to the
information set in the MFD. This function is operated according to the general user’s
instruction from the control panel.
・Fax function and Control Panel function are to send and receive fax data. According to the
general user’s instruction from the control panel to send a fax, the original data are read from
IIT and then sent to the destination via public telephone line. The document data are received
from the sender’s machine via public telephone line and then printed out from the recipient’s
IOT or stored in Mailbox.
・The Internet Fax function and Control Panel function are to send and receive fax data via the
Internet, not public telephone line.
・The Direct Fax function is to send data from a user client to the destination via public
telephone line (with local authentication only). The data are first sent to MFD as a print job
and then to the destination without being printed out.
The TOE provides the following security features:
(1) Hard Disk Data Overwrite
To completely delete the used document data in the internal HDD, the data are overwritten with
new data after any job of copy, print, scan, etc. is completed.
(2) Hard Disk Data Encryption
The document data and the security audit log data are encrypted before being stored into the
internal HDD when using any function of copy, print, scan, etc. or configuring various security
function settings.
(3) User Authentication
Access to the TOE functions is restricted to the authorized user and this function identifies and
- 3 -
Dell C7765dn Security Target
authenticates users. A user needs to enter his/her ID and password from the fax driver, Network
Scan Utility, or Web browser of the general user client, or MFD control panel.
A user can also use Smart Card authentication (CAC/PIV) for identification and authentication.
(4) System Administrator’s Security Management
This function allows only the system administrator identified and authorized from the control
panel or system administrator client to refer to and change the TOE security function settings.
(5) Customer Engineer Operation Restriction
A system administrator can prohibit CE from referring to and changing the TOE security
function settings.
(6) Security Audit Log
The important events of TOE such as device failure, configuration change, and user operation
are traced and recorded based on when and who used what function.
(7) Internal Network Data Protection
This function protects the communication data on the internal network such as document data,
security audit log data, and TOE setting data. (The following general encryption
communication- protocols are supported: SSL/TLS, IPSec, SNMP v3, and S/MIME.)
(8) Fax Flow Security
This function prevents unauthorized access to the TOE or the internal network via Fax board
from public telephone line.
(9) Self Test
This function verifies the integrity of TSF executable code and TSF data.
1.3.2. Environment Assumptions
This TOE is assumed to be used as an IT product at general office and to be connected to public
telephone line, user clients, and the internal network protected from threats on the external network by
firewall etc.
Figure 1 shows the general environment for TOE operation.
- 4 -
t
Web
owser
r
General
User
System
Administrator
Dell C7765dn Security Target
General User Client
-Printer Driver
-Fax Driver
-Network Scan
Utility
Br
-
System Administrator
Client
-Web Browser
Mail Server
FTP Server
SMB Server
LDAP Server
Kerberos Server
OCSP Server
External
Network
Firewall
Internal
Network
Public
Telephone
Line
USB Media
USB
USB
Fax Board
General User
General User
General User Clien
-Printer Driver
-Fax Driver
USB
TOE
CE
System
Administrator
Card Reade
USB
Figure 1: General Operational Environment
1.3.3. Required Non-TOE Hardware and Software
In the operational environment shown in Figure 1, the TOE (MFD) and the following non-TOE
hardware/software exist.
(1) General user client:
The hardware is a general-purpose PC. When a client is connected to the MFD via the internal
network and when the printer driver, Network Scan Utility, and fax driver are installed to the
client, the general user can request the MFD to print, fax, and retrieve the document data.
The user can also request the MFD to retrieve the scanned document data via Web browser by
using scan function of the MFD. Additionally, the general user can change the settings which
he/she registered to the MFD: Mailbox name, password, access control, and automatic deletion of
- 5 -
Dell C7765dn Security Target
document.
When the client is connected to the MFD directly via USB and printer/fax driver is installed to the
client, the user can request the MFD to print/fax the document data.
(2) System administrator client:
The hardware is a general-purpose PC. A system administrator can refer to and change TOE
setting data via Web browser.
(3) Mail server:
The hardware/OS is a general-purpose PC or server. The MFD sends/receives document data
to/from Mail server via mail protocol.
(4) FTP server:
The hardware/OS is a general-purpose PC or server. The MFD sends document data to FTP server
via FTP.
(5) SMB server:
The hardware/OS is a general-purpose PC or server. The MFD sends document data to SMB
server via SMB.
(6) LDAP server
The hardware/OS is a general-purpose PC or server. The MFD acquires identification and
authentication information from LDAP server via LDAP. In addition, it acquires SA information
of user role assumptions.
(7) Kerberos server
The hardware/OS is a general-purpose PC or server. The MFD acquires identification and
authentication information from Kerberos server via Kerberos.
(8) OCSP Server
The hardware/OS is a general-purpose PC or server.
The MFD retrieves information on revocation status of certificates other than self-signed
certificates from an OCSP server, if the certificate revocation retrieval setting is enabled.
(9) Fax board:
The Fax board is connected to external public telephone line and supports G3 protocols. The
Fax board is connected to the MFD via USB interface to enable sending and receiving of fax.
(10) Card Reader
A card reading device for supporting PKI certification that uses Smart Card (CAC/PIV).
- 6 -
Dell C7765dn Security Target
(11) USB Media
The USB Media is used for printing data stored in the USB Media and for storing scanned data.
The OS of (1) general user client and (2) system administrator client are assumed to be Windows XP,
Windows Vista, and Windows 7.
The (6) LDAP server, (7) Kerberos server, and (8) OCSP server are assumed to be Windows Active
Directory.
The (10) Card Reader is assumed to be SCR331 or SCR3310 v2.0.
- 7 -
Dell C7765dn Security Target
1.4. TOE Description
This section describes user assumptions and logical/physical scope of this TOE.
1.4.1. User Assumptions
Table 2 specifies the roles of TOE users assumed in this ST.
Table 2: User Role Assumptions
User Role Description
Administrator of the
organization
General user A user of TOE functions such as copy, print and fax.
System administrator
(Key operator + System
Administrator Privilege [SA])
Customer engineer (CE)
An administrator or responsible official of the organization which
owns and uses TOE.
A user who is authorized to manage the device using the system
administrator mode. A system administrator can refer to and rewrite
the TOE setting for device operation and that for security functions
via TOE control panel, and Web browser.
A user who can configure the TOE operational settings using the
interface for CE.
1.4.2. Logical Scope and Boundary
The logical scope of this TOE consists of each function of the programs.
Figure 2 shows the logical architecture of the MFD.
- 8 -
Dell C7765dn Security Target
g
r
y
t
g
General User
System
Administrator
ineer
Customer
En
Card Reader
LDAP Server
Kerberos Server
OCSP Server
Fax Board
(Public Telephone
Line)
TOE
Controller ROM
Internal HDD
Used
Document
Data
Control Panel
Use
Authentication
System
Administrator’s
Security
Management
Security
Audit Log
Fax Flow
Securit
Hard Disk Data
Encryption
Hard Disk Data
Overwrite
Self T est
Document
Data
Audit
Log
Data
Remote
Confi
uration
Internal Network
Data Protection
Prin
(Decompose)
Copy
Fax / Direct Fax
/ Internet Fax
Scan / Network
Scan
Customer Engineer
Operation
Restriction
NVRAM/SEEPROM
TOE Setting
Data
Logical Scope
System
Administrator
Client
-Web Browser
General User
Client
- Printer driver
- Fax Driver
- Network Scan
Utility
- Web Browser
FTP Server
SMB Server
Mail Server
USB Media
Other Setting
Data
Figure 2: MFD Units and TOE Logical Scope
1.4.2.1.
Basic Functions
As shown in Table 3, the TOE provides the functions of control panel, copy, print, scan, network scan,
fax, Internet Fax, Direct Fax (with local authentication only), and Remote Configuration to general
user.
Table 3: TOE Basic Functions
Function Description
Control Panel
Function
Control panel function is a user interface function for general user, CE, and
system administrator to operate MFD functions.
Copy Function Copy function is to read the original data from IIT and print them out from
- 9 -
Dell C7765dn Security Target
IOT according to the general user’s instruction from the control panel.
When more than one copy of an original is ordered, the data read from IIT
are first stored into the MFD internal HDD. Then, the stored data are read out
from the internal HDD for the required number of times so that the required
number of copies can be made.
Print Function Print function is to print out the data according to the instruction from a
general user client. The print data created via printer driver are sent to the
MFD to be analyzed, decomposed, and printed out from IOT.
The print function is of two types: the normal print in which the data are
printed out from IOT directly after decomposed and the Store Print in which
the bitmap data are temporarily stored in the internal HDD and then printed
out from IOT according to the general user’s instruction from the control
panel.
There is also the function to print data stored in an external USB Media by
designating the data from the control panel.
Scan Function,
Network Scan
Function
Scan function is to read the original data from IIT and then store them into
the internal HDD or an external USB Media according to the general user’s
instruction from the control panel.
A general user can retrieve the stored document data from a general user
client via Configuration Web Tool or Network Scan Utility (with local
authentication only).
Network scan function is to read the original data from IIT and automatically
transmit them to a general user client, FTP server, Mail server, or SMB server
according to the information set in the MFD. A general user can request this
function from the control panel.
Fax Function Fax function is to send and receive fax data. According to the general user’s
instruction from the control panel to send a fax, the original data them read
from IIT and sent to the destination via public telephone line. The document
data are received from the sender’s machine via public telephone line.
Direct Fax (with local
authentication only)
Function,
Internet Fax Function
Direct Fax function is to directly fax document data to the destination.
According to the instruction from a general user client to send a fax, the print
data created via fax driver are sent to the MFD, analyzed, and decomposed.
Then, the data are converted to the format for fax sending and sent to the
destination via public telephone line.
Internet Fax function is to send and receive fax data as in the normal Fax
function. According to the general user’s instruction from the control panel to
send a fax, the original data are read from IIT and sent to the destination via
the Internet. The document data are received from the sender’s machine via
the Internet and printed out from the recipient’s IOT.
Remote
Configuration
Remote Configuration Function enables System Administrator’s Security
Management by which a system administrator can access and rewrite TOE
- 10 -
Dell C7765dn Security Target
Function setting data. For this, a system administrator must be authenticated by his/her
ID and password entered from Web browser of a system administrator client.
In addition remote Configuration function is to retrieve the scanned
document data and the received fax data that are stored in the internal HDD
according to the instruction from Web browser of a general user client.
1.4.2.2.
Security Functions
The security functions provided by the TOE are the following.
(1) Hard Disk Data Overwrite
To completely delete the used document data in the internal HDD, the data are overwritten with
new data after each job (copy, print, scan, Network Scan, Fax, Internet Fax, or Direct Fax) is
completed. Without this function, the used document data remain and only the management data
are deleted.
(2) Hard Disk Data Encryption
Some data such as the security audit log data and the document data in Mailbox remain in the
internal HDD even if the machine is powered off. To solve this problem, the document data and
security audit log data are encrypted before being stored into the internal HDD when operating
any function of copy, print, scan, network scan, fax, Internet Fax, and Direct Fax (with local
authentication only), or configuring various security function settings.
(3) User Authentication
Access to the TOE functions is restricted to the authorized user.
A user needs to enter his/her ID and password from the fax driver, Network Scan Utility, or Web
browser of the general user client, or MFD control panel.
A user can also use Smart Card
authentication on the control panel.
Only the identified and authenticated user can use the following functions:
a) Functions controlled by the MFD control panel:
Copy, fax (send), Internet Fax (send), scan, network scan, Mailbox, and print (This print function
requires the Accounting System preset from printer driver. A user must be authenticated from the
control panel for print job.)
b) Functions controlled by Network Scan Utility of user client(with local authentication only):
Function to retrieve document data from Mailbox
c) Functions controlled by Configuration Web Tool:
Display of device condition, display of job status and its log, function to retrieve document data
from Mailbox, and print function by file designation
Among the above functions which require user authentication, some particularly act as security
functions. The following are the security functions which prevent the unauthorized reading of
- 11 -
Dell C7765dn Security Target
t
r
t
document data in the internal HDD by an attacker who is impersonating an authorized user:
・The Store Print function (Private Print function) and the Mailbox function, which require user
authentication from the control panel or Smart Card.
・The function to retrieve document data from Mailbox (Mailbox function) which requires user
authentication by using Configuration Web Tool or Network Scan Utility (with local
authentication only), and the Store Print function (Private Print function) by file designation
using Configuration Web Tool.
Figure 3 shows the authentication flow of the above functions.
User Client
Printer driver
Web Browse
Network Scan
Utility
(with local authentication
only)
TOE
Classification
Authentication
Authentication
Print Job
Private
Prin
Scanned Data,
Mailbox
Authentication from Control Panel or Smart Card
Prin
Figure 3: Authentication Flow for Private Print and Mailbox
Store Print Function (Private Print Function)
When the MFD is set to “Save as Private Charge Print,” and a user sends a print request from the
printer driver in which the Accounting System is preset, the print data are decomposed into
bitmap data, classified according to the user ID, and temporarily stored in the corresponding
Private Print area within the internal HDD.
In the same way, when a user is authenticated by entering his/her ID and password from
Configuration Web Tool for authentication, and the user sends a print request by designating the
files within a user client, the print data are temporarily stored in Private Print area according to
the user ID.
To refer to the stored print data, a user needs to enter his/her ID and password from the control
- 12 -
Dell C7765dn Security Target
panel or to use Smart Card (CAC/PIV). When the user is authenticated, the data on the waiting
list corresponding to the user ID are displayed. The user can request printing or deletion of the
data on the list.
Mailbox Function
The scanned data and received fax data can be stored into Mailbox from IIT and Fax board which
are not shown in Figure 3.
To store the scanned data into Mailbox, a user needs to enter his/her ID and password from the
control panel or to use Smart Card (CAC/PIV). When the user is authenticated, the document data
can be scanned from IIT and stored into the internal HDD according to the user’s instruction from
the control panel.
To store the received fax data into Mailbox, user authentication is not required. Among the
received fax data transmitted over public telephone line, the following data are automatically
classified and stored into each corresponding Mailbox: the received fax data whose corresponding
Mailbox is specified by the sender, the received fax data from a particular sender (the data are
classified according to the sender’s telephone number), and the received fax data from an
unknown sender.
To retrieve, print, or delete the stored data in the Personal Mailbox corresponding to the each
registered user’s ID, user authentication is required; the MFD compares the user ID and password
preset in the device against those entered by a user from the control panel, Configuration Web
Tool, or Network Scan Utility(with local authentication only). For user authentication, Smart
Card authentication is also available on the control panel.
(4) System Administrator’s Security Management
To grant a privilege to a specific user, this TOE allows only the authenticated system
administrator to access the System Administrator mode which enables him/her to refer to and set
the following security functions from the control panel:
・ Refer to and set Hard Disk Data Overwrite;
・ Refer to and set Hard Disk Data Encryption;
・ Set the cryptographic seed key for Hard Disk Data Encryption;
・ Refer to and set the functions that use password entered from MFD control panel in user
authentication;
・ Set the ID and password of key operator (only a key operator is privileged);
・ Refer to and set the ID of SA / general user, and set the password (with local authentication
only);
・ Refer to and set the access denial when system administrator’s authentication fails;
・ Refer to and set the limit of user password length (for general user and SA) (with local
authentication only);
・ Refer to and set the SSL/TLS communication;
・ Refer to and set the IPSec communication;
・ Refer to and set the S/MIME communication;
- 13 -
Dell C7765dn Security Target
・ Refer to and set the User Authentication;
・ Refer to and set the Store Print;
・ Refer to and set the date and time;
・ Refer to and set the Self Test;
Additionally, this TOE allows only the system administrator, who is authenticated from the
system administrator client via Web browser using Configuration Web Tool, to refer to and set the
following security functions via Configuration Web Tool:
・ Set the ID the password of key operator (only a key operator is privileged);
・ Refer to and set the ID of SA / general user, and set the password (with local authentication
only);
・ Refer to and set the access denial when system administrator’s authentication fails;
・ Refer to and set the limit of user password length (for general user and SA, with local
authentication only);
・ Refer to and set Audit Log;
・ Refer to and set the SSL/TLS communication;
・ Refer to and set the IPSec communication;
・ Refer to and set the SNMPv3 communication;
・ Refer to and set the SNMPv3 authentication password.
・ Refer to and set the S/MIME communication;
・ Create/upload/download an X.509 certificate;
・ Refer to and set the User Authentication;
(5) Customer Engineer Operation Restriction
This TOE allows only the authenticated system administrator to refer to or enable/disable the
Customer Engineer Operation Restriction setting from the control panel and Configuration Web
Tool. For this, CE cannot refer to or change the setting of each function described in (4) System
Administrator’s Security Management.
(6) Security Audit Log
The important events of TOE such as device failure, configuration change, and user operation are
traced and recorded based on when and who operated what function. Only a system administrator
can supervise or analyze the log data by downloading them in the form of tab-delimited text file
via Web browser using Configuration Web Tool. To download the log data, SSL/TLS
communication needs to be enabled.
(7) Internal Network Data Protection
The communication data on the internal network such as document data, security audit log data,
and TOE setting data are protected by the following general encryption communication-protocols:
・ SSL/TLS
・ IPSec
- 14 -
Dell C7765dn Security Target
・ SNMP v3
・ S/MIME
(8) Fax Flow Security
A Fax board is an option and is connected to TOE controller board via USB interface. An attacker
cannot access the TOE or the internal network from public telephone line via the Fax board.
(9) Self Test
The TOE can execute the self test function to verify the integrity of TSF executable code and TSF
data.
1.4.2.3.
Settings for the Secure Operation
System administrator shall set the following to enable security functions in 1.4.2.2.
・Hard Disk Data Overwrite
Set to [Enabled].
・Hard Disk Data Encryption
Set to [Enabled].
・Passcode Entry for Control Panel
Set to [Enabled].
・Access denial when system administrator’s authentication fails
Default [5] Times.
・User Passcode Minimum Length (for general user and SA)
Set to [9] characters
・SSL/TLS
Set to [Enabled]
・IPSec
Set to [Enabled]
・S/MIME
Set to [Enabled]
・User Authentication
Set to [Local Authentication] or [Remote Authentication]
・Store Print
Set to [Save As Private Charge Print]
・Audit Log
Set to [Enabled]
・SNMPv3
Set to [Enabled]
・Customer Engineer Operation Restriction
Set to [Enabled]
- 15 -
・Self Test
Set to [Enabled]
Dell C7765dn Security Target
- 16 -
Dell C7765dn Security Target
(
)
(
)
t
(
)
(
)
r
1.4.3. Physical Scope and Boundary
The physical scope of this TOE is the MFD. Figure 4 shows configuration of each unit and TOE
physical scope.
ADF
ADF
Board
ADF
ROM
IOT
IOT Board
IOT
ROM
IIT
IIT Board
Control Panel buttons, lamps, touch screen panel
Controller Board
Controller ROM
Copy
Scan /
Network
Scan
Print
(decompos
e)
Fax/ Direct
Fax
/Internet
Fax
Remote
Configura
tion
Hard Disk
Data
Overwrite
Hard Disk
Data
Encryption
Fax Flow
Security
System
Administrat
or’s Security
Management
Self T est
CPU
Internal HDD
Control
Customer
Engineer
Operation
Restriction
Security
Audit Log
User_Auth
entication
Network
Protection
Panel
Data
NVRAM
SEEPROM
DRAM
EthernetUSB
device
USB
host
USB
host
System Administrator
General User
CE
System Administrator
Client
General User Client
Mail Server
FTP Server
SMB Server
LDAP Server
Kerberos Server
OCSP Server
General User Clien
USB
Card Reade
USB Media
Fax Board
(Public T elephone Line)
: TOE
Figure 4: MFD Units and TOE Physical Scope
The MFD consists of the PWB units of controller board and control panel, IIT, and IOT,ADF.
The controller board is connected to the control panel via the internal interfaces which transmit
control data, and the controller board is connected to the Fax board, the IIT board, and IOT board via
the internal interfaces which transmit document data and control data.
The controller board is a PWB which controls MFD functions of copy, print, scan, and fax. The board
has a network interface (Ethernet) and local interfaces (USB) and is connected to the IIT board and
- 17 -
Dell C7765dn Security Target
IOT board.
The control panel is a panel on which buttons, lamps, and a touch screen panel are mounted to use and
configure MFD functions of copy, print, scan, and fax.
The IIT (Image Input Terminal) is a device to scan an original and send its data to the controller board
for copy, scan, and fax functions.
The IOT (Image Output Terminal) is a device to output image data which was sent from the controller
board.
The ADF (Auto Document Feeder) is a device to automatically transfer original documents to IIT.
1.4.4. Guidance
The following are the guidance documents for this TOE.
・Dell C7765dn Color Multifunction Printer User’s Guide; KB3206EN0-5
This ST and TOE conform to the following evaluation standards for information security (CC):
Common Criteria for Information Technology Security Evaluation
Part 1: Introduction and general model, Version 3.1 Revision 4 Japanese Version 1.0
Part 2: Security functional components, Version 3.1 Revision 4 Japanese Version 1.0
Part 3: Security assurance components, Version 3.1 Revision 4 Japanese Version 1.0
The security functional requirements of this ST conform to CC Part 2.
The security assurance requirements of this ST conform to CC Part 3.
2.2. PP Claims, Package Claims
2.2.1. PP Claims
There is no applicable Protection Profile.
2.2.2. Package Claims
This ST conforms to EAL3.
2.2.3. Conformance Rationale
There is no applicable PP rationale since this ST does not conform to PP.
- 19 -
Dell C7765dn Security Target
3. SECURITY PROBLEM DEFINITION
This chapter describes the threats, organizational security policies, and the assumptions for the use of
this TOE.
3.1. Threats
3.1.1. Assets Protected by TOE
This TOE protects the following assets (Figure 5):
(1) Right to use MFD functions
The general user’s right to use each function of the TOE is assumed as an asset to be protected.
(2) Document data stored for job processing
When a general user uses MFD functions of copy, print, fax, and scan, the document data are
temporarily stored in the internal HDD for image processing, transmission, and Store Print. The
user can retrieve the stored document data in the MFD from a general user client by
Configuration Web Tool and Network Scan Utility (with local authentication only). The stored
data include general user’s confidential information and are assumed as assets to be protected.
(3) Used document data
When a general user uses MFD functions of copy, print, fax, and scan, the document data are
temporarily stored in the internal HDD for image processing, transmission, and Store Print. When
the jobs are completed or canceled, only the management information is deleted but the data itself
remains. The residual data include general user’s confidential information and are assumed as
assets to be protected.
(4) Security audit log data
In the function of Security Audit Log, the important events such as device failure, configuration
change and user operation are recorded based on when and who operated what function. For
preventive maintenance and response to the events and detection of unauthorized access, only a
system administrator can retrieve the log data stored in MFD by Configuration Web Tool.
The log data are assumed as assets to be protected.
(5) TOE setting data
A system administrator can set TOE security functions from the MFD control panel or system
administrator client by the function of System Administrator’s Security Management. The setting
data stored in the TOE (see Table 4) can be a threat to other assets if used without authorization
and are assumed as assets to be protected.
- 20 -
t
General User Client
System Administrator Client
- Printer Driver
- Fax Driver
- Web Browser
- Network Scan Utility
Internally StoredData
Document data, security audit log
data, and TOE setting data
transmitted in the internal network
TOE setting data transmitted
in the internal network
- LDAP Server
- Kerberos Server
- OCSP Server
Internally Stored Data
Dell C7765dn Security Target
External
Network
Firewall
Internal
Network
General Data on the
Internal Network
General Clien
and Server
Internally Stored Data
Asset under protection
Asset not under protection
TOE
Document Data
Used Document Data
Security Audit Log Data
TOE Setting Data
Other Setting Data
Inaccessible
Public
Telephone
Line
Figure 5: Assets under and not under Protection
Note) The data stored in a general client and server within the internal network and the general data on
the internal network are not assumed as assets to be protected. This is because TOE functions prevent
the access to the internal network from public telephone line and it cannot be a threat.
Table 4 categorizes the TOE setting data recorded on NVRAM and SEEPROM of the controller
board.
Table 4: Categories of TOE Setting Data
Categories of TOE Setting Data (Note)
Data on Hard Disk Data Overwrite
Data on Hard Disk Data Encryption
Data on use of password entered from MFD control panel in user authentication
Data on minimum password length of user password
Data on ID and password of key operator
Data on ID and password of SA/General user
- 21 -
Dell C7765dn Security Target
Categories of TOE Setting Data (Note)
Data on access denial due to authentication failures of system administrator
Data on Customer Engineer Operation Restriction
Data on Internal Network Data Protection
Data on Security Audit Log
Data on Mailbox
Data on User Authentication
Data on Store print
Data on date and time
Data on Self Test
Note: The setting data other than TOE setting data are also stored on NVRAM and SEEPROM. Those
setting data, however, are not assumed as assets to be protected because they do not engage in TOE
security functions.
* Only the time zone / summer time information is saved in NVRAM as the data on date and time.
3.1.2. Threats
Table 5 identifies the threats addressed by the TOE. An attacker is considered to have the disclosed
information on TOE operations and low-level attack capability.
Table 5: Threats Addressed by the TOE
Threat (Identifier) Description
An attacker may remove the internal HDD and connect it to commercial
tools so that he/she can read out and leak the document data, used
T.RECOVER
document data, security audit log data from the HDD without
authorization.
An attacker may access, read, or alter, from control panel or system
T.CONFDATA
administrator client, the TOE setting data which only a system
administrator is allowed to access.
An attacker may read document data and security audit log data from
T.DATA_SEC
control panel or Web browser without authorization.
An attacker may intercept or alter document data, security audit log
T.COMM_TAP
data, and TOE setting data on the internal network.
An attacker may access the TOE and use TOE functions without
T.CONSUME
authorization.
- 22 -
Dell C7765dn Security Target
3.2. Organizational Security Policies
Table 6 below describes the organizational security policy the TOE must comply with.
Table 6: Organizational Security Policy
Organizational Policy
Description
(Identifier)
TOE shall ensure that the internal network cannot be accessed via
P.FAX_OPT
public telephone line.
P.VERIFY The TOE shall execute self-test to verify the integrity of TSF executable
code and TSF data.
The TOE shall execute HDD overwrite to delete the used document
P.OVERWRITE
data in the internal HDD.
3.3. Assumptions
Table 7 shows the assumptions for the operation and use of this TOE.
Table 7: Assumptions
Assumption
(Identifier)
Description
Personnel Confidence
A.ADMIN
A.USER
Protection Mode
A.SECMODE
A.ACCESS
A system administrator shall have the necessary knowledge of TOE
security functions to perform the given role of managing the TOE and
shall not operate the TOE with malicious intent.
TOE users shall be trained and have competence about the TOE
operation and precautions according to the policies of their
organization and the product guidance.
A system administrator shall configure and set the TOE properly
according to the security policy of organization and the product
guidance document to manage the TOE and its external environment.
The TOE is located in a restricted or monitored environment that
provides protection from unmanaged access to the physical
components and data interfaces of the TOE.
- 23 -
Dell C7765dn Security Target
4. SECURITY OBJECTIVES
This chapter describes the security objectives for the TOE and for the environment and the rationale.
4.1. Security Objectives for the TOE
Table 8 defines the security objectives to be accomplished by the TOE.
Security
Objectives(Identifier)
O.AUDITS
O.CIPHER
O.COMM_SEC
O.FAX_SEC
O.MANAGE
Table 8: Security Objectives for the TOE
Description
The TOE must provide the Security Audit Log function and its log data
which are necessary to monitor unauthorized access.
The TOE must encrypt the document data, used document data, and
security audit log data to be stored into the HDD so that they cannot be
analyzed even if retrieved.
The TOE must provide encryption communication function to protect the
document data, security audit log data, and TOE setting data on the
internal network between TOE and the remote from interception and
alteration.
The TOE must prevent the unauthorized access to the internal network via
Fax modem from public telephone line.
The TOE must inhibit a general user from accessing the TOE setting data.
The TOE allows only the authenticated system administrator to access the
system administrator mode which enables him/her to configure the
security functions.
O.RESIDUAL
O.USER
O.RESTRICT The TOE must inhibit an unauthorized user from using the TOE functions.
O.VERIFY The TOE must provide self-test function to verify the integrity of TSF
The TOE must provide overwrite function to prevent the used document
data in the internal HDD.
The TOE must provide the function to identify TOE user and allow only
the authorized user to retrieve, and delete the document data and to change
the password.
executable code and TSF data.
- 24 -
Dell C7765dn Security Target
4.2. Security Objectives for the Environment
Table 9 defines the security objectives for the TOE environment.
Security
Objectives(Identifier)
OE.ADMIN
OE.USER
OE.SEC
OE.PHYSICAL
Table 9: Security Objectives for the Environment
Description
A system administrator who is assigned by an organization administrator
as an appropriate and reliable person for this TOE management and who
receives necessary training to manage the TOE.
The system administrator shall ensure that users have competence by
training users about the TOE operation and precautions according to the
policies of their organization and the product guidance.
A system administrator shall configure and set the TOE properly according
to the security policy of organization and the product guidance document
to manage the TOE.
In addition, a system administrator shall manage the external IT
environment according to the security policy of organization and the
product guidance document.
The TOE shall be placed in a secure or monitored area that provides
protection from unmanaged physical access to the TOE.
4.3. Security Objectives Rationale
The security objectives are established to correspond to the assumptions specified in Security Problem
Definition, to counter the threats, or to realize the organizational security policies. Table 10 shows
assumptions / threats / organizational security policies and the corresponding security objectives.
Moreover, Table 11 shows that each defined security problem is covered by the security objectives.
Table 10: Assumptions / Threats / Organizational Security Policies and the Corresponding Security
Objectives
Security Problems
A.ADMIN
A.USER
A.SECMODE
A.ACCESS
T.RECOVER
T.CONFDATA
T.COMM_TAP
T.DATA_SEC
T.CONSUME
Security Objectives
O.AUDITS
P.FAX_OPT
P.VERIFY
P. OVERWRITE
O.CIPHER
O.COMM_SEC
- 25 -
Loading...
+ 66 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.