Page 5 of 93 
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
List of Figures 
Figure 1 : Example of TOE Environment........................................................................................................9 
Figure 2 : Hardware Configuration of the TOE.............................................................................................12 
Figure 3 : Logical Scope of the TOE.............................................................................................................21 
List of Tables 
Table 1 : Identification Information of TOE....................................................................................................7 
Table 2 : Guidance for English Version-1......................................................................................................14 
Table 3 : Guidance for English Version-2......................................................................................................15 
Table 4 : Guidance for English Version-3......................................................................................................17 
Table 5 : Guidance for English Version-4......................................................................................................17 
Table 6 : Definition of Users .........................................................................................................................19 
Table 7 : List of Administrative Roles...........................................................................................................19 
Table 8 : Definition of User Data ..................................................................................................................26 
Table 9 : Definition of TSF Data...................................................................................................................27 
Table 10 : Specific Terms Related to This ST...............................................................................................27 
Table 11 : Rationale for Security Objectives.................................................................................................42 
Table 12 : List of Auditable Events...............................................................................................................49 
Table 13 : List of Cryptographic Key Generation.........................................................................................53 
Table 14 : List of Cryptographic Operation...................................................................................................53 
Table 15 : List of Subjects, Objects, and Operations among Subjects and Objects (a).................................54 
Table 16 : List of Subjects, Objects, and Operations among Subjects and Objects (b).................................54 
Table 17 : Subjects, Objects and Security Attributes (a) ...............................................................................54 
Table 18 : Rules to Control Operations on Document Data and User Jobs (a)..............................................55 
Table 19 : Additional Rules to Control Operations on Document Data and User Jobs (a)............................56 
Table 20 : Subjects, Objects and Security Attributes (b)...............................................................................57 
Table 21 : Rule to Control Operations on MFP Applications (b) ..................................................................57 
Table 22 : List of Authentication Ev en ts of Basic Authentication.................................................................58 
Table 23 : List of Actions for A uthentication Failure....................................................................................58 
Table 24 : List of Security Attributes for Each User That Shall Be Maintained............................................59 
Table 25 : Rules for Initial Association of Attr ibutes....................................................................................61 
Table 26 : User Roles for Security Attributes (a)...........................................................................................62 
Table 27 : User Roles for Security Attributes (b)..........................................................................................63 
Table 28 : Authorised Identified Roles Allowed to Override Default Values................................................64 
Table 29 : List of TSF Data...........................................................................................................................65 
Table 30 : List of Specification of Management Functions...........................................................................66 
Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2)....................................................69 
Table 32 : Relationship between Security Objectives and Functional Requirements....................................70 
Table 33 : Results of Dependency Analysis of TOE Security Functional Requirements ..............................77 
Table 34 : List of Audit Events......................................................................................................................80 
Table 35 : List of Audit Log Items................................................................................................................81