Page 3 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
3.1
3.13.1
3.1 Threats
ThreatsThreats
Threats ................................
................................................................
................................................................
................................................................
................................................................
................................................................
.........................................................
..................................................
......................... 34
3434
34
3.2
3.23.2
3.2 Organisational Security Policies
Organisational Security PoliciesOrganisational Security Policies
Organisational Security Policies................................
................................................................
................................................................
................................................................
..................................................
....................................
.................. 35
3535
35
3.3
3.33.3
3.3 Assumptions
AssumptionsAssumptions
Assumptions................................
................................................................
................................................................
................................................................
................................................................
................................................................
.................................................
..................................
................. 35
3535
35
4444 Security Objectives
Security ObjectivesSecurity Objectives
Security Objectives................................
................................................................
................................................................
................................................................
................................................................
................................................................
..............................................
............................
.............. 37
3737
37
4.1
4.14.1
4.1 Security Objectives for TOE
Security Objectives for TOESecurity Objectives for TOE
Security Objectives for TOE................................
................................................................
................................................................
................................................................
.........................................................
..................................................
......................... 37
3737
37
4.2
4.24.2
4.2 Security Objectives of Operational Enviro
Security Objectives of Operational EnviroSecurity Objectives of Operational Enviro
Security Objectives of Operational Environment
nmentnment
nment................................
................................................................
........................................................
................................................
........................ 38
3838
38
4.2.1 IT Environment......................................................................................................... 38
4.2.2 Non-IT Environment................................................................................................. 39
4.3
4.34.3
4.3 Security Objectives Rationale
Security Objectives RationaleSecurity Objectives Rationale
Security Objectives Rationale................................
................................................................
................................................................
................................................................
......................................................
............................................
...................... 40
4040
40
4.3.1 Correspondence Table of Security Objectives ......................................................... 40
4.3.2 Security Objectives Descriptions ............................................................................. 41
5555 Extended Components Definition
Extended Components DefinitionExtended Components Definition
Extended Components Definition................................
................................................................
................................................................
................................................................
.......................................................
..............................................
....................... 45
4545
45
5.1
5.15.1
5.1 Restricted forwarding of data to external interfaces (FPT_FDI_EXP)
Restricted forwarding of data to external interfaces (FPT_FDI_EXP)Restricted forwarding of data to external interfaces (FPT_FDI_EXP)
Restricted forwarding of data to external interfaces (FPT_FDI_EXP) .......................
..............................................
....................... 45
4545
45
6666 Security Requirements
Security RequirementsSecurity Requirements
Security Requirements................................
................................................................
................................................................
................................................................
................................................................
................................................................
........................................
................
........ 47
4747
47
6.1
6.16.1
6.1 Security Functional Requirements
Security Functional RequirementsSecurity Functional Requirements
Security Functional Requirements ................................
................................................................
................................................................
................................................................
..............................................
............................
.............. 47
4747
47
6.1.1 Class FAU: Security audit........................................................................................ 47
6.1.2 Class FCS: Cryptographic support .......................................................................... 50
6.1.3 Class FDP: User data protection ............................................................................. 51
6.1.4 Class FIA: Identification and authentication ......................................................... 55
6.1.5 Class FMT: Security management........................................................................... 59
6.1.6 Class FPT: Protection of the TSF............................................................................. 65
6.1.7 Class FTA: TOE access............................................................................................. 65
6.1.8 Class FTP: Trusted path/channels........................................................................... 65
6.2
6.26.2
6.2 Security Assurance Requirements
Security Assurance RequirementsSecurity Assurance Requirements
Security Assurance Requirements................................
................................................................
................................................................
................................................................
...............................................
..............................
............... 66
6666
66
6.3
6.36.3
6.3 Security Requirements Rationale
Security Requirements RationaleSecurity Requirements Rationale
Security Requirements Rationale................................
................................................................
................................................................
................................................................
................................................
................................
................ 67
6767
67
6.3.1 Tracing ....................................................................................................................... 67
6.3.2 Justification of Traceability...................................................................................... 68
6.3.3 Dependency Analysis ................................................................................................ 75
6.3.4 Security Assurance Requirements Rationale.......................................................... 77
7777 TOE Summary Specification
TOE Summary SpecificationTOE Summary Specification
TOE Summary Specification................................
................................................................
................................................................
................................................................
...............................................................
..............................................................
............................... 78
7878
78
7.1
7.17.1
7.1 Audit Function
Audit FunctionAudit Function
Audit Function ................................
................................................................
................................................................
................................................................
................................................................
................................................................
.............................................
..........................
............. 78
7878
78
7.2
7.27.2
7.2 Identification and Authentication Function
Identification and Authentication FunctionIdentification and Authentication Function
Identification and Authentication Function ................................
................................................................
................................................................
................................................................
................................ 80
8080
80