Security Target
Page 38
...the audit records in the audit trail from the audit records. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or Copyright (c) 2010 RICOH COMPANY, LTD. Dependencies: FAU_GEN.1 Audit data generation. FAU_STG.4 Prevention of audit data loss Hierarchical to : No other components. All Rights Reserved..., Locking out users, release of user Lockout, method of Lockout release, IDs of possible audit data loss. Dependencies: FAU_SAR.1 Audit review. FAU_STG.1 Protected audit trail storage Hierarchical to: No other actions to : No other components. FAU_STG.4.1 The TSF shall [selection: ...
...the audit records in the audit trail from the audit records. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or Copyright (c) 2010 RICOH COMPANY, LTD. Dependencies: FAU_GEN.1 Audit data generation. FAU_STG.4 Prevention of audit data loss Hierarchical to : No other components. All Rights Reserved..., Locking out users, release of user Lockout, method of Lockout release, IDs of possible audit data loss. Dependencies: FAU_SAR.1 Audit review. FAU_STG.1 Protected audit trail storage Hierarchical to: No other actions to : No other components. FAU_STG.4.1 The TSF shall [selection: ...
Security Target
Page 66
... Service Function the document data stored in a text format using administrator privileges. All Rights Reserved. By the above , FAU_SAR.1 (Audit review), FAU_SAR.2 (Restricted audit review), and FMT_MTD.1 (Management of TSF data) are set . Following are satisfied. 7.1.1.2 Reading Audit Logs The TOE allows only the machine...the user IDs but can delete the audit logs will not carry out any malicious acts using theWeb Service Function. Copyright (c) 2010 RICOH COMPANY, LTD. This TOE does not record the ending of TSF data) are set as subject identities of basic audit information, ...
... Service Function the document data stored in a text format using administrator privileges. All Rights Reserved. By the above , FAU_SAR.1 (Audit review), FAU_SAR.2 (Restricted audit review), and FMT_MTD.1 (Management of TSF data) are set . Following are satisfied. 7.1.1.2 Reading Audit Logs The TOE allows only the machine...the user IDs but can delete the audit logs will not carry out any malicious acts using theWeb Service Function. Copyright (c) 2010 RICOH COMPANY, LTD. This TOE does not record the ending of TSF data) are set as subject identities of basic audit information, ...