Security Target
Page 38
...Prevention of audit data loss Hierarchical to interpret the information. Dependencies: FAU_SAR.1 Audit review. FAU_STG.1.2 The TSF shall be taken in case of audit storage failure]if...granted explicit read [assignment: all log items] from unauthorised deletion. FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_SAR.1.2 The TSF shall provide the audit ...support FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components. FAU_SAR.2 Restricted audit review Hierarchical to: No other components. FAU_STG.1.1 The TSF shall protect the stored audit ...
...Prevention of audit data loss Hierarchical to interpret the information. Dependencies: FAU_SAR.1 Audit review. FAU_STG.1.2 The TSF shall be taken in case of audit storage failure]if...granted explicit read [assignment: all log items] from unauthorised deletion. FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_SAR.1.2 The TSF shall provide the audit ...support FCS_CKM.1 Cryptographic key generation Hierarchical to: No other components. FAU_SAR.2 Restricted audit review Hierarchical to: No other components. FAU_STG.1.1 The TSF shall protect the stored audit ...
Security Target
Page 66
...the internal system clock. This TOE does not record the ending of Audit Function. By the above , FAU_SAR.1 (Audit review), FAU_SAR.2 (Restricted audit review), and FMT_MTD.1 (Management of TSF data) are the explanations of each functional item in D-BOX *4 When the recording... TOE according to their roles and authorisation, the TOE identifies and authenticates users prior to their corresponding security functional requirements. Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. By the above , FPT_STM.1 (Reliable time stamps) is satisfied. 7.1.2 SF.I &A User Identification and...
...the internal system clock. This TOE does not record the ending of Audit Function. By the above , FAU_SAR.1 (Audit review), FAU_SAR.2 (Restricted audit review), and FMT_MTD.1 (Management of TSF data) are the explanations of each functional item in D-BOX *4 When the recording... TOE according to their roles and authorisation, the TOE identifies and authenticates users prior to their corresponding security functional requirements. Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. By the above , FPT_STM.1 (Reliable time stamps) is satisfied. 7.1.2 SF.I &A User Identification and...