Manuals
Page 42
... as a corporate logo. Only 30 characters can display an image on the [Home] Screen", Convenient Functions . 6. [Scanner] Press to the [Home] Screen You can also review icons of functions and embedded software applications that are not displayed on the [Home] Screen", Convenient Functions . 40 Getting Started 5. Home screen image You can...
... as a corporate logo. Only 30 characters can display an image on the [Home] Screen", Convenient Functions . 6. [Scanner] Press to the [Home] Screen You can also review icons of functions and embedded software applications that are not displayed on the [Home] Screen", Convenient Functions . 40 Getting Started 5. Home screen image You can...
Security Target
Page 36
... and users are aware of the security policies and procedures of their organisation and are identified and described. Copyright (c) 2012 RICOH COMPANY, LTD. P.RCGATE.COMM.PROTECT Protection of communication with RC Gate As for communication with operation permission of the TOE ...physical access by authorised persons. P.STORAGE.ENCRYPTION Encryption of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons. All rights reserved. 3.2 Organisational Security Policies The following organisational security policies are taken: Page 35 of 91...
... and users are aware of the security policies and procedures of their organisation and are identified and described. Copyright (c) 2012 RICOH COMPANY, LTD. P.RCGATE.COMM.PROTECT Protection of communication with RC Gate As for communication with operation permission of the TOE ...physical access by authorised persons. P.STORAGE.ENCRYPTION Encryption of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons. All rights reserved. 3.2 Organisational Security Policies The following organisational security policies are taken: Page 35 of 91...
Security Target
Page 40
have the competence to the guidance document. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their...security violations or unusual patterns of activity. OE.ADMIN.TRAINED Administrator training The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to follow those policies and procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select ...
have the competence to the guidance document. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their...security violations or unusual patterns of activity. OE.ADMIN.TRAINED Administrator training The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to follow those policies and procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select ...
Security Target
Page 41
...NO_ALT O.PROT.NO_ALT O.CONF.NO_DIS O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.TRAINED T.DOC.DIS ....VERIFICATION X P.AUDIT.LOGGING X XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD.
...NO_ALT O.PROT.NO_ALT O.CONF.NO_DIS O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.TRAINED T.DOC.DIS ....VERIFICATION X P.AUDIT.LOGGING X XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD.
Security Target
Page 44
... A.ADMIN.TRAINING A.ADMIN.TRAINING is upheld by OE.ADMIN.TRAINED. A.ACCESS.MANAGED is enforced by this objective. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. By OE.AUDIT_STORAGE.PROTECTED, if audit records are exported from the physical access by these objectives... external interfaces. P.STORAGE.ENCRYPTION is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns of 91...
... A.ADMIN.TRAINING A.ADMIN.TRAINING is upheld by OE.ADMIN.TRAINED. A.ACCESS.MANAGED is enforced by this objective. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. By OE.AUDIT_STORAGE.PROTECTED, if audit records are exported from the physical access by these objectives... external interfaces. P.STORAGE.ENCRYPTION is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns of 91...
Security Target
Page 51
... the information. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. FAU_SAR.1.2 The TSF shall provide the audit records in the audit trail. FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_STG.1 Protected audit trail storage Hierarchical to: No other components. Dependencies: FAU_SAR...
... the information. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. FAU_SAR.1.2 The TSF shall provide the audit records in the audit trail. FAU_SAR.1 Audit review Hierarchical to: No other components. FAU_STG.1 Protected audit trail storage Hierarchical to: No other components. Dependencies: FAU_SAR...
Security Target
Page 79
FPT_STM.1 The date (year/month/day) and time (hour/minute/second) the TOE records for users to audit (audit log review). FAU_STG.4 The TOE writes the newest audit log over the oldest audit log when there is accessed by the MFP administrator. FAU_SAR.1,... audit log in Table 34 are derived from RC Gate Communication interface Starting and releasing Lockout Table 29 Record of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. Page 78 of 91 7 TOE Summary Specification This section describes the TOE summary specification for each corresponding security functional requirement. 7.1...
FPT_STM.1 The date (year/month/day) and time (hour/minute/second) the TOE records for users to audit (audit log review). FAU_STG.4 The TOE writes the newest audit log over the oldest audit log when there is accessed by the MFP administrator. FAU_SAR.1,... audit log in Table 34 are derived from RC Gate Communication interface Starting and releasing Lockout Table 29 Record of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. Page 78 of 91 7 TOE Summary Specification This section describes the TOE summary specification for each corresponding security functional requirement. 7.1...