Manuals
Page 42
... software applications that are not displayed on the [Home] Screen", Convenient Functions . 40 Delete unused icons if the limit is replaced with "...". You can also review icons of Favorites, see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions . • You can register up to 72 function and shortcut icons...
... software applications that are not displayed on the [Home] Screen", Convenient Functions . 40 Delete unused icons if the limit is replaced with "...". You can also review icons of Favorites, see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions . • You can register up to 72 function and shortcut icons...
Security Target
Page 36
... MFP trains users according to self-verify executable code in a restricted or monitored area that provides protection from unauthorised disclosure or alteration, and shall be reviewed by unauthorised persons. Copyright (c) 2012 RICOH COMPANY, LTD.
... MFP trains users according to self-verify executable code in a restricted or monitored area that provides protection from unauthorised disclosure or alteration, and shall be reviewed by unauthorised persons. Copyright (c) 2012 RICOH COMPANY, LTD.
Security Target
Page 40
...by unauthorised persons. have the competence to the guidance document for detecting security violations or unusual patterns of activity. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Page 39 of 91 OE.INTERFACE.MANAGED Management of external interfaces in IT environment The IT... manager of MFP shall select administrators who will not use the TOE in a secure or monitored area that administrators are reviewed at appropriate intervals according to follow the guidance document; and correctly configure and operate the TOE according to the guidance document...
...by unauthorised persons. have the competence to the guidance document for detecting security violations or unusual patterns of activity. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Page 39 of 91 OE.INTERFACE.MANAGED Management of external interfaces in IT environment The IT... manager of MFP shall select administrators who will not use the TOE in a secure or monitored area that administrators are reviewed at appropriate intervals according to follow the guidance document; and correctly configure and operate the TOE according to the guidance document...
Security Target
Page 41
....NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE....ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. Page 40 of Security Objectives Table 10 describes the correspondence between the assumptions, threats and organisational security policies, and each security objective...
....NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE....ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. Page 40 of Security Objectives Table 10 describes the correspondence between the assumptions, threats and organisational security policies, and each security objective...
Security Target
Page 44
...OE.INTERFACE.MANAGED, the TOE constructs the IT environment that those records from the physical access by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. P.INTERFACE.MANAGEMENT P.INTERFACE.MANAGEMENT is enforced by this objective. P.STORAGE.ENCRYPTION is ...is upheld by O.RCGATE.COMM.PROTECT. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is enforced by OE.PHYSICAL.MANAGED. Copyright (c) 2012 RICOH COMPANY, LTD. By O.INTERFACE.MANAGED, the TOE manages the operation of the external interfaces in accordance with those encrypted data. By...
...OE.INTERFACE.MANAGED, the TOE constructs the IT environment that those records from the physical access by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. P.INTERFACE.MANAGEMENT P.INTERFACE.MANAGEMENT is enforced by this objective. P.STORAGE.ENCRYPTION is ...is upheld by O.RCGATE.COMM.PROTECT. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is enforced by OE.PHYSICAL.MANAGED. Copyright (c) 2012 RICOH COMPANY, LTD. By O.INTERFACE.MANAGED, the TOE manages the operation of the external interfaces in accordance with those encrypted data. By...
Security Target
Page 51
... trail. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Dependencies: FAU_GEN.1 Audit data generation FIA_UID.1 Timing of identification FAU_GEN.2.1 For audit events... shall provide [assignment: the MFP administrators] with the identity of log items] from unauthorised deletion. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all of the user that have been granted explicit read access to : No other components....
... trail. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Dependencies: FAU_GEN.1 Audit data generation FIA_UID.1 Timing of identification FAU_GEN.2.1 For audit events... shall provide [assignment: the MFP administrators] with the identity of log items] from unauthorised deletion. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all of the user that have been granted explicit read access to : No other components....
Security Target
Page 79
...recorded, and expanded log items are excluded) Success and failure of login operations from the system clock of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Page 78 of 91 7 TOE Summary Specification This section describes the TOE summary specification for users to... audit (audit log review). Table 33 : List of Audit Events Audit Events Start-up of the Audit Function (*1) Shutdown of the Audit Function (*1) Success and ...
...recorded, and expanded log items are excluded) Success and failure of login operations from the system clock of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Page 78 of 91 7 TOE Summary Specification This section describes the TOE summary specification for users to... audit (audit log review). Table 33 : List of Audit Events Audit Events Start-up of the Audit Function (*1) Shutdown of the Audit Function (*1) Success and ...