Manuals
Page 42
... mode, or Web pages registered in a simple screen. For details see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions . • You can also review icons of Favorites, see Convenient Functions . 9. / Press to switch pages when the icons are registered to Favorites by User cannot be registered to display Web...
... mode, or Web pages registered in a simple screen. For details see "Registering a Shortcut to a Program to the [Home] Screen", Convenient Functions . • You can also review icons of Favorites, see Convenient Functions . 9. / Press to switch pages when the icons are registered to Favorites by User cannot be registered to display Web...
Security Target
Page 36
... Gate, the TOE shall protect the communication data between itself and RC Gate. 3.3 Assumptions The assumptions related to use and security-relevant events. Copyright (c) 2012 RICOH COMPANY, LTD. A.ACCESS.MANAGED Access management According to self-verify executable code in a restricted or monitored area that provides protection from unauthorised disclosure or alteration..., the TOE is placed in the TSF. P.RCGATE.COMM.PROTECT Protection of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons.
... Gate, the TOE shall protect the communication data between itself and RC Gate. 3.3 Assumptions The assumptions related to use and security-relevant events. Copyright (c) 2012 RICOH COMPANY, LTD. A.ACCESS.MANAGED Access management According to self-verify executable code in a restricted or monitored area that provides protection from unauthorised disclosure or alteration..., the TOE is placed in the TSF. P.RCGATE.COMM.PROTECT Protection of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons.
Security Target
Page 40
Copyright (c) 2012 RICOH COMPANY, LTD. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select administrators who will not use the TOE in accordance with the ... MFP shall ensure that audit logs are aware of the security policies and procedures of their organisation; OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are reviewed at appropriate intervals according to the guidance document for detecting security violations or unusual patterns of MFP shall give...
Copyright (c) 2012 RICOH COMPANY, LTD. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of MFP shall select administrators who will not use the TOE in accordance with the ... MFP shall ensure that audit logs are aware of the security policies and procedures of their organisation; OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are reviewed at appropriate intervals according to the guidance document for detecting security violations or unusual patterns of MFP shall give...
Security Target
Page 41
....NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE.... P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. Table 10 : Rationale for security objectives. All rights reserved. Page 40 of Security Objectives Table 10 describes the correspondence between ...
....NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTECT OE.ADMIN.TRAINED OE.... P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. Table 10 : Rationale for security objectives. All rights reserved. Page 40 of Security Objectives Table 10 describes the correspondence between ...
Security Target
Page 44
...those records can be accessed in accordance with those encrypted data. A.ACCESS.MANAGED is upheld by these objectives. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. By O.INTERFACE.MANAGED, the TOE manages the operation of the external interfaces in order to...O.RCGATE.COMM.PROTECT. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is enforced by authorised persons. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns of activity according to TOE external interfaces. P....
...those records can be accessed in accordance with those encrypted data. A.ACCESS.MANAGED is upheld by these objectives. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. By O.INTERFACE.MANAGED, the TOE manages the operation of the external interfaces in order to...O.RCGATE.COMM.PROTECT. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is enforced by authorised persons. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns of activity according to TOE external interfaces. P....
Security Target
Page 51
...[FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all of log items] from the audit records. Dependencies: FAU_GEN.1 ... 50 of 91 FAU_GEN.2 User identity association Hierarchical to interpret the information. FAU_SAR.1 Audit review Hierarchical to : No other components. FAU_SAR.2 Restricted audit review Hierarchical to : No other components. Dependencies: FAU_GEN.1 Audit data generation FAU_STG.1.1 The TSF...
...[FCS_CKM.2 Cryptographic key distribution, or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction Copyright (c) 2012 RICOH COMPANY, LTD. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all of log items] from the audit records. Dependencies: FAU_GEN.1 ... 50 of 91 FAU_GEN.2 User identity association Hierarchical to interpret the information. FAU_SAR.1 Audit review Hierarchical to : No other components. FAU_SAR.2 Restricted audit review Hierarchical to : No other components. Dependencies: FAU_GEN.1 Audit data generation FAU_STG.1.1 The TSF...
Security Target
Page 79
... specification for the audit log are derived from RC Gate Communication interface Starting and releasing Lockout Table 29 Record of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. The recorded audit log can be read the audit logs. FAU_SAR.1, FAU_SAR.2, and FAU_STG.1 The TOE displays the operation menu ...for each security function. FAU_STG.4 The TOE writes the newest audit log over the oldest audit log when there is to audit (audit log review). The TOE provides the audit logs in Table 34 are recorded. Audit log items include basic log items and expanded log items. Basic ...
... specification for the audit log are derived from RC Gate Communication interface Starting and releasing Lockout Table 29 Record of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. The recorded audit log can be read the audit logs. FAU_SAR.1, FAU_SAR.2, and FAU_STG.1 The TOE displays the operation menu ...for each security function. FAU_STG.4 The TOE writes the newest audit log over the oldest audit log when there is to audit (audit log review). The TOE provides the audit logs in Table 34 are recorded. Audit log items include basic log items and expanded log items. Basic ...