Security Target
Page 78
... following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is therefore adequate for general needs. The vulnerability analysis (AVA_VAN.2) is...used for the HDD encryption of this TOE at the start of TOE operation according to flow reporting procedure (ALC_FLR.2). Copyright (c) 2012 RICOH COMPANY, LTD. In order to show the validity of TOE operation, the cryptographic key will be continuously used for the HDD and...
... following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is therefore adequate for general needs. The vulnerability analysis (AVA_VAN.2) is...used for the HDD encryption of this TOE at the start of TOE operation according to flow reporting procedure (ALC_FLR.2). Copyright (c) 2012 RICOH COMPANY, LTD. In order to show the validity of TOE operation, the cryptographic key will be continuously used for the HDD and...