Security Target
Page 80
Copyright (c) 2011 RICOH COMPANY, LTD. The vulnerability analysis (AVA_VAN.2) is adequate to show the validity of commercially available products. Architectural design (ADV_TDS.2) is therefore adequate for general needs. ... of 93 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is used for the HDD encryption of this TOE at the start of TOE operation...
Copyright (c) 2011 RICOH COMPANY, LTD. The vulnerability analysis (AVA_VAN.2) is adequate to show the validity of commercially available products. Architectural design (ADV_TDS.2) is therefore adequate for general needs. ... of 93 The following explains the rationale for acceptability in all cases where a dependency is not satisfied: Rationale for Removing Dependencies on the terms and costs of the evaluation, the evaluation assurance level of EAL3+ALC_FLR.2 is used for the HDD encryption of this TOE at the start of TOE operation...