Manuals
Page 51
... to 72 function and shortcut icons. For details about how to make a program, see "Deleting an Icon on the machine's hard disk. You can also review icons of icons. Start Web Image Monitor. For details see p.53 "Registering Functions in Favorites using the browser function. How to the [Home] screen. For...
... to 72 function and shortcut icons. For details about how to make a program, see "Deleting an Icon on the machine's hard disk. You can also review icons of icons. Start Web Image Monitor. For details see p.53 "Registering Functions in Favorites using the browser function. How to the [Home] screen. For...
Security Target
Page 37
...TOE shall protect the communication data between itself and RC Gate. 3.3 Assumptions The assumptions related to follow those interfaces shall be reviewed by authorised persons. P.RCGATE.COMM.PROTECT Protection of communication with RC Gate As for communication with operation permission of storage devices...All rights reserved. The audit log shall be protected from physical access by the TOE and its IT environment. Copyright (c) 2012 RICOH COMPANY, LTD. P.SOFTWARE.VERIFICATION Software verification Procedures shall exist to the guidance document, the TOE is placed in the TSF. A....
...TOE shall protect the communication data between itself and RC Gate. 3.3 Assumptions The assumptions related to follow those interfaces shall be reviewed by authorised persons. P.RCGATE.COMM.PROTECT Protection of communication with RC Gate As for communication with operation permission of storage devices...All rights reserved. The audit log shall be protected from physical access by the TOE and its IT environment. Copyright (c) 2012 RICOH COMPANY, LTD. P.SOFTWARE.VERIFICATION Software verification Procedures shall exist to the guidance document, the TOE is placed in the TSF. A....
Security Target
Page 41
... patterns of their organisation and have the training, competence, and time to the TOE by unauthorised persons. Copyright (c) 2012 RICOH COMPANY, LTD. and correctly configure and operate the TOE according to use their organisation. OE.ADMIN.TRAINED Administrator training The ...procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of their organisation; OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that users are reviewed at appropriate intervals according to the guidance document for malicious purposes according to follow ...
... patterns of their organisation and have the training, competence, and time to the TOE by unauthorised persons. Copyright (c) 2012 RICOH COMPANY, LTD. and correctly configure and operate the TOE according to use their organisation. OE.ADMIN.TRAINED Administrator training The ...procedures. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of their organisation; OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that users are reviewed at appropriate intervals according to the guidance document for malicious purposes according to follow ...
Security Target
Page 42
...NO_ALT O.PROT.NO_ALT O.CONF.NO_DI S O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTEC T OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.TRAINED T.DOC.DIS....VERIFICATION X P.AUDIT.LOGGING X XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD.
...NO_ALT O.PROT.NO_ALT O.CONF.NO_DI S O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTEC T OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.TRAINED T.DOC.DIS....VERIFICATION X P.AUDIT.LOGGING X XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD.
Security Target
Page 45
... in the MFP and prevents its unauthorised disclosure or alteration. A.ACCESS.MANAGED A.ACCESS.MANAGED is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. Copyright (c) 2012 RICOH COMPANY, LTD. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is upheld by this objective. By O.RCGATE.COMM.PROTECT, the TOE shall...
... in the MFP and prevents its unauthorised disclosure or alteration. A.ACCESS.MANAGED A.ACCESS.MANAGED is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. Copyright (c) 2012 RICOH COMPANY, LTD. P.RCGATE.COMM.PROTECT P.RCGATE.COMM.PROTECT is upheld by this objective. By O.RCGATE.COMM.PROTECT, the TOE shall...
Security Target
Page 52
... No other components. a) Minimal: Failure of communication with the identity of the user that caused the event. Copyright (c) 2012 RICOH COMPANY, LTD. Page 51 of 93 FTA_SSL.3 FTP_ITC.1 a) Minimal: Termination of an interactive session by auto logout. Dependencies: FAU_GEN...: prevent] unauthorised modifications to interpret the information. a) Minimal: Termination of log items] from unauthorised deletion. FAU_SAR.1 Audit review Hierarchical to: No other actions to associate each auditable event with trusted channel. c) Basic: All attempted uses of audit ...
... No other components. a) Minimal: Failure of communication with the identity of the user that caused the event. Copyright (c) 2012 RICOH COMPANY, LTD. Page 51 of 93 FTA_SSL.3 FTP_ITC.1 a) Minimal: Termination of an interactive session by auto logout. Dependencies: FAU_GEN...: prevent] unauthorised modifications to interpret the information. a) Minimal: Termination of log items] from unauthorised deletion. FAU_SAR.1 Audit review Hierarchical to: No other actions to associate each auditable event with trusted channel. c) Basic: All attempted uses of audit ...
Security Target
Page 53
All rights reserved. Page 52 of 93 FAU_SAR.2 Restricted audit review Hierarchical to : No other components. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all users read access to the audit records, except those users that have ...been granted explicit read-access. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to : No other components. Decryption when reading the data Copyright (c) 2012 RICOH COMPANY...
All rights reserved. Page 52 of 93 FAU_SAR.2 Restricted audit review Hierarchical to : No other components. Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all users read access to the audit records, except those users that have ...been granted explicit read-access. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to : No other components. Decryption when reading the data Copyright (c) 2012 RICOH COMPANY...
Security Target
Page 81
... Specification This section describes the TOE summary specification for audit logs to audit (audit log review). The TOE provides the audit logs in Table 34 occur. All rights reserved. Page 80 of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. The security functions are recorded. FAU_SAR.1, FAU_SAR.2, and FAU_STG.1 The TOE displays the...
... Specification This section describes the TOE summary specification for audit logs to audit (audit log review). The TOE provides the audit logs in Table 34 occur. All rights reserved. Page 80 of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. The security functions are recorded. FAU_SAR.1, FAU_SAR.2, and FAU_STG.1 The TOE displays the...