Manuals
Page 51
... icons if the limit is reached. The program number appears on the bottom of Icons on the [Home] Screen", Convenient Functions . • You can also review icons of Favorites, see "Changing the Order of the shortcut icon. 8. [Browser] Press to the [Home] screen. Adding icons to make a program, see p.49 "Adding...
... icons if the limit is reached. The program number appears on the bottom of Icons on the [Home] Screen", Convenient Functions . • You can also review icons of Favorites, see "Changing the Order of the shortcut icon. 8. [Browser] Press to the [Home] screen. Adding icons to make a program, see p.49 "Adding...
Security Target
Page 37
... to the guidance document and users are aware of the security policies and procedures of TOE use the TOE. Copyright (c) 2012 RICOH COMPANY, LTD. 3.2 Organisational Security Policies The following organisational security policies are taken: Page 36 of 93 P.USER.AUTHORIZATION User identification...by authorised persons. P.RCGATE.COMM.PROTECT Protection of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons. P.STORAGE.ENCRYPTION Encryption of communication with RC Gate As for communication with operation permission of the TOE ...
... to the guidance document and users are aware of the security policies and procedures of TOE use the TOE. Copyright (c) 2012 RICOH COMPANY, LTD. 3.2 Organisational Security Policies The following organisational security policies are taken: Page 36 of 93 P.USER.AUTHORIZATION User identification...by authorised persons. P.RCGATE.COMM.PROTECT Protection of storage devices The data stored on the HDD inside the TOE shall be reviewed by unauthorised persons. P.STORAGE.ENCRYPTION Encryption of communication with RC Gate As for communication with operation permission of the TOE ...
Security Target
Page 41
... training The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to the guidance document for malicious purposes according to the guidance document. Copyright (c) 2012 RICOH COMPANY, LTD. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of ... authority to use their organisation. and correctly configure and operate the TOE according to those policies and procedures. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their ...
... training The responsible manager of MFP shall ensure that audit logs are reviewed at appropriate intervals according to the guidance document for malicious purposes according to the guidance document. Copyright (c) 2012 RICOH COMPANY, LTD. OE.ADMIN.TRUSTED Trusted administrator The responsible manager of ... authority to use their organisation. and correctly configure and operate the TOE according to those policies and procedures. OE.AUDIT.REVIEWED Log audit The responsible manager of MFP shall ensure that administrators are aware of the security policies and procedures of their ...
Security Target
Page 42
... O.CONF.NO_DI S O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTEC T OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.... XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Table 11 : Rationale for security objectives.
... O.CONF.NO_DI S O.CONF.NO_ALT O.USER.AUTHORIZED OE.USER.AUTHORIZED O.SOFTWARE.VERIFIED O.AUDIT.LOGGED OE.AUDIT_STORAGE.PROTCTED OE.AUDIT_ACCESS_AUTHORIZED OE.AUDIT.REVIEWED O.INTERFACE.MANAGED OE.PHYSICAL.MANAGED OE.INTERFACE.MANAGED O.STORAGE.ENCRYPTED O.RCGATE.COMM.PROTEC T OE.ADMIN.TRAINED OE.ADMIN.TRUSTED OE.USER.... XXX P.INTERFACE.MANAGEMENT X X P.STORAGE.ENCRYPTION X P.RCGATE.COMM.PROTECT X A.ACCESS.MANAGED X A.ADMIN.TRAINING X A.ADMIN.TRUST X A.USER.TRAINING X Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. Table 11 : Rationale for security objectives.
Security Target
Page 45
.... A.ACCESS.MANAGED is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns... of activity according to TOE external interfaces. By OE.INTERFACE.MANAGED, the TOE constructs the IT environment that those records can be those communication data. Copyright (c) 2012 RICOH...
.... A.ACCESS.MANAGED is enforced by O.AUDIT.LOGGED, OE.AUDIT.REVIEWED, OE.AUDIT_STORAGE.PROTECTED and OE.AUDIT_ACCESS.AUTHORIZED. By OE.AUDIT.REVIEWED, the responsible manager of MFP reviews audit logs at appropriate intervals for security violations or unusual patterns... of activity according to TOE external interfaces. By OE.INTERFACE.MANAGED, the TOE constructs the IT environment that those records can be those communication data. Copyright (c) 2012 RICOH...
Security Target
Page 52
... unauthorised modifications to the stored audit records in case of audit storage failure] if the audit trail is full. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. c) Basic: All attempted uses of the trusted channel functions. a) Minimal: Termination of session by...the audit records. Page 51 of 93 FTA_SSL.3 FTP_ITC.1 a) Minimal: Termination of an interactive session by auto logout. FAU_SAR.1 Audit review Hierarchical to read [assignment: all trusted channel functions. FAU_STG.4 Prevention of audit data loss Hierarchical to : No other components. b) ...
... unauthorised modifications to the stored audit records in case of audit storage failure] if the audit trail is full. Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved. c) Basic: All attempted uses of the trusted channel functions. a) Minimal: Termination of session by...the audit records. Page 51 of 93 FTA_SSL.3 FTP_ITC.1 a) Minimal: Termination of an interactive session by auto logout. FAU_SAR.1 Audit review Hierarchical to read [assignment: all trusted channel functions. FAU_STG.4 Prevention of audit data loss Hierarchical to : No other components. b) ...
Security Target
Page 53
... in Table 13] that meet the following : [assignment: standards in Table 14]. All rights reserved. Encryption when writing the data on HDD - Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all users read -access. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to : No other components. Decryption when reading...
... in Table 13] that meet the following : [assignment: standards in Table 14]. All rights reserved. Encryption when writing the data on HDD - Dependencies: FAU_SAR.1 Audit review FAU_SAR.2.1 The TSF shall prohibit all users read -access. 6.1.2 Class FCS: Cryptographic support FCS_CKM.1 Cryptographic key generation Hierarchical to : No other components. Decryption when reading...
Security Target
Page 81
...for each corresponding security functional requirement. 7.1 Audit Function The Audit Function is to generate the audit log of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. Audit log items include basic log items and expanded log items. Basic log items are recorded whenever audit logs are recorded...describes the TOE summary specification for each security function. The TOE provides the audit logs in the audit log files to audit (audit log review). The security functions are recorded. FAU_GEN.1 and FAU_GEN.2 The TOE records the audit log items, shown in Table 35, on a ...
...for each corresponding security functional requirement. 7.1 Audit Function The Audit Function is to generate the audit log of Management Function Copyright (c) 2012 RICOH COMPANY, LTD. Audit log items include basic log items and expanded log items. Basic log items are recorded whenever audit logs are recorded...describes the TOE summary specification for each security function. The TOE provides the audit logs in the audit log files to audit (audit log review). The security functions are recorded. FAU_GEN.1 and FAU_GEN.2 The TOE records the audit log items, shown in Table 35, on a ...