
Page 3 of 83
Table of Contents
1 ST Introduction ..................................................................................................................... 8
1.1 ST Reference .................................................................................................................. 8
1.2 TOE Reference ........................................................
....................................................... 8
1.3 TOE Overview..............................
................................................................................ 10
1.3.1 TOE Type .................................................................................................................10
1.3.2 TOE Usage and Major Security Features of TOE..................................................10
1.3.3 Environment for TOE Usage and Non-TOE Configuration Items ........................10
1.4 TOE Description........................................................................................................... 12
1.4.1 Physical Scope of TOE.............................................................................................12
1.4.2 Guidance Documents...............................................................................................15
1.4.3 User Roles ................................................................................................................17
1.4.3.1 Responsible Manager for MFP.........................................................................17
1.4.3.2 Administrator ...................................................................................................18
1.4.3.3 Supervisor.........................................................................................................18
1.4.3.4 General User.....................................................................................................18
1.4.3.5 Customer Engineer...........................................................................................18
1.4.4 Logical Scope of TOE...............................................................................................18
1.4.4.1 Basic Functions ................................................................................................19
1.4.4.2 Security Functions............................................................................................22
1.4.5 Protected Assets.......................................................................................................25
1.4.5.1 Document Data.................................................................................................25
1.4.5.2 Print Data .........................................................................................................26
2 Conformance Claims ........................................................................................................... 27
2.1 CC Conformance Claim................................................................................................ 27
2.2 PP Claims, Package Claims .....................................................
.................................... 27
2.3 Conformance Rationale.......................................
......................................................... 27
3 Security Problem Definition ............................................................................................... 28
3.1 Threats ......................................................................................................................... 28
3.2 Organisational Security Policies..................................
................................................ 28
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Kommentare zu diesen Handbüchern