IEEE 2600
13WK-0F1
This section describes the security requirements deî ´ned in the IEEE 2600 standard, and how the functions of this
machine meet these requirements.
Security requirement Corresponding machine function
Preventing unauthorized access with user
authentication/user information management
User Authentication
Performs personal authentication based on user authentication information
such as user names and passwords, and manages user information such as
privileges (roles). Managing Users(P. 556)
Managing access and restricting operations by user ACCESS MANAGEMENT SYSTEM
The availability of functions such as printing and copying can be assigned to
each user, enabling you to manage access to these functions on an
individual user basis. See ACCESS MANAGEMENT SYSTEM Administrator
Guide.
Using audit logs
*1
to record and monitor security-
related user operations
Generating/exporting audit logs
You can record user authentication logs and job logs, and export them from
the Remote UI. Managing the Logs(P. 680)
Completely deleting unnecessary data from the hard
disk
HDD Complete Deletion
Unnecessary data can be deleted from the hard disk by overwriting with
random data multiple times. Managing Hard Disk Data(P. 724)
Protecting the various types of data and conî ´dential
information stored on the hard disk
*2
Hard disk data encryption
Encryption is used to protect data on the hard disk, such as î ´les stored in
the Mail Box, Address Book data, and password information. Managing
Hard Disk Data(P. 724)
Protecting data on the network with encrypted
communication
IPSec
By creating security policies for encrypted communication, data can be
protected from various threats when sent and received over an IP network.
Conî ´guring the IPSec Settings(P. 608)
Self-veriî ´cation of security functions IPSec
When IPSec is enabled, the self-test for the encryption module is
automatically performed when the machine starts.
*1 Operations for <Scan and Store>, <Network> in <Access Stored Files>, and <Memory Media> are not included in the scope of the audit.
*2 Files stored in memory media are not encrypted.
Managing the Machine
729