Page 3 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
Table of Contents
1 ST Introduction....................................................................................7
1.1 ST Reference..................................................................................7
1.2 TOE Reference................................................................................7
1.3 TOE Overview................................................................................8
1.3.1 TOE Type.....................................................................................................8
1.3.2 TOE Usage and Major Security Features of TOE.............................................8
1.3.3 Environment for TOE Usage and Non-TOE Configuration Items.......................8
1.4 TOE Description.............................................................................10
1.4.1 Physical Boundaries of TOE......................................................................... 10
1.4.2 Guidance Documents................................................................................... 13
1.4.3 User Roles..................................................................................................16
1.4.3.1 Responsible Manager of MFP................................................................. 16
1.4.3.2 Administrator....................................................................................... 16
1.4.3.3 Supervisor............................................................................................16
1.4.3.4 General User........................................................................................16
1.4.3.5 Customer Engineer............................................................................... 17
1.4.4 Logical Boundaries of TOE...........................................................................17
1.4.4.1 Basic Functions....................................................................................17
1.4.4.2 Security Functions................................................................................ 19
1.4.5 Protected Assets..........................................................................................23
1.4.5.1 Document Data.....................................................................................23
1.4.5.2 Print Data............................................................................................23
2 Conformance Claims.............................................................................25
2.1 CC Conformance Claim.....................................................................25
2.2 PP Claims, Package Claims................................................................25
2.3 Conformance Rationale.....................................................................25
3 Security Problem Definitions...................................................................26
3.1 Threats.......................................................................................26
3.2 Organisational Security Policies...........................................................26
3.3 Assumptions .................................................................................27