Page 61 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
TOE security
functional
requirements
Dependencies
claimed by CC
Dependencies
satisfied in ST
Dependencies not
satisfied in ST
FDP_IFC.1 FDP_IFF.1 FDP_IFF.1 None
FDP_IFF.1 FDP_IFC.1
FMT_MSA.3
FDP_IFC.1
FMT_MSA.3
None
FIA_AFL.1 FIA_UAU.1 FIA_UAU.2 FIA_UAU.1
FIA_ATD.1 None None None
FIA_SOS.1 None None None
FIA_UAU.2 FIA_UID.1 FIA_UID.2 FIA_UID.1
FIA_UAU.7 FIA_UAU.1 FIA_UAU.2 FIA_UAU.1
FIA_UID.2 None None None
FIA_USB.1 FIA_ATD.1 FIA_ATD.1 None
FMT_MSA.1
[FDP_ACC.1 or
FDP_IFC.1]
FMT_SMF.1
FMT_SMR.1
FDP_ACC.1
FMT_SMF.1
FMT_SMR.1
None
FMT_MSA.3 FMT_MSA.1
FMT_SMR.1
FMT_MSA.1
FMT_SMR.1
None
FMT_MTD.1 FMT_SMF.1
FMT_SMR.1
FMT_SMF.1
FMT_SMR.1
None
FMT_SMF.1 None None None
FMT_SMR.1 FIA_UID.1 FIA_UID.2 FIA_UID.1
FPT_STM.1 None None None
FPT_TST.1 None None None
FTP_ITC.1 None None None
FTP_TRP.1 None None None
The following explains the rationale of acceptability in all cases where a dependency is not satisfied.
Rationale for Removing Dependencies on FCS_CKM.4
In this TOE, the HDD encryption keys are stored in an area that cannot be accessed from outside the Ic Hdd.
In addition, after the administrator generates the encryption keys at the start of TOE operation, deletion of
the older encryption keys is not performed: they are overwritten with the new encryption keys. For these
reasons, encryption key destruction by the standard method is unnecessary.
Rationale for Removing Dependencies on FIA_UAU.1
Since this TOE employs FIA_UAU.2, which is hierarchical to FIA_UAU.1, the dependency on FIA_UAU.1
is satisfied by FIA_AFL.1 and FIA_UAU.7.