Page 52 of 93
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
FAU_SAR.2 Restricted audit review
Hierarchical to: No other components.
Dependencies: FAU_SAR.1 Audit review
FAU_SAR.2.1 The TSF shall prohibit all users read access to the audit records, except those users that have
been granted explicit read-access.
6.1.2 Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to: No other components.
Dependencies: [FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorithm in Table 13] and
specified cryptographic key sizes [assignment: cryptographic key sizes in Table 13] that
meet the following: [assignment: standards in Table 13].
Table 13 : List of Cryptographic Key Generation
Key Type Standard Cryptographic Key
Generation Algorithm
Cryptographic
Key Size
HDD cryptographic key BSI-AIS31 TRNG 256 bits
FCS_COP.1 Cryptographic operation
Hierarchical to: No other components.
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1 The TSF shall perform [assignment: cryptographic operations shown in Table 14] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in Table 14] and cryptographic key sizes [assignment: cryptographic key sizes shown
in Table 14] that meet the following: [assignment: standards shown in Table 14].
Table 14 : List of Cryptographic Operation
Key Type Standard Cryptographic
Algorithm
Cryptographic
Key Size
Cryptographic Operation
HDD
cryptographic
key
FIPS197 AES 256 bits - Encryption when writing the data
on HDD
- Decr