- ii -
- 目次 -
1. ST 概説 (ST Introduction) .................................................. 1
1.1. ST 参照 (ST Reference) ................................................................ 1
1.2. TOE 参照 (TOE Reference) ............................................................. 1
1.3. TOE 概要 (TOE Overview) ............................................................. 1
1.3.1. TOE 種別および主要セキュリティ機能 (TOE Type and Major Security Features) ... 1
1.3.2. TOE 利用環境 (Environment Assumptions) ........................................... 4
1.3.3. TOE 以外のハードウェア構成とソフトウェア構成 (Required Non-TOE Hardware and
Software) ...................................................................................... 4
1.4. TOE 記述 (TOE Description) ........................................................... 6
1.4.1. TOE 関連の利用者役割 (User Assumptions) ............................................ 6
1.4.2. TOE の論理的範囲 (Logical Scope and Boundary) ................................... 6
1.4.3. TOE の物理的範囲 (Physical Scope and Boundary) ............................... 14
1.4.4. ガイダンス (Guidance) ....................................................................... 15
2. 適合主張 (Conformance Claim) .......................................... 16
2.1. CC 適合主張 (CC Conformance Claim) ........................................... 16
2.2. PP 主張、パッケージ主張 (PP claim, Package Claim) .............................. 16
2.2.1. PP 主張 (PP Claim) ......................................................................... 16
2.2.2. パッケージ主張 (Package Claim) .......................................................... 16
2.2.3. 適合根拠 (Conformance Rational) ..................................................... 17
3. セキュリティ課題定義 (Security Problem Definition) .................... 19
3.1. 脅威 (Threats) ........................................................................... 19
3.1.1. TOE 資産 (Assets Protected by TOE) ................................................. 19
3.1.2. 脅威エージェント (Threats agents) ........................................................ 21
3.1.3. 脅威 (Threats) .............................................................................. 22
3.2. 組織のセキュリティ方針 (Organizational Security Policies) ....................... 22
3.3. 前提条件 (Assumptions) .............................................................. 23
4. セキュリティ対策方針 (Security Objectives) ............................... 24
4.1. TOE のセキュリティ対策方針 (Security Objectives for the TOE) ................ 24
4.2. 運用環境のセキュリティ対策方針 (Security Objectives for the Environment) 25
4.3. セキュリティ対策方針根拠 (Security Objectives Rationale) ...................... 26