Xerox® Security Guide for Light Production Mono Class Products
Table of Contents
1 INTRODUCTION ................................................................................................................................... 3
PURPOSE .................................................................................................................................................... 3
TARGET AUDIENCE ...................................................................................................................................... 3
DISCLAIMER ................................................................................................................................................. 3
PHYSICAL COMPONENTS .............................................................................................................................. 4
ARCHITECTURE ............................................................................................................................................ 4
USER INTERFACE ......................................................................................................................................... 5
SCANNER .................................................................................................................................................... 5
MARKING ENGINE ........................................................................................................................................ 6
CONTROLLER .............................................................................................................................................. 6
OPTIONAL EQUIPMENT ................................................................................................................................. 8
2 USER DATA PROTECTION ................................................................................................................. 9
USER DATA PROTECTION WHILE WITHIN PRODUCT ......................................................................................... 9
USER DATA IN TRANSIT .............................................................................................................................. 10
3 NETWORK SECURITY ....................................................................................................................... 12
TCP/IP PORTS & SERVICES ....................................................................................................................... 12
NETWORK ENCRYPTION ............................................................................................................................. 19
NETWORK ACCESS CONTROL ..................................................................................................................... 24
CONTEXTUAL ENDPOINT CONNECTION MANAGEMENT .................................................................................. 25
FIPS140-2 COMPLIANCE VALIDATION......................................................................................................... 25
ADDITIONAL NETWORK SECURITY CONTROLS ............................................................................................. 25
4 DEVICE SECURITY: BIOS, FIRMWARE, OS, RUNTIME, AND OPERATIONAL SECURITY
CONTROLS ................................................................................................................................................ 27
FAIL SECURE VS FAIL SAFE........................................................................................................................ 27
PRE-BOOT SECURITY................................................................................................................................. 28
BOOT PROCESS SECURITY ......................................................................................................................... 28
RUNTIME SECURITY ................................................................................................................................... 28
EVENT MONITORING & LOGGING ................................................................................................................ 29
OPERATIONAL SECURITY ............................................................................................................................ 29
BACKUP & RESTORE (CLONING) ................................................................................................................. 30
EIP APPLICATIONS ..................................................................................................................................... 30
5 CONFIGURATION & SECURITY POLICY MANAGEMENT SOLUTIONS ........................................ 31
6 IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION ..................................................... 32
AUTHENTICATION ....................................................................................................................................... 32
AUTHORIZATION (ROLE BASED ACCESS CONTROLS) ................................................................................... 35
7 ADDITIONAL INFORMATION & RESOURCES ................................................................................. 38
SECURITY @ XEROX® ............................................................................................................................... 38
RESPONSES TO KNOWN VULNERABILITIES .................................................................................................. 38
ADDITIONAL RESOURCES ........................................................................................................................... 38
APPENDIX A: PRODUCT SECURITY PROFILES ................................................................................... 39
LEGACY® 4110, 4112/4127, 4590 EPS PRINTERS.................................................................................... 40
LEGACY® 4110, 4112/4127, 4590 COPIER/PRINTERS ................................................................................ 43
D-SERIES® D95A/D110/D125/D136 COPIER/PRINTERS ............................................................................ 46