Xerox Multi-Function Device Security Target
3
Copyright
ļ£
2013 Xerox Corporation. All rights reserved.
Table of Contents
1. INTRODUCTION ........................................................................................................ 6
1.1. ST AND TOE IDENTIFICATION ....................................................................................................... 6
1.2. TOE OVERVIEW ........................................................................................................................ 7
1.2.1. Usage and Security Features ............................................................................................ 7
1.2.2. TOE Type ........................................................................................................................ 10
1.2.3. Required Non-TOE Hardware, Software and Firmware ................................................. 10
1.3. TOE DESCRIPTION ................................................................................................................... 11
1.3.1. Physical Scope of the TOE .............................................................................................. 11
1.3.2. Logical Scope of the TOE ................................................................................................ 12
1.4. EVALUATED CONFIGURATION ..................................................................................................... 15
2. CONFORMANCE CLAIMS ...................................................................................... 16
2.1. COMMON CRITERIA CONFORMANCE CLAIMS ................................................................................ 16
2.2. PROTECTION PROFILE CLAIMS .................................................................................................... 16
2.3. PACKAGE CLAIMS .................................................................................................................... 16
2.4. RATIONALE ............................................................................................................................. 17
3. SECURITY PROBLEM DEFINITION ....................................................................... 19
3.1. DEFINITIONS ........................................................................................................................... 19
3.1.1. Users .............................................................................................................................. 19
3.1.2. Objects (Assets) .............................................................................................................. 19
3.1.3. Operations...................................................................................................................... 21
3.1.4. Channels ......................................................................................................................... 21
3.2. ASSUMPTIONS......................................................................................................................... 22
3.3. THREATS ................................................................................................................................ 23
3.3.1. Threats Addressed by the TOE ....................................................................................... 23
3.3.2. Threats Addressed by the IT Environment...................................................................... 23
3.4. ORGANIZATIONAL SECURITY POLICIES .......................................................................................... 24
4. SECURITY OBJECTIVES ........................................................................................ 25
4.1. SECURITY OBJECTIVES FOR THE TOE ............................................................................................ 25
4.2. SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT .......................................................... 26
4.3. SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT .................................................................. 27
4.4. RATIONALE FOR SECURITY OBJECTIVES ......................................................................................... 27
5. EXTENDED COMPONENTS DEFINITION .............................................................. 33
5.1. FPT_FDI_EXP RESTRICTED FORWARDING OF DATA TO EXTERNAL INTERFACES .................................... 33
6. SECURITY REQUIREMENTS ................................................................................. 36
6.1. CONVENTIONS ........................................................................................................................ 36
6.2. TOE SECURITY POLICIES ............................................................................................................ 37
6.2.1. IP Filter SFP ..................................................................................................................... 37
6.2.2. User Access Control SFP ................................................................................................. 37
6.2.3. TOE Function Access Control SFP ................................................................................... 39
6.3. SECURITY FUNCTIONAL REQUIREMENTS ....................................................................................... 40
6.3.1. Class FAU: Security audit ................................................................................................ 41
6.3.2. Class FCO: Communication ............................................................................................ 43
6.3.3. Class FCS: Cryptographic support ................................................................................... 43