Xerox Multi-Function Device Security Target
4
Copyright
2013 Xerox Corporation. All rights reserved.
6.3.4. Class FDP: User data protection ..................................................................................... 45
6.3.5. Class FIA: Identification and authentication .................................................................. 48
6.3.6. Class FMT: Security management .................................................................................. 50
6.3.7. Class FPR: Privacy ........................................................................................................... 54
6.3.8. Class FPT: Protection of the TSF ..................................................................................... 54
6.3.9. Class FTA: TOE access ..................................................................................................... 55
6.3.10. Class FTP: Trusted paths/channels ............................................................................ 55
6.4. EXPLICITLY STATED REQUIREMENTS FOR THE TOE .......................................................................... 56
6.4.1. FPT_FDI_EXP.1 Restricted forwarding of data to external interfaces ............................ 56
6.5. TOE SECURITY ASSURANCE REQUIREMENTS ................................................................................. 56
6.6. RATIONALE FOR SECURITY FUNCTIONAL REQUIREMENTS ................................................................. 57
6.7. RATIONALE FOR SECURITY ASSURANCE REQUIREMENTS ................................................................... 64
6.8. RATIONALE FOR DEPENDENCIES .................................................................................................. 65
6.8.1. Security Functional Requirement Dependencies ............................................................ 65
6.8.2. Security Assurance Requirement Dependencies ............................................................ 67
7. TOE SUMMARY SPECIFICATION .......................................................................... 69
7.1. TOE SECURITY FUNCTIONS ........................................................................................................ 69
7.1.1. Image Overwrite (TSF_IOW) .......................................................................................... 69
7.1.2. Information Flow Security (TSF_FLOW) .......................................................................... 70
7.1.3. Authentication (TSF_ AUT) ............................................................................................. 71
7.1.4. Network Identification (TSF_NET_ID) ............................................................................. 71
7.1.5. Security Audit (TSF_FAU) ................................................................................................ 72
7.1.6. Cryptographic Operations (TSF_FCS) ............................................................................. 72
7.1.7. User Data Protection – Disk Encryption (TSF_FDP_UDE) ............................................... 73
7.1.8. User Data Protection – IP Filtering (TSF_FDP_FILTER) ................................................... 73
7.1.9. Network Security (TSF_NET_SEC) ................................................................................... 73
7.1.10. Security Management (TSF_FMT) ............................................................................. 73
8. GLOSSARY.............................................................................................................. 77
9. ACRONYMS ............................................................................................................. 81
10. BIBLIOGRAPHY ...................................................................................................... 83