Xerox Multi-Function Device Security Target
43
Copyright
2013 Xerox Corporation. All rights reserved.
FAU_STG.1.2: The TSF shall be able to prevent unauthorized
modifications to the stored audit records in the audit trail.
6.3.1.4. FAU_STG.4 Prevention of audit data loss
Hierarchical to: FAU_STG.3.
Dependencies: FAU_STG.1 Protected audit trail storage
FAU_STG.4.1: The TSF shall overwrite the oldest stored audit records
and [generate an email warning at 90%] if the audit trail is
full.
6.3.2. Class FCO: Communication
There are no Class FCO security functional requirements for this ST.
6.3.3. Class FCS: Cryptographic support
6.3.3.1. FCS_COP.1 Cryptographic operation
Hierarchical to: No other components.
Dependencies: [FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1 The TSF shall perform [the cryptographic operations
listed in the Cryptographic Operations column of Table
25] in accordance with a specified cryptographic
algorithm [the cryptographic algorithms listed in the
Cryptographic Algorithm column of Table 25] and
cryptographic key sizes [the cryptographic key sizes
listed in the Key Sizes (bits) column of Table 25] that
meet the following: [the list of standards in the Standards
column of Table 25].
Table 25: Cryptographic operations
Symmetric encryption and
decryption
FIPS 46-3 (cert #826
and #1174)
FIPS 197 (cert #1131
and #1821)