Xerox Multi-Function Device Security Target
45
Copyright
2013 Xerox Corporation. All rights reserved.
FCS_CKM.2.1 The TSF shall distribute cryptographic keys in
accordance with a specified cryptographic key distribution
method [the method shown for each related protocol in
Table 27] that meet the following: [standards shown in
Table 27].
Table 27: Cryptographic key distribution
TLS (client server
authentication)
RSA encrypted exchange of
session keys for TLS handshake
Digital certificates for public keys
RFC 5280
(certificate format)
Diffie-Hellman key exchange
Diffie-Hellman key exchange
6.3.3.4. FCS_CKM.4 Cryptographic key destruction
Hierarchical to: No other components
Dependencies: [FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance
with a specified cryptographic key destruction method
[semiconductor memory state loss at power-down,
semiconductor memory zeroization at power-up] that
meets the following: [None].
6.3.4. Class FDP: User data protection
6.3.4.1. FDP_ACC.1 (USER) Subset access control
Hierarchical to: No other components.
Dependencies: FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1 (USER) The TSF shall enforce the [User Access Control
SFP in Table 21] on [the list of users as subjects, objects,
and operations among subjects and objects covered by
the User Access Control SFP in Table 21].
Application Note: This SFR covers FDP_ACC.1 (a) and FDP_ACC.1 from
all claimed packages (PRT, SCN, CPY, FAX, DSR) in the IEEE Std. 2600.2
PP.