EasyManuals Logo
Home>Xerox>All in One Printer>WorkCentre 7225

Xerox WorkCentre 7225 User Information

Xerox WorkCentre 7225
83 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
Xerox Multi-Function Device Security Target
5
Copyright

2013 Xerox Corporation. All rights reserved.
List of Figures
FIGURE 1: XEROX WORKCENTRE 5845/5855/5865/5875/5890 ...................................................................... 7
FIGURE 2: XEROX WORKCENTRE 7220/7225 .................................................................................................. 8
FIGURE 3: XEROX WORKCENTRE 7830/7835/7845/7855 ............................................................................... 8
FIGURE 4: XEROX COLORQUBE 9301/9302/9303 ........................................................................................... 8
List of Tables
TABLE 1: ST AND TOE IDENTIFICATION ............................................................................................................. 6
TABLE 2: MODELS AND CAPABILITIES ............................................................................................................... 9
TABLE 3: EVALUATED SOFTWARE VERSION ...................................................................................................... 11
TABLE 4: SYSTEM USER AND ADMINISTRATOR GUIDANCE .................................................................................. 11
TABLE 5: IEEE STD. 2600.2-2009 COMMON SFR AUGMENTATIONS .................................................................. 17
TABLE 6: IEEE STD. 2600.2-2009 PACKAGE AUGMENTATIONS .......................................................................... 18
TABLE 7: USERS ......................................................................................................................................... 19
TABLE 8: USER DATA .................................................................................................................................. 20
TABLE 9: TSF DATA .................................................................................................................................... 20
TABLE 10: TSF DATA CATEGORIZATION .......................................................................................................... 20
TABLE 11: SFR PACKAGE FUNCTIONS FOR IEEE STD. 2600.2-2009 ................................................................... 21
TABLE 12: ASSUMPTIONS FOR THE TOE ......................................................................................................... 22
TABLE 13: THREATS TO USER DATA ................................................................................................................ 23
TABLE 14: THREATS TO TSF DATA ................................................................................................................. 23
TABLE 15: ORGANIZATIONAL SECURITY POLICIES.............................................................................................. 24
TABLE 16: SECURITY OBJECTIVES FOR THE TOE ................................................................................................ 25
TABLE 17: SECURITY OBJECTIVES FOR THE IT ENVIRONMENT ............................................................................... 26
TABLE 18: SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT ....................................................................... 27
TABLE 19: COMPLETENESS OF SECURITY OBJECTIVES ......................................................................................... 28
TABLE 20: SUFFICIENCY OF SECURITY OBJECTIVES ............................................................................................. 28
TABLE 21: USER ACCESS CONTROL SFP .......................................................................................................... 37
TABLE 22: ATTRIBUTES DEFINITION ................................................................................................................ 38
TABLE 23: TOE SECURITY FUNCTIONAL REQUIREMENTS ..................................................................................... 40
TABLE 24: AUDIT DATA REQUIREMENTS .......................................................................................................... 42
TABLE 25: CRYPTOGRAPHIC OPERATIONS ........................................................................................................ 43
TABLE 26: CRYPTOGRAPHIC KEY GENERATION .................................................................................................. 44
TABLE 27: CRYPTOGRAPHIC KEY DISTRIBUTION ................................................................................................. 45
TABLE 28: IEEE 2600.2 SECURITY ASSURANCE REQUIREMENTS ........................................................................... 56
TABLE 29: COMPLETENESS OF SECURITY FUNCTIONAL REQUIREMENTS ................................................................... 58
TABLE 30: SUFFICIENCY OF SECURITY FUNCTIONAL REQUIREMENTS ....................................................................... 59
TABLE 31: SFR DEPENDENCIES SATISFIED ........................................................................................................ 65
TABLE 32: EAL2 (AUGMENTED WITH ALC_FLR.3) SAR DEPENDENCIES SATISFIED .................................................. 67
TABLE 33: ACRONYMS ................................................................................................................................. 81

Table of Contents

Other manuals for Xerox WorkCentre 7225

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Xerox WorkCentre 7225 and is the answer not in the manual?

Xerox WorkCentre 7225 Specifications

General IconGeneral
BrandXerox
ModelWorkCentre 7225
CategoryAll in One Printer
LanguageEnglish

Related product manuals