Xerox Multi-Function Device Security Target
5
Copyright
ļ£
2013 Xerox Corporation. All rights reserved.
List of Figures
FIGURE 1: XEROX WORKCENTRE 5845/5855/5865/5875/5890 ...................................................................... 7
FIGURE 2: XEROX WORKCENTRE 7220/7225 .................................................................................................. 8
FIGURE 3: XEROX WORKCENTRE 7830/7835/7845/7855 ............................................................................... 8
FIGURE 4: XEROX COLORQUBE 9301/9302/9303 ........................................................................................... 8
List of Tables
TABLE 1: ST AND TOE IDENTIFICATION ............................................................................................................. 6
TABLE 2: MODELS AND CAPABILITIES ............................................................................................................... 9
TABLE 3: EVALUATED SOFTWARE VERSION ...................................................................................................... 11
TABLE 4: SYSTEM USER AND ADMINISTRATOR GUIDANCE .................................................................................. 11
TABLE 5: IEEE STD. 2600.2-2009 COMMON SFR AUGMENTATIONS .................................................................. 17
TABLE 6: IEEE STD. 2600.2-2009 PACKAGE AUGMENTATIONS .......................................................................... 18
TABLE 7: USERS ......................................................................................................................................... 19
TABLE 8: USER DATA .................................................................................................................................. 20
TABLE 9: TSF DATA .................................................................................................................................... 20
TABLE 10: TSF DATA CATEGORIZATION .......................................................................................................... 20
TABLE 11: SFR PACKAGE FUNCTIONS FOR IEEE STD. 2600.2-2009 ................................................................... 21
TABLE 12: ASSUMPTIONS FOR THE TOE ......................................................................................................... 22
TABLE 13: THREATS TO USER DATA ................................................................................................................ 23
TABLE 14: THREATS TO TSF DATA ................................................................................................................. 23
TABLE 15: ORGANIZATIONAL SECURITY POLICIES.............................................................................................. 24
TABLE 16: SECURITY OBJECTIVES FOR THE TOE ................................................................................................ 25
TABLE 17: SECURITY OBJECTIVES FOR THE IT ENVIRONMENT ............................................................................... 26
TABLE 18: SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT ....................................................................... 27
TABLE 19: COMPLETENESS OF SECURITY OBJECTIVES ......................................................................................... 28
TABLE 20: SUFFICIENCY OF SECURITY OBJECTIVES ............................................................................................. 28
TABLE 21: USER ACCESS CONTROL SFP .......................................................................................................... 37
TABLE 22: ATTRIBUTES DEFINITION ................................................................................................................ 38
TABLE 23: TOE SECURITY FUNCTIONAL REQUIREMENTS ..................................................................................... 40
TABLE 24: AUDIT DATA REQUIREMENTS .......................................................................................................... 42
TABLE 25: CRYPTOGRAPHIC OPERATIONS ........................................................................................................ 43
TABLE 26: CRYPTOGRAPHIC KEY GENERATION .................................................................................................. 44
TABLE 27: CRYPTOGRAPHIC KEY DISTRIBUTION ................................................................................................. 45
TABLE 28: IEEE 2600.2 SECURITY ASSURANCE REQUIREMENTS ........................................................................... 56
TABLE 29: COMPLETENESS OF SECURITY FUNCTIONAL REQUIREMENTS ................................................................... 58
TABLE 30: SUFFICIENCY OF SECURITY FUNCTIONAL REQUIREMENTS ....................................................................... 59
TABLE 31: SFR DEPENDENCIES SATISFIED ........................................................................................................ 65
TABLE 32: EAL2 (AUGMENTED WITH ALC_FLR.3) SAR DEPENDENCIES SATISFIED .................................................. 67
TABLE 33: ACRONYMS ................................................................................................................................. 81