
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 46 -
interrupted such as by power shutdown, re-overwriting and re-erasing is performed at the next
power-on. Therefore, non-bypassability is ensured.
The TOE security function (FIA_AFL.1) is configured by unique software that does not have
bypass measures, and cannot be replaced with another module. The function to cancel
authentication-denial status does not exist. Therefore, non-bypassability is ensured.
The TOE security functions (FIA_UID.2, FIA_UAU.2, and FIA_UAU.7) are configured by unique
software that does not have bypass measures, and cannot be replaced with other modules.
Also, function of identification and authentication is always performed when TOE setting data is
accessed. Therefore, “user identification before any action,” “user authentication before any
action,” and “protected authentication-feedback” cannot be circumvented, and
non-bypassability is ensured.
Deactivation
FMT_MOF.1 (1)
FMT_MOF.1 (1) assures the protection of the HDD overwriting function for residual data
(FDP_RIP.1) from being deactivated by a user other than key operator.
FMT_MOF.1 (2)
FMT_MOF.1 (2) assures the protection of the HDD data encryption function (FCS_CKM.1 and
FCS_COP.1) from being deactivated by a user other than key operator.
FMT_MOF.1 (3)
FMT_MOF.1 (3) assures the protection of the key-operator authentication function
(FIA_UAU.2) from being deactivated by a user other than key operator.
8.2.2. Security Assurance Requirements Rationale
Attacker has low-level attack capability and attacks using TOE’s external interfaces such as control
panel or Web browser of key-operator’s client. Therefore, evaluation assurance level EAL2 is
appropriate because TOE needs to counter low-level attack by an attacker.
Komentarze do niniejszej Instrukcji