Digital Data Communications LEVEL ONE FCS-4300 Podręcznik Użytkownika Strona 53

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 57
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 52
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 49 -
- SF. MANAGE
By
SF. MANAGE, TOE allows the authenticated key-operator to
define and change the key-operators password related to the determination of the
behavior of the TOE security function “key-operator authentication function.”
FMT_MTD.1(1)
By the following security function, FMT_MTD.1(1), the TSF data management, can be
assured because the person who changes the TOE setting data for “setting for using
password” and “access denial due to failure in authentication of key-operator’s ID” is
limited to key operator:
-
SF. MANAGE
By
SF. MANAGE, TOE allows the authenticated key-operator to change the TOE
setting data for “setting for using password” and “access denial due to failure in
authentication of key-operator’s ID.”
FMT_MTD.1(2)
By the following security function, FMT_MTD.1(2), the TSF data management, can be
assured because the person who changes the TOE setting data for “cryptographic seed
key for data stored on the hard disk drive” is limited to key operator:
-
SF. MANAGE
By
SF. MANAGE, TOE allows the authenticated key-operator to change the TOE
setting data for “cryptographic seed key for data stored on the hard disk drive.
FMT_MTD.1(3)
By the following security function, FMT_MTD.1(3), the TSF data management, can be
assured because the person who changes the TOE setting data for “setting for
customer-engineer operation restriction function” is limited to key operator:
-
SF. CEREST
By
SF. CEREST, TOE restricts customer engineer from changing the TOE setting data
for “setting for customer-engineer operation restriction function.”
FMT_SMF.1
- MANAGE
By
MANAGE, TOE allows the authenticated key-operator to change TOE setting data.
FMT_SMR.1
By the following security function, FMT_SMR.1, the security management roles, can be
assured:
-
SF.MANAGE
By
SF.MANAGE, the role of key operator is maintained and user is associated with
roles.
FPT_RVM.1 By the following security functions, FPT_RVM.1, the non-bypassability of TSP, can be
assured:
-
SF.ENCRYPTION, SF.OVERWRITE, SF.MANAGE, and SF.CEREST
SF.ENCRYPTION, SF.OVERWRITE, SF.MANAGE, and SF.CEREST are configured to
certainly operate because they are configured by unique software that does not have
bypass measures.
(3) Security Function Strength
Among TOE security functions, the function that is realized using probabilistic or permutational
mechanisms is the key-operator authentication function (SF.MANAGE). Its function strength is
SOF-basic. This satisfies the minimum function strength level SOF-basic that is claimed in “5.4.
Claim of TOE Security Function Strength.”
8.3.2. Assurance Measures Rationale
Rationales for the necessity and sufficiency of assurance measures are described below.
(1) Necessity
The following describes that all the assurance measures described in 6.2. are necessary to realize
the security assurance requirements.
All assurance measures are necessary to realize EAL2 security assurance requirements.
Table 21: Correspondences between Assurance Measures and Security Assurance Requirements
Przeglądanie stron 52
1 2 ... 48 49 50 51 52 53 54 55 56 57

Komentarze do niniejszej Instrukcji

Brak uwag