fuji xerox apeosport 750 i/650 i, docucentre 750 i/650 i ... - 2 - revision history no. date version...

Click here to load reader

Post on 26-Jul-2020

0 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • - 1 -

    26 July 2006

    Version: V1.03

    This document is a translation of the evaluated and certified security target written in Japanese

    Fuji Xerox Co., Ltd.

    Fuji Xerox

    ApeosPort 750 I/650 I,

    DocuCentre 750 I/650 I Series

    Data Security Kit

    Security Target

  • - 2 -

    Revision History No. Date Version Description 1 June 9, 2006 V1.00 First draft. 2 June 21, 2006 V1.01 Responded to the remarks and reports (ASE-001-01), etc. 3 July 3, 2006 V1.02 Changed the name of Documents, etc. 4 July 26, 2006 V1.03 Changed the name of Documents, etc. 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

  • - 3 -

    -Contents-

    1. ST Introduction .................................................................... 1 1.1. ST Identification .............................................................................................................................................................................................................1 1.2. ST Overview ....................................................................................................................................................................................................................1 1.3. Evaluation Assurance Level ...................................................................................................................................................................................1 1.4. Applicable PP..................................................................................................................................................................................................................2 1.5. Related ST........................................................................................................................................................................................................................2 1.6. CC Conformance ..........................................................................................................................................................................................................2 1.7. Abbreviated Terms .......................................................................................................................................................................................................2 1.8. Terms ...................................................................................................................................................................................................................................2 1.9. Reference..........................................................................................................................................................................................................................7

    2. TOE Description ................................................................... 7 2.1. Type of TOE.....................................................................................................................................................................................................................7 2.2. Usage Environment of TOE....................................................................................................................................................................................8 2.3. Purpose of Using TOE...............................................................................................................................................................................................9 2.4. Configuration of TOE ..................................................................................................................................................................................................9 2.4.1. Physical Configuration.......................................................................................................................................................................................9 2.4.2. Logical Configuration ...................................................................................................................................................................................... 10

    2.5. Persons Related to TOE........................................................................................................................................................................................ 15 2.6. Assets protected by TOE ...................................................................................................................................................................................... 16 2.7. Functions of TOE ....................................................................................................................................................................................................... 17 2.7.1. Security Functions of TOE .......................................................................................................................................................................... 17 2.7.2. Non-Security Function of TOE.................................................................................................................................................................. 17

    2.8. How to Use TOE ........................................................................................................................................................................................................ 18 3. TOE Security Environment ......................................................... 21

    3.1. Assumptions ................................................................................................................................................................................................................. 21 3.2. Threats............................................................................................................................................................................................................................. 21 3.3. Organizational Security Policies ....................................................................................................................................................................... 21

    4. Security Objectives ............................................................... 22 4.1. Security Objectives for the TOE........................................................................................................................................................................ 22 4.2. Security Objectives for the Environment ...................................................................................................................................................... 22 4.2.1. Security Objectives for IT Environment ................................................................................................................................................ 22 4.2.2. Security Objectives for Operation and Management....................................................................................................................... 22

    5. IT Security Requirements .......................................................... 23 5.1. TOE Security Functional Requirements ....................................................................................................................................................... 23 5.1.1. Class FCS: Cryptographic Support .......................................................................................................................................................... 23 5.1.2. Class FDP: User Data Protection............................................................................................................................................................. 24

  • - 4 -

    5.1.3. Class FIA: Identification and Authentication........................................................................................................................................ 24 5.1.4. Class FMT: Security Management............................................................................................................................................................ 25 5.1.5. Class FPT: TSF Protection.......................................................................................................................................................................... 29

    5.2. TOE Security Assurance Requirements ....................................................................................................................................................... 29 5.3. Security Functional Requirement for IT Environment........................................................................................................................... 30 5.4. Claim of TOE Security Function Strength.................................................................................................................................................... 30

    6. TOE Summary Specification........................................................ 31 6.1. TOE Security Functions ......................................................................................................................................................................................... 31 6.1.1. HDD Overwriting Function for Residual Data (SF.OVERWRITE)................................................................................................ 31 6.1.2. HDD Data Encryption Function (SF.ENCRYPTION)......................................................................................................................... 32 6.1.3.

View more