19.06.2014 Views

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

Xerox WorkCentre 5632/5638/5645/5655 - Common Criteria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Xerox</strong> <strong>WorkCentre</strong> <strong>5632</strong>/<strong>5638</strong>/<strong>5645</strong>/<strong>5655</strong>/5665/5675/5687<br />

Multifunction Systems Security Target<br />

Table of Contents<br />

1. SECURITY TARGET INTRODUCTION .............................................7<br />

1.1. ST and TOE Identification ........................................................ 7<br />

1.2. TOE Overview .......................................................................... 8<br />

1.2.1. Usage and Major Security Features ...................................... 8<br />

1.2.2. TOE Type ........................................................................... 11<br />

1.2.3. Required Non-TOE Hardware, Software and Firmware ...... 11<br />

1.3. TOE Description ..................................................................... 11<br />

1.3.1. Physical Scope of the TOE ................................................. 11<br />

1.3.2. Logical Scope of the TOE ................................................... 13<br />

1.3.2.1. Image Overwrite (TSF_IOW).............................................. 13<br />

1.3.2.2. Authentication (TSF_AUT) ................................................. 14<br />

1.3.2.3. Network Identification (TSF_NET_ID)................................. 15<br />

1.3.2.4. Security Audit (TSF_FAU) .................................................. 15<br />

1.3.2.5. Cryptographic Operations (TSF_FCS)................................ 15<br />

1.3.2.6. Management Data Protection – SSL (TSF_FDP_SSL)....... 16<br />

1.3.2.7. User Data Protection – IP Filtering (TSF_FDP_FILTER) .... 16<br />

1.3.2.8. Information Flow Security (TSF_FLOW)............................. 16<br />

1.3.2.9. Security Management (TSF_FMT) ..................................... 16<br />

1.3.2.10. User Data Protection - AES (TSF_EXP_UDE) ................. 17<br />

1.3.3. Evaluated Configuration ..................................................... 17<br />

2. CONFORMANCE CLAIMS ............................................................... 18<br />

2.1. <strong>Common</strong> <strong>Criteria</strong> Conformance Claims .................................. 18<br />

2.2. Protection Profile Claims ........................................................ 18<br />

2.3. Package Claims ..................................................................... 18<br />

3. SECURITY PROBLEM DEFINITION ................................................ 20<br />

3.1. Definitions .............................................................................. 20<br />

3.1.1. CC Terms ........................................................................... 20<br />

3.1.2. Subjects .............................................................................. 20<br />

3.1.3. Objects ............................................................................... 21<br />

3.1.4. Information ......................................................................... 21<br />

3.2. Assumptions .......................................................................... 21<br />

3.3. Threats................................................................................... 23<br />

3.3.1. Threats Addressed by the TOE........................................... 23<br />

3.3.2. Threats Addressed by the IT Environment .......................... 24<br />

3<br />

Copyright 2009 <strong>Xerox</strong> Corporation, All rights reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!