Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria
Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria
Xerox WorkCentre 5135/5150 Multifunction Systems Security Target FCS_COP.1.1 The TSF shall perform [digital signature generation and verification, and key establishment] in accordance with a specified cryptographic algorithm [RSA (CAVP Certificate No. 719)] and cryptographic key sizes [1024 bits or smaller key sizes required for SSLv3.1 non-capable clients] that meet the following: [SSLv3.1 standard]. 5.3.2.2. FCS_COP.1 (SSL 2) Cryptographic operation Hierarchical to: Dependencies: FCS_COP.1.1 No other components. [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction The TSF shall perform [session encryption] in accordance with a specified cryptographic algorithm [TDES (CAVP Certificate No. 990)] and cryptographic key sizes [168 bits] that meet the following: [SSLv3.1 standard]. 5.3.2.3. FCS_COP.1 (SSL 3) Cryptographic operation Hierarchical to: Dependencies: FCS_COP.1.1 No other components. [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm [AES (CAVP Certificate No. 1472)] and cryptographic key sizes [256 bits] that meet the following: [SSLv3.1 standard]. 5.3.2.4. FCS_COP.1 (SSL 4) Cryptographic operation Hierarchical to: Dependencies: FCS_COP.1.1 No other components. [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction The TSF shall perform [cryptographic checksum generation and secure hash computation] in accordance with a specified cryptographic algorithm [SHA-1 (CAVP Certificate 44 Copyright 2009 Xerox Corporation, All rights reserved
Xerox WorkCentre 5135/5150 Multifunction Systems Security Target No. 1331)] and cryptographic key sizes [160 bits] that meet the following: [SSLv3.1 standard]. 5.3.2.5. FCS_COP.1 (UDE 1) Cryptographic operation Hierarchical to: Dependencies: FCS_COP.1.1 No other components. [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction The TSF shall perform [encryption and decryption] on user data stored on the HDD in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256 bit] that meet the following: [AES-256-FIPS-197 (CAVP Certificate No. 1471)]. 5.3.2.6. FCS_COP.1 (UDE 2) Cryptographic operation Hierarchical to: Dependencies: FCS_COP.1.1 No other components. [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction The TSF shall perform [cryptographic checksum generation and secure hash computation] in accordance with a specified cryptographic algorithm [SHA-1 (CAVP Certificate No. 1331)] and cryptographic key sizes [160 bits] that meet the following: [SSLv3.1 standard]. 5.3.3. Class FDP: User Data Protection 5.3.3.1. FDP_ACC.1 Subset access control Hierarchical to: No other components. Dependencies: FDP_ACF.1 Security attribute based access control FDP_ACC.1.1 The TSF shall enforce the [PrivUserAccess SFP] on [ Subjects: authorized users; Object: functions accessible via WebUI and Local UI; Operations: access management interfaces]. 45 Copyright 2009 Xerox Corporation, All rights reserved
- Page 1 and 2: Xerox WorkCentre 5135/5150 Multifun
- Page 3 and 4: Xerox WorkCentre 5135/5150 Multifun
- Page 5 and 6: Xerox WorkCentre 5135/5150 Multifun
- Page 7 and 8: Xerox WorkCentre 5135/5150 Multifun
- Page 9 and 10: Xerox WorkCentre 5135/5150 Multifun
- Page 11 and 12: Xerox WorkCentre 5135/5150 Multifun
- Page 13 and 14: Xerox WorkCentre 5135/5150 Multifun
- Page 15 and 16: Xerox WorkCentre 5135/5150 Multifun
- Page 17 and 18: Xerox WorkCentre 5135/5150 Multifun
- Page 19 and 20: Xerox WorkCentre 5135/5150 Multifun
- Page 21 and 22: Xerox WorkCentre 5135/5150 Multifun
- Page 23 and 24: Xerox WorkCentre 5135/5150 Multifun
- Page 25 and 26: Xerox WorkCentre 5135/5150 Multifun
- Page 27 and 28: Xerox WorkCentre 5135/5150 Multifun
- Page 29 and 30: Xerox WorkCentre 5135/5150 Multifun
- Page 31 and 32: Xerox WorkCentre 5135/5150 Multifun
- Page 33 and 34: Xerox WorkCentre 5135/5150 Multifun
- Page 35 and 36: Xerox WorkCentre 5135/5150 Multifun
- Page 37 and 38: Xerox WorkCentre 5135/5150 Multifun
- Page 39 and 40: Xerox WorkCentre 5135/5150 Multifun
- Page 41 and 42: Xerox WorkCentre 5135/5150 Multifun
- Page 43: Xerox WorkCentre 5135/5150 Multifun
- Page 47 and 48: Xerox WorkCentre 5135/5150 Multifun
- Page 49 and 50: Xerox WorkCentre 5135/5150 Multifun
- Page 51 and 52: Xerox WorkCentre 5135/5150 Multifun
- Page 53 and 54: Xerox WorkCentre 5135/5150 Multifun
- Page 55 and 56: Xerox WorkCentre 5135/5150 Multifun
- Page 57 and 58: Xerox WorkCentre 5135/5150 Multifun
- Page 59 and 60: Xerox WorkCentre 5135/5150 Multifun
- Page 61 and 62: O.AUDITS O.RECOVER O.FAXLINE O.MANA
- Page 63 and 64: Xerox WorkCentre 5135/5150 Multifun
- Page 65 and 66: Xerox WorkCentre 5135/5150 Multifun
- Page 67 and 68: Xerox WorkCentre 5135/5150 Multifun
- Page 69 and 70: Xerox WorkCentre 5135/5150 Multifun
- Page 71 and 72: Xerox WorkCentre 5135/5150 Multifun
- Page 73 and 74: Xerox WorkCentre 5135/5150 Multifun
- Page 75 and 76: Xerox WorkCentre 5135/5150 Multifun
- Page 77: Xerox WorkCentre 5135/5150 Multifun
<strong>Xerox</strong> <strong>WorkCentre</strong> <strong>5135</strong>/<strong>5150</strong><br />
<strong>Multifunction</strong> Systems Security Target<br />
No. 1331)] and cryptographic key sizes [160 bits] that meet<br />
the following: [SSLv3.1 standard].<br />
5.3.2.5. FCS_COP.1 (UDE 1) Cryptographic operation<br />
Hierarchical to:<br />
Dependencies:<br />
FCS_COP.1.1<br />
No other components.<br />
[FDP_ITC.1 Import of user data without security attributes, or<br />
FDP_ITC.2 Import of user data with security attributes, or<br />
FCS_CKM.1 Cryptographic key generation]<br />
FCS_CKM.4 Cryptographic key destruction<br />
The TSF shall perform [encryption and decryption] on user<br />
data stored on the HDD in accordance with a specified<br />
cryptographic algorithm [AES] and cryptographic key sizes<br />
[256 bit] that meet the following: [AES-256-FIPS-197 (CAVP<br />
Certificate No. 1471)].<br />
5.3.2.6. FCS_COP.1 (UDE 2) Cryptographic operation<br />
Hierarchical to:<br />
Dependencies:<br />
FCS_COP.1.1<br />
No other components.<br />
[FDP_ITC.1 Import of user data without security attributes, or<br />
FDP_ITC.2 Import of user data with security attributes, or<br />
FCS_CKM.1 Cryptographic key generation]<br />
FCS_CKM.4 Cryptographic key destruction<br />
The TSF shall perform [cryptographic checksum generation<br />
and secure hash computation] in accordance with a<br />
specified cryptographic algorithm [SHA-1 (CAVP Certificate<br />
No. 1331)] and cryptographic key sizes [160 bits] that meet<br />
the following: [SSLv3.1 standard].<br />
5.3.3. Class FDP: User Data Protection<br />
5.3.3.1. FDP_ACC.1 Subset access control<br />
Hierarchical to: No other components.<br />
Dependencies: FDP_ACF.1 Security attribute based access control<br />
FDP_ACC.1.1 The TSF shall enforce the [PrivUserAccess SFP] on [<br />
Subjects: authorized users;<br />
Object: functions accessible via WebUI and Local UI;<br />
Operations: access management interfaces].<br />
45<br />
Copyright 2009 <strong>Xerox</strong> Corporation, All rights reserved