Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria

Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria Xerox WorkCentre 5135/5150 Multifunction ... - Common Criteria

cse.cst.gc.ca
from cse.cst.gc.ca More from this publisher
19.06.2014 Views

Xerox WorkCentre 5135/5150 Multifunction Systems Security Target 5.3.7. Class FTP: Trusted path/channels 5.3.7.1. FTP_TRP.1 Trusted path (NOTE: SSLSec SFP) Hierarchical to: Dependencies: FTP_TRP.1.1 FTP_TRP.1.2 No other components. No dependencies The TSF shall provide a communication path between itself and remote users that is logically distinct from other communication paths and provides assured identification of its end points and protection of the communicated data from modification or disclosure. The TSF shall permit remote users to initiate communication via the trusted path. FTP_TRP.1.3 The TSF shall require use of the trusted path for [ the security management functions available to the system administrator from the Web UI]. 5.4. TOE Security Assurance Requirements Table 12 identifies the security assurance components drawn from CC Part 3 Security Assurance Requirements EAL3 and includes the augmented SAR, ALC_FLR.3. The SARs are not iterated or refined from Part 3. Table 12: EAL3 (augmented with ALC_FLR.3) Assurance Requirements Assurance Component Assurance Component Name Dependencies ID ADV_ARC.1 Security architecture description ADV_FSP.1, ADV_TDS.1 ADV_FSP.3 Functional specification with complete ADV_TDS.1 summary ADV_TDS.2 Architectural design ADV_FSP.3 AGD_OPE.1 Operational user guidance ADV_FSP.1 AGD_PRE.1 Preparative procedures None ALC_CMC.3 Authorisation controls ALC_CMS.1, ALC_DVS.1, ALC_LCD.1 ALC_CMS.3 Implementation representation CM None coverage ALC_DEL.1 Delivery procedures None ALC_DVS.1 Identification of security measures None 58 Copyright 2009 Xerox Corporation, All rights reserved

Xerox WorkCentre 5135/5150 Multifunction Systems Security Target Assurance Component Assurance Component Name Dependencies ID ALC_LCD.1 Developer defined life-cycle model None ALC_FLR.3 Systematic flaw remediation None ASE_CCL.1 Conformance claims ASE_INT.1, ASE_ECD.1, ASE_REQ.1 ASE_ECD.1 Extended components definition None ASE_INT.1 ST introduction None ASE_OBJ.2 Security objectives ASE_SPD.1 ASE_REQ.2 Derived security requirements ASE_OBJ.2, ASE_ECD.1 ASE_SPD.1 Security problem definition None ASE_TSS.1 TOE summary specification ASE_INT.1, ASE_REQ.1, ADV_FSP.1 ATE_COV.2 Analysis of coverage ADV_FSP.2, ATE_FUN.1 ATE_DPT.1 Testing: basic design ADV_ARC.1, ADV_TDS.2, ATE_FUN.1 ATE_FUN.1 Functional testing ATE_COV.1 ATE_IND.2 Independent testing-sample ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ATE_COV.1, ATE_FUN.1 AVA_VAN.2 Vulnerability analysis ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1 5.5. Security Requirements for the IT Environment There are no security requirements for the IT Environment. 5.6. Explicitly Stated Requirements for the TOE There are no explicitly stated requirements for the TOE. 5.7. Rationale for Security Functional Requirements 59 Copyright 2009 Xerox Corporation, All rights reserved

<strong>Xerox</strong> <strong>WorkCentre</strong> <strong>5135</strong>/<strong>5150</strong><br />

<strong>Multifunction</strong> Systems Security Target<br />

Assurance<br />

Component Assurance Component Name<br />

Dependencies<br />

ID<br />

ALC_LCD.1 Developer defined life-cycle model None<br />

ALC_FLR.3 Systematic flaw remediation None<br />

ASE_CCL.1 Conformance claims ASE_INT.1, ASE_ECD.1,<br />

ASE_REQ.1<br />

ASE_ECD.1 Extended components definition None<br />

ASE_INT.1 ST introduction None<br />

ASE_OBJ.2 Security objectives ASE_SPD.1<br />

ASE_REQ.2 Derived security requirements ASE_OBJ.2, ASE_ECD.1<br />

ASE_SPD.1 Security problem definition None<br />

ASE_TSS.1 TOE summary specification ASE_INT.1, ASE_REQ.1,<br />

ADV_FSP.1<br />

ATE_COV.2 Analysis of coverage ADV_FSP.2, ATE_FUN.1<br />

ATE_DPT.1 Testing: basic design ADV_ARC.1, ADV_TDS.2,<br />

ATE_FUN.1<br />

ATE_FUN.1 Functional testing ATE_COV.1<br />

ATE_IND.2 Independent testing-sample ADV_FSP.2, AGD_OPE.1,<br />

AGD_PRE.1, ATE_COV.1,<br />

ATE_FUN.1<br />

AVA_VAN.2 Vulnerability analysis ADV_ARC.1, ADV_FSP.1,<br />

ADV_TDS.1, AGD_OPE.1,<br />

AGD_PRE.1<br />

5.5. Security Requirements for the IT<br />

Environment<br />

There are no security requirements for the IT Environment.<br />

5.6. Explicitly Stated Requirements for<br />

the TOE<br />

There are no explicitly stated requirements for the TOE.<br />

5.7. Rationale for Security Functional<br />

Requirements<br />

59<br />

Copyright 2009 <strong>Xerox</strong> Corporation, All rights reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!