Dell C5765DN MFP Color Laser Printer User Manual

Page 2

Advertising
background image

i

- Table of Contents -

1.

ST INTRODUCTION ........................................................... 1

1.1.

ST Reference ............................................................................. 1

1.2.

TOE Reference ........................................................................... 1

1.3.

TOE Overview ............................................................................ 1

1.3.1.

TOE Type and Major Security Features ............................................... 1

1.3.2.

Environment Assumptions ............................................................... 4

1.3.3.

Required Non-TOE Hardware and Software ......................................... 5

1.4.

TOE Description .......................................................................... 8

1.4.1.

User Assumptions .......................................................................... 8

1.4.2.

Logical Scope and Boundary ............................................................ 8

1.4.3.

Physical Scope and Boundary ......................................................... 16

1.4.4.

Guidance .................................................................................... 17

2.

CONFORMANCE CLAIMS ................................................... 18

2.1.

CC Conformance Claims ............................................................ 18

2.2.

PP Claims, Package Claims ......................................................... 18

2.2.1.

PP Claims .................................................................................... 18

2.2.2.

Package Claims ............................................................................ 18

2.2.3.

Conformance Rationale ................................................................. 18

3.

SECURITY PROBLEM DEFINITION ...................................... 19

3.1.

Threats ................................................................................... 19

3.1.1.

Assets Protected by TOE ................................................................ 19

3.1.2.

Threats ....................................................................................... 21

3.2.

Organizational Security Policies ................................................... 22

3.3.

Assumptions ............................................................................ 22

4.

SECURITY OBJECTIVES .................................................... 23

4.1.

Security Objectives for the TOE .................................................. 23

4.2.

Security Objectives for the Environment ...................................... 24

4.3.

Security Objectives Rationale ..................................................... 24

5.

EXTENDED COMPONENTS DEFINITION ............................... 28

5.1.

Extended Components ............................................................... 28

Advertising