Dell C5765DN MFP Color Laser Printer User Manual

Page 66

Advertising
background image

Dell C5765dn Security Target

- 62 -

Security Objectives

Security Functional Requirements Rationale

log file.

By FPT_STM.1, the auditable events are recorded with time stamp in the

audit log, using highly reliable clock of the TOE.

O.CIPHER

O. CIPHER is the objective that encrypts the used document data and the

security audit log data i in the internal HDD so that they cannot be

analyzed even if retrieved.

By satisfying the following security requirements, O.CIPHER can be

realized.

By FCS_CKM.1, the cryptographic key is generated in accordance with

the specified cryptographic key size (256 bits).

By FCS_COP.1, the document data and security audit log data to be

stored into the internal HDD are encrypted and then decrypted when the

data are read, in accordance with the determined cryptographic algorithm

and cryptographic key size.

O.COMM_SEC

O.COMM_SEC is the objective that protects the document data, security

audit log data, and TOE setting data on the internal network from

interception and alteration.

By satisfying the following security requirements, O.COMM_SEC can

be realized:

By FTP_TRP.1, a highly reliable communication path is provided

through communication data encryption protocol so that the document

data, security audit log data, and TOE setting data on the internal

network between the TOE and the remote can be protected from threats.

O.FAX_SEC

O.FAX_SEC is the objective that prevents the unauthorized access to the

internal network via public telephone line.

By satisfying the following security requirements, O.FAX_SEC can be

realized:

By FDP_IFC.1 and FDP_IFF.1, the internal network to which the TOE is

connected is prevented from being accessed via public telephone line

from the communication path of TOE fax modem.

O.MANAGE

O. MANAGE is the objective that allows only an authenticated system

administrator to access the system administrator mode for security

function setting and inhibits a general user from accessing the TOE

setting data. By satisfying the following security requirements,

O.MANAGE can be realized:

By FIA_AFL.1 (1), successive attacks are prevented because the power

needs to be cycled when the number of key operator authentication

failures reaches the defined number of times.

By FIA_AFL.1 (2), successive attacks are prevented because the power

needs to be cycled when the number of SA authentication failures (at

Advertising