Dell C7765DN MFP Color Laser Printer User Manual

Page 2

Advertising
background image

i

- Table of Contents -

1.

ST INTRODUCTION ........................................................... 1

1.1.

ST Reference ............................................................................. 1

1.2.

TOE Reference ........................................................................... 1

1.3.

TOE Overview ............................................................................ 1

1.3.1.

TOE Type and Major Security Features ............................................... 1

1.3.2.

Environment Assumptions ............................................................... 4

1.3.3.

Required Non-TOE Hardware and Software ......................................... 5

1.4.

TOE Description .......................................................................... 8

1.4.1.

User Assumptions .......................................................................... 8

1.4.2.

Logical Scope and Boundary ............................................................ 8

1.4.3.

Physical Scope and Boundary ......................................................... 17

1.4.4.

Guidance .................................................................................... 18

2.

CONFORMANCE CLAIMS ................................................... 19

2.1.

CC Conformance Claims ............................................................ 19

2.2.

PP Claims, Package Claims ......................................................... 19

2.2.1.

PP Claims .................................................................................... 19

2.2.2.

Package Claims ............................................................................ 19

2.2.3.

Conformance Rationale ................................................................. 19

3.

SECURITY PROBLEM DEFINITION ...................................... 20

3.1.

Threats ................................................................................... 20

3.1.1.

Assets Protected by TOE ................................................................ 20

3.1.2.

Threats ....................................................................................... 22

3.2.

Organizational Security Policies ................................................... 23

3.3.

Assumptions ............................................................................ 23

4.

SECURITY OBJECTIVES .................................................... 24

4.1.

Security Objectives for the TOE .................................................. 24

4.2.

Security Objectives for the Environment ...................................... 25

4.3.

Security Objectives Rationale ..................................................... 25

5.

EXTENDED COMPONENTS DEFINITION ............................... 29

5.1.

Extended Components ............................................................... 29

Advertising