Dell C7765DN MFP Color Laser Printer User Manual

Page 70

Advertising
background image

Dell C7765dn Security Target

- 66 -

Security Objectives

Security Functional Requirements Rationale

By FMT_SMR.1, the role of general user and system administrator is

maintained and associated with the general user and system

administrator.

O. VERIFY

O. VERIFY is the objective that provides the function to verify the

integrity of TSF executable code.

By satisfying the following security requirements, O. VERIFY can be

realized.

By FPT_TST.1 the TOE can execute the self test function to verify the

integrity of TSF executable code and TSF data upon initiation.

: (However, verification is unnecessary for the following TSF data for

each reason described below.)

- Security audit log data: Not affect TSF.

- Present data and time : Generated by the battery backed-up hardware

real-time clock, and becomes a system error at the data destruction.

6.3.2. Dependencies of Security Functional Requirements

Table 25 describes the functional requirements that security functional requirements depend on and

those that do not and the reason why it is not problematic even if dependencies are not satisfied.

Table 25: Dependencies of Functional Security Requirements

Functional Requirement

Dependencies of Functional Requirements

Requirement and its name

Requirement that

is dependent on

Requirement that is not dependent on

and its rationale

FAU_GEN.1

Audit data generation

FPT_STM.1 -

FAU_SAR.1

Audit review

FAU_GEN.1 -

FAU_SAR.2

Restricted audit review

FAU_SAR.1 -

FAU_STG.1

Protected audit trail

storage

FAU_GEN.1 -

FAU_STG.4

Prevention of audit data

loss

FAU_STG.1 -

Advertising