
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 21 -
3. TOE Security Environment
3.1. Assumptions
Assumptions related to the operation and use of this TOE are described in Table 5.
Table 5: Assumptions
Assumption Contents
A.SECMODE
<Protection mode>
When operating TOE, key operator makes settings as follows:
Key-operator’s password: 7 to 12 characters
Setting for customer-engineer operation restriction function: “Perform”
Setting for using password: “Perform”
Access denial due to failure in authentication of key-operator’s ID:
“Perform” and five times
Additionally, key-operator’s password is managed so that it is prevented from being
guessed or disclosed.
A.ADMIN
<Trust in key operator>
Key operator has knowledge necessary to fulfill the assigned role and does not conduct
improperly with malicious intention.
A.NET
<Network connection condition>
MFP that TOE is installed on is connected to an internal network. This internal network
constitutes an environment where interceptions are not made.
Even when this internal network is connected to an external network, MFP cannot be
accessed from the external network.
3.2. Threats
Key operator and customer engineer, who are given special access authority to TOE, do not fall
under “attacker” because they are reliable. Security threats and attackers to this TOE are
described in Table 6.
Attackers are thought to have low-level attack capability.
Table 6: Security Threats
Threat Contents Attacker Protected
asset
T.RECOVER <Illicit recovery of used document data>
General user and the person who is not related to
TOE might recover used document data such as by
removing the hard disk drive and connecting it
directly to a tool.
- General user
- Non-related
person
R.DOCDATA
T.CONFDATA <Illicit access to TOE setting data>
General user and the person who is not related to
TOE might change settings by accessing TOE
setting data from the control panel or key-operator’s
client. This setting data is allowed to be accessed
only by key operator.
- General user
- Non-related
person
R.CONFDATA
3.3. Organizational Security Policies
There is no organizational security policy.
Comentarios a estos manuales