Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 37 -
6.2.8. DocuCentre-II C4300(AP) Series Test Plan and Report (AS.TEST)
The following are described in the “DocuCentre-II C4300(AP) Series Test Plan and Report”:
- Overall plan in which the schedule, skills necessary for testers, and configuration of the system
used for the test are described
- Test items
- Test coverage analysis that verifies that all the functions described in the “550 I Series Functional
Specification” are tested with the test items
- Purpose of each test item
- How to conduct each test item
- Expected result of each test item
- Date of conducting each test item, and the name of the test conductor
- Result of each test item
Corresponding security assurance requirement:
ATE_COV.1
ATE_FUN.1
ATE_IND.2
6.2.9. DocuCentre-II C4300(AP) Series Vulnerability Analysis (AS.VULNERABILITY)
“DocuCentre-II C4300(AP) Series Vulnerability Analysis” is created to check and evaluate the
security strength and vulnerability of TOE.
The following are described in the “DocuCentre-II C4300(AP) Series Vulnerability Analysis.” This
document verifies that the TOE’s
security strength and identified vulnerability are not problematic in an assumed environment.
<Security strength>
- Result of analyzing that the security strength of TOE security function is the same or more of the
minimum strength specified in this ST and the same or more of the strength specified in each
specification
- Result of checking that strength analysis is conducted to all the functions that use the techniques
of probability theory, permutation, combination, and others
- Result of verifying the validity of the hypothesis of security strength analysis
<Vulnerability>
- Confirmation of vulnerability analysis being conducted using the information on general security
issues and all the materials provided for the evaluation
- Result of testing that all the identified vulnerability is not problematic in an assumed operation
environment
- Result of checking that notes on vulnerability related to TOE configuration and settings for
Comentarios a estos manuales