
Fuji Xerox ApeosPort-II C4300(AP)Series Security Kit for Asia Pacific Security Target V1.01
- 47 -
8.3. TOE Summary Specification Rationale
8.3.1.
Rationale for Function Summary Specification
(1) Necessity
Correspondences between security functional requirements and TOE security functions are
described in Table 19.
TOE security functions correspond to security functional requirements.
All TOE security functions are necessary to realize the security functional requirements.
Table 19: Correspondences between Security Functional Requirements and TOE Security Functions
TOE security function
Security functional
requirement
SF.OVERWRITE
SF.ENCRYPTION
SF. MANAGE
SF. CEREST
FCS_CKM.1 O
FCS_COP.1 O
FDP_RIP.1 O
FIA_AFL.1 O
FIA_UID.2 O
FIA_UAU.2 O
FIA_UAU.7 O
FMT_MOF.1 (1) O
FMT_MOF.1 (2) O
FMT_MOF.1 (3) O
FMT_MTD.1(1) O
FMT_MTD.1(2) O
FMT_MTD.1(3) O
FMT_SMF.1 O
FMT_SMR.1 O
FPT_RVM.1 O O O
O: Shows that it is the security function that satisfies the security functional requirement.
(2) Sufficiency
Table 20 describes that TOE security functions sufficiently realize TOE security functional
requirements.
Table 20: Sufficiency of Security Functional Requirements
Functional
requirement
Security function
FCS_CKM.1 By the following security function, FCS_CKM.1, the cryptographic-key generation, can be
assured:
-
SF.ENCRYPTION
By
SF.ENCRYPTION , TOE generates 128-bit cryptographic key using the Fuji Xerox’s
unique FXOSENC method algorithm and “cryptographic seed key for data stored on
the hard disk drive” set by key operator, at the time of booting. Fuji Xerox’s unique
FXOSENC method algorithm is a secure algorithm that has sufficient complexity.
Comentarios a estos manuales