beautypg.com

Konica Minolta BIZHUB 920 User Manual

Page 84

background image

22 FMT_MSA.1 FPT_RVM.1 FMT_MOF.1

23 FMT_MSA.3 FPT_RVM.1 FMT_MOF.1

24 FMT_MOF.1 FPT_RVM.1

25 FMT_SMF.1 None

FMT_MOF.1

26 FMT_SMR.1 None

FMT_MOF.1

27 FPT_RVM.1

FMT_MOF.1

28 FPT_STM.1 None

None

29 FDP_MTD.1 FPT_RVM.1 FMT_MOF.1

FPT_RVM.1

When the management function and CE function of the TOE is used, the administrator and CE

execute the identification and authentication (FIA_UID.2, FIA_UAU.2, FIA_UAU.7, FIA_AFL.1).

The document data of User BOX is accessed according to the access control (FDP_ACC.1[1] [2]

and FDP_ACF.1[1][2]).

The audit data is always captured. (FAU_GEN.1 and FAU_STG.4)

Only the administrator can refer the audit data.(FAU_SAR.1, FAU_SAR.2, and FAU_STG.1)

Only the user who is applicable to each data can operate the miscellaneous TSF data and

administrator data.(FAU_SAR.2, FMT_MTD.1[1]-[5], FMT_MSA.1, FMT_MSA.3, FMT_

MOF.1, and FDP_MTD.1)

The detour is prevented because the avobe mentioned matters are certainly executed in FPT_

RVM.1.

FMT_MOF.1

The prevention of deactivation in TSF is realized by making the security reinforcement mode to

be valid in FMT_MOF.1.

In this TOE, the access control is only for the User BOX of HDD1.

The unauthorized subject does not exist because the access control to User BOX is limited to the

process through the operation panel. Therefore, FPT_SEP.1 is unnecessary because there is no room

for the unauthorized subject to enter.

8.2.4. Consistency of Security Function Strength to Security Objectives Policies

This TOE assumes the attack capability of general user to be low level in “2. TOE Description”,

and describes “operate from the operation panel” or “connect unauthorized reading device with

HDD” in “3. TOE Security Environment”, namely, the especially highly skilled attacker is not

Copyright© 2005 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved