Dell C5765DN MFP Color Laser Printer User Manual
Page 2
i
- Table of Contents -
1.
ST INTRODUCTION ........................................................... 1
1.1.
ST Reference ............................................................................. 1
1.2.
TOE Reference ........................................................................... 1
1.3.
TOE Overview ............................................................................ 1
1.3.1.
TOE Type and Major Security Features ............................................... 1
1.3.2.
Environment Assumptions ............................................................... 4
1.3.3.
Required Non-TOE Hardware and Software ......................................... 5
1.4.
TOE Description .......................................................................... 8
1.4.1.
User Assumptions .......................................................................... 8
1.4.2.
Logical Scope and Boundary ............................................................ 8
1.4.3.
Physical Scope and Boundary ......................................................... 16
1.4.4.
Guidance .................................................................................... 17
2.
CONFORMANCE CLAIMS ................................................... 18
2.1.
CC Conformance Claims ............................................................ 18
2.2.
PP Claims, Package Claims ......................................................... 18
2.2.1.
PP Claims .................................................................................... 18
2.2.2.
Package Claims ............................................................................ 18
2.2.3.
Conformance Rationale ................................................................. 18
3.
SECURITY PROBLEM DEFINITION ...................................... 19
3.1.
Threats ................................................................................... 19
3.1.1.
Assets Protected by TOE ................................................................ 19
3.1.2.
Threats ....................................................................................... 21
3.2.
Organizational Security Policies ................................................... 22
3.3.
Assumptions ............................................................................ 22
4.
SECURITY OBJECTIVES .................................................... 23
4.1.
Security Objectives for the TOE .................................................. 23
4.2.
Security Objectives for the Environment ...................................... 24
4.3.
Security Objectives Rationale ..................................................... 24
5.
EXTENDED COMPONENTS DEFINITION ............................... 28
5.1.
Extended Components ............................................................... 28