beautypg.com

Dell C5765DN MFP Color Laser Printer User Manual

Page 30

background image

Dell C5765dn Security Target

- 26 -

Security Problem

Security Objectives Rationale

T.RECOVER

By satisfying the following objective, T.RECOVER can be countered:

By OE.SEC, it is necessary to enable the TOE security functions (i.e.

Hard Disk Data Overwrite) and disable the reading-out of the

document data and security audit log data in the internal HDD as well

as the recovery of the used document data. To be specific, this threat

can be countered by the following security objectives: O.CIPHER.

By O.CIPHER, the document data and security audit log data in the

internal HDD are encrypted to disable the reference and reading-out of

the document data, used document data, and security audit log data.

T.CONFDATA

By satisfying the following objective, T.CONFDATA can be

countered:

By OE.SEC, it is necessary to enable the security functions (i.e. User

Authentication with Password, System Administrator Password,

Access Denial due to System Administrator’s Authentication Failures,

Customer Engineer Operation Restriction, and Security Audit Log) and

permits only the authenticated system administrator to change the TOE

setting data. In addition, it is necessary to manage the external IT

environment according to the security policy of organization and the

product guidance document.

To be specific, this threat can be countered by the following security

objectives, O.MANAGE, O.USER, and O.AUDITS:

By O.MANAGE, only the authenticated system administrator is

allowed to enable/disable the TOE security functions and to refer to /

update the TOE setting data.

By O.USER, only the authorized user is allowed to change the

password.

By O.AUDITS, the audit log function necessary to monitor

unauthorized access and the security audit log data are provided.

T.CONSUME

By satisfying the following objective, T.CONSUME can be countered.

By O.RESTRICT, the access to the TOE can be controlled.

T.COMM_TAP

By satisfying the following objectives, T.COMM_TAP can be

countered.

By OE.SEC, the document data, security audit log data, and TOE

setting data on the internal network can be protected from interception.

By O.COMM_SEC, the client/server authentication function of

encryption communication protocol allows only the authorized user to

send/receive the communication data. Encrypting communication data

with encryption function also disables the interception and alteration of

the internal network data (incl. document data, security audit log data,

and TOE setting data).