Dell C5765DN MFP Color Laser Printer User Manual
Page 30
Dell C5765dn Security Target
- 26 -
Security Problem
Security Objectives Rationale
T.RECOVER
By satisfying the following objective, T.RECOVER can be countered:
By OE.SEC, it is necessary to enable the TOE security functions (i.e.
Hard Disk Data Overwrite) and disable the reading-out of the
document data and security audit log data in the internal HDD as well
as the recovery of the used document data. To be specific, this threat
can be countered by the following security objectives: O.CIPHER.
By O.CIPHER, the document data and security audit log data in the
internal HDD are encrypted to disable the reference and reading-out of
the document data, used document data, and security audit log data.
T.CONFDATA
By satisfying the following objective, T.CONFDATA can be
countered:
By OE.SEC, it is necessary to enable the security functions (i.e. User
Authentication with Password, System Administrator Password,
Access Denial due to System Administrator’s Authentication Failures,
Customer Engineer Operation Restriction, and Security Audit Log) and
permits only the authenticated system administrator to change the TOE
setting data. In addition, it is necessary to manage the external IT
environment according to the security policy of organization and the
product guidance document.
To be specific, this threat can be countered by the following security
objectives, O.MANAGE, O.USER, and O.AUDITS:
By O.MANAGE, only the authenticated system administrator is
allowed to enable/disable the TOE security functions and to refer to /
update the TOE setting data.
By O.USER, only the authorized user is allowed to change the
password.
By O.AUDITS, the audit log function necessary to monitor
unauthorized access and the security audit log data are provided.
T.CONSUME
By satisfying the following objective, T.CONSUME can be countered.
By O.RESTRICT, the access to the TOE can be controlled.
T.COMM_TAP
By satisfying the following objectives, T.COMM_TAP can be
countered.
By OE.SEC, the document data, security audit log data, and TOE
setting data on the internal network can be protected from interception.
By O.COMM_SEC, the client/server authentication function of
encryption communication protocol allows only the authorized user to
send/receive the communication data. Encrypting communication data
with encryption function also disables the interception and alteration of
the internal network data (incl. document data, security audit log data,
and TOE setting data).