Dell C5765DN MFP Color Laser Printer User Manual
Page 66

Dell C5765dn Security Target
- 62 -
Security Objectives
Security Functional Requirements Rationale
log file.
By FPT_STM.1, the auditable events are recorded with time stamp in the
audit log, using highly reliable clock of the TOE.
O.CIPHER
O. CIPHER is the objective that encrypts the used document data and the
security audit log data i in the internal HDD so that they cannot be
analyzed even if retrieved.
By satisfying the following security requirements, O.CIPHER can be
realized.
By FCS_CKM.1, the cryptographic key is generated in accordance with
the specified cryptographic key size (256 bits).
By FCS_COP.1, the document data and security audit log data to be
stored into the internal HDD are encrypted and then decrypted when the
data are read, in accordance with the determined cryptographic algorithm
and cryptographic key size.
O.COMM_SEC
O.COMM_SEC is the objective that protects the document data, security
audit log data, and TOE setting data on the internal network from
interception and alteration.
By satisfying the following security requirements, O.COMM_SEC can
be realized:
By FTP_TRP.1, a highly reliable communication path is provided
through communication data encryption protocol so that the document
data, security audit log data, and TOE setting data on the internal
network between the TOE and the remote can be protected from threats.
O.FAX_SEC
O.FAX_SEC is the objective that prevents the unauthorized access to the
internal network via public telephone line.
By satisfying the following security requirements, O.FAX_SEC can be
realized:
By FDP_IFC.1 and FDP_IFF.1, the internal network to which the TOE is
connected is prevented from being accessed via public telephone line
from the communication path of TOE fax modem.
O.MANAGE
O. MANAGE is the objective that allows only an authenticated system
administrator to access the system administrator mode for security
function setting and inhibits a general user from accessing the TOE
setting data. By satisfying the following security requirements,
O.MANAGE can be realized:
By FIA_AFL.1 (1), successive attacks are prevented because the power
needs to be cycled when the number of key operator authentication
failures reaches the defined number of times.
By FIA_AFL.1 (2), successive attacks are prevented because the power
needs to be cycled when the number of SA authentication failures (at