beautypg.com

Dell C5765DN MFP Color Laser Printer User Manual

Page 85

background image

Dell C5765dn Security Target

- 81 -

(2) FAU_SAR.1 Audit review

It is assured that all the information recorded in the audit log can be retrieved.

Security audit log data can be downloaded in the form of tab-delimited text by pressing the button

“store as a text file.” To download security audit log data, SSL/TLS communication needs to be

enabled before using Web browser.

(3) FAU_SAR.2 Restricted audit review

The person who retrieves the security audit log data is limited to the authenticated system

administrator. A system administrator can access the security audit log data only via Web browser

and the access from the control panel is inhibited. Therefore, a system administrator needs to log

in from Web browser to access the security audit log data.

(4) FAU_STG.1 Protected audit trail storage

There is no function to delete the security audit log data, and the security audit log data are

protected from untrusted alteration and modification.

(5) FAU_STG.4 Prevention of audit data loss

When security audit log data are full, the oldest stored audit record is overwritten with the new

data so that the new data is not lost but surely recorded.

Auditable events are stored with time stamps into NVRAM. When the number of stored events

reaches 50, the 50 logs on NVRAM is stored into one file (“audit log file”) within the internal

HDD. Up to 15,000 events can be stored. When the number of recorded events exceeds 15,000,

the oldest audit log file is overwritten and a new audit event is stored.

(6) FPT_STM.1 Reliable time stamps

The time stamp of TOE’s clock function is issued when the defined auditable event is recorded in

the audit log file.

By TSF_FMT, only a system administrator is enabled to change the clock setting.

7.1.7. Internal Network Data Protection (TSF_NET_PROT)

Internal Network Data Protection is provided by the following four protocols which are configured by

a system administrator using the system administrator mode:

(1) FTP_TRP.1 Trusted Path

The document data, security audit log data, and TOE setting data are protected by the encryption

communication protocol that ensures secure data communication between the TOE and IT

products (communication service via Web, communication service for printer driver,

communication service for fax driver, communication service for network utility, communication

service for other services which require trusted path). This trusted path is logically distinct from

other communication paths and provides assured identification of its endpoints and protection of