Dell C7765DN MFP Color Laser Printer User Manual
Page 2

i
- Table of Contents -
1.
ST INTRODUCTION ........................................................... 1
1.1.
ST Reference ............................................................................. 1
1.2.
TOE Reference ........................................................................... 1
1.3.
TOE Overview ............................................................................ 1
1.3.1.
TOE Type and Major Security Features ............................................... 1
1.3.2.
Environment Assumptions ............................................................... 4
1.3.3.
Required Non-TOE Hardware and Software ......................................... 5
1.4.
TOE Description .......................................................................... 8
1.4.1.
User Assumptions .......................................................................... 8
1.4.2.
Logical Scope and Boundary ............................................................ 8
1.4.3.
Physical Scope and Boundary ......................................................... 17
1.4.4.
Guidance .................................................................................... 18
2.
CONFORMANCE CLAIMS ................................................... 19
2.1.
CC Conformance Claims ............................................................ 19
2.2.
PP Claims, Package Claims ......................................................... 19
2.2.1.
PP Claims .................................................................................... 19
2.2.2.
Package Claims ............................................................................ 19
2.2.3.
Conformance Rationale ................................................................. 19
3.
SECURITY PROBLEM DEFINITION ...................................... 20
3.1.
Threats ................................................................................... 20
3.1.1.
Assets Protected by TOE ................................................................ 20
3.1.2.
Threats ....................................................................................... 22
3.2.
Organizational Security Policies ................................................... 23
3.3.
Assumptions ............................................................................ 23
4.
SECURITY OBJECTIVES .................................................... 24
4.1.
Security Objectives for the TOE .................................................. 24
4.2.
Security Objectives for the Environment ...................................... 25
4.3.
Security Objectives Rationale ..................................................... 25
5.
EXTENDED COMPONENTS DEFINITION ............................... 29
5.1.
Extended Components ............................................................... 29