List of figures and tables – Dell C7765DN MFP Color Laser Printer User Manual
Page 4

iii
- List of Figures and Tables -
Figure 1: General Operational Environment .......................................................... 5
Figure 2: MFD Units and TOE Logical Scope .......................................................... 9
Figure 3: Authentication Flow for Private Print and Mailbox ................................... 12
Figure 4: MFD Units and TOE Physical Scope ...................................................... 17
Figure 5: Assets under and not under Protection ................................................. 21
Table 1: Function Types and Functions Provided by the TOE .................................... 2
Table 2: User Role Assumptions .......................................................................... 8
Table 3: TOE Basic Functions .............................................................................. 9
Table 4: Categories of TOE Setting Data............................................................. 21
Table 5: Threats Addressed by the TOE .............................................................. 22
Table 6: Organizational Security Policy ............................................................... 23
Table 7: Assumptions ...................................................................................... 23
Table 8: Security Objectives for the TOE ............................................................ 24
Table 9: Security Objectives for the Environment ................................................ 25
Table 10: Assumptions / Threats / Organizational Security Policies and the
Corresponding Security Objectives ............................................................... 25
Table 11: Security Objectives Rationale for Security Problem ................................ 26
Table 12: Auditable Events of TOE and Individually Defined Auditable Events .......... 35
Table 13: Operations between Subjects and Objects Covered by MFD Access Control SFP
.............................................................................................................. 41
Table 14: Rules for Access Control .................................................................... 42
Table 15: Rules for Explicit Access Authorization ................................................. 43
Table 16: Subjects, Information, and Operations that cause the information to flow . 44
Table 17: List of Security Functions ................................................................... 51
Table 18: Security Attributes and Authorized Roles .............................................. 52
Table 19 Initialization property ........................................................................ 53
Table 20: Operation of TSF Data ....................................................................... 54
Table 21: Security Management Functions Provided by TSF .................................. 55
Table 22: EAL3 Assurance Requirements ............................................................ 60
Table 23: Security Functional Requirements and the Corresponding Security Objectives
.............................................................................................................. 61
Table 24: Security Objectives to SFR Rationale ................................................... 62
Table 25: Dependencies of Functional Security Requirements ................................ 66
Table 26: Security Functional Requirements and the Corresponding TOE Security
Functions ................................................................................................. 70
Table 27: Management of security attributes ...................................................... 75
Table 28: Access Control .................................................................................. 76
Table 29: Details of Security Audit Log Data ....................................................... 80