Home > Ricoh > All in One Printer > Ricoh Mp 3351 User Guide

Ricoh Mp 3351 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Ricoh Mp 3351 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							  Page 21 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  permission, and changing the Print Settings is also permitted. Table 2 shows the relationship between the 
    operation authorised by the permissions to process document data and the operations possible on the 
    document data. 
    Table 2: Correspondence between operations authorised by permissions to process document data and 
    operations possible on document data Operations possible on document data     Operation permissions  authorised by permissions  to process document data Reading 
    document data
     
    Deleting 
    document data
     Read-only v  Edit v  Edit/delete v v Full control v v v: possible 
    blank: impossible 
    The operation permissions for each document can be specified for each general user. 
    Stored Data Protection Function 
    The Stored Data Protection Function is for protecting document data stored on the HDD from leakage, by 
    making it difficult to understand unless the document data is accessed and read in the normal way. 
    Network Communication Data Protection Function 
    This function is for protecting document data and print data in transit on the network from unauthorised 
    access. The communication protocol that is used to protect the communication data differs according to the 
    method by which the document or print data is sent.  
    The network administrator decides the communication protocol to apply based on the environment in which 
    the TOE is operating and the intended usage of the TOE. The following explains the sending methods and 
    their corresponding communication protocols. 
     
    1. Download document data using the Web Service Function from a client computer (SSL 
    protocol) 
    2. Print or fax from a client computer (SSL protocol) 
    3. Deliver document data to an FTP server or SMB server from the TOE (IPSec protocol) 
    4. Send document data attached to e-mail to a client computer from the TOE (S/MIME)  
    						
    							  Page 22 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  Security Management Function 
    This function allows administrators, supervisors, and general users who have been successfully authenticated 
    by the previously described Identification and Authentication Function to perform the following operations 
    for security management according to user role. 
    1. Management of document data ACL 
    Allows only specified users to modify the document Data ACL. Modifying the document 
    data ACL includes changing document file owners, registering new document file users for 
    the document data ACL, deleting document file users previously registered for document 
    data ACL, and changing operation permissions specified in document data. Only file 
    administrators can change the document file owners. File administrators, document file 
    owners, and document file users with full control permissions can perform other operations. 
    When document data is stored, its document data ACL is set to the document data default 
    ACL. 
    2. Management of administrator information 
    Allows specified users to register and delete administrators, to add and delete administrator 
    roles, and change administrator IDs and passwords. 
    Only administrators are allowed to register another administrator or add an administrator role 
    to another administrator. Such administrators can delete an administrator or an administrator 
    role, and change an administrators ID. Administrators and supervisors can change 
    administrator passwords. An Administrator is permitted to add an Administrator Role to 
    another Administrator, provided that the first Administrator is already assigned that 
    Administrator Role, and an Administrator is permitted to delete one of his/her Administrator 
    Roles, provided that at least one other Administrator is assigned that Administrator Role. 
    Since administrators are required to have at least one administrator role, one or more of their 
    roles must be given to a new administrator when they register another administrator. If 
    administrators delete all of their own administrator roles, their administrator information will 
    be automatically deleted. 
    3. Management of general user information 
    Allows only users with specified user roles to newly create, change, and delete general user 
    information. The relationship between user roles and authorised operations is: 
    - User administrators can newly create, change, and delete general user information. 
    - General users can change their own general user information that is registered to 
    them in the Address Book, with the exception of their user IDs.  
    4. Management of supervisor information 
    Supervisors can change their supervisor ID and password. 
    5. Management of machine control data 
    Each administrator is allowed to configure the items of machine control data that correspond 
    to their administrator role (machine administrator, user administrator, or and file 
    administrator).  
    						
    							  Page 23 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  Service Mode Lock Function 
    The Maintenance Function is used by CEs who receive a request from the machine administrator to perform 
    maintenance on the TOE from the Operation Panel. The Service Mode Lock Function prevents the 
    Maintenance Function being used. In this evaluation, the Service Mode Lock Function set to On. 
    Telephone Line Intrusion Protection Function 
    This function is for devices equipped with a Fax Unit. It restricts communication over a telephone line to the 
    TOE, so that the TOE receives only permitted data. 
    MFP Control Software Verification Function 
    This function verifies the integrity of the MFP Control Software by checking the integrity of an executable 
    code installed in the FlashROM. 
     
    1.4.5 Protected Assets 
    This section describes the protected assets of this TOE (document data and print Data). 
    1.4.5.1 Document Data 
    Document data is imported from outside the TOE by various methods, and can be either stored in the TOE or 
    output by it. Document data stored in the TOE can be deleted. 
    Importing Document Data 
    Document data can be imported by the following two methods: 
    1. From a scanner  
    Document data is created from the scanned image of a paper original that is imported to the TOE. 
    2. From the network or from a device connected to the USB Port 
    Document data is created from print data received through the network or the USB Port that is 
    then converted to a format that the TOE can handle. 
    Storing Document Data 
    Document data stored inside the TOE is stored in the D-BOX. The D-BOX protects the document data from 
    unauthorised access and leakage. 
    Outputting Document Data 
    Document data can be output by the following five methods: 
    1. Sent by e-mail to a client computer (to the e-mail address). 
    2. Sent to an SMB or FTP server. 
    3. Downloaded by a client computer. 
    4. Printed out.  
    						
    							  Page 24 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  5. Sent as a fax. 
    When output using methods 1 to 3, document data is protected from leakage, and tampered data can be 
    detected. 
    1.4.5.2 Print Data 
    Print data is data in which a print or fax image is written. It is generated from the document files in a client 
    computer by the printer or fax drivers installed on the client computer when it is printed or faxed, 
    respectively. Print data is imported to the TOE via the internal network or the USB Port. When passing from 
    a client computer to the TOE through the internal network, print data is protected from leakage, and 
    tampered data can be detected.  
    						
    							  Page 25 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  2 Conformance Claims 
    This section describes the conformance claim. 
    2.1 CC conformance Claim 
    The CC conformance claim of this ST and TOE is as follows: 
    - CC version for which this ST claims conformance 
    Part 1: 
    Introduction and general model September 2006 Version 3.1 Revision 1 (Japanese translation ver.1.2) 
    CCMB-2006-09-002 
    Part 2: 
    Security functional components September 2007 Version 3.1 Revision 2 (Japanese translation ver.2.0) 
    CCMB-2007-09-002 
    Part 3: 
    Security assurance components September 2007 Version 3.1 Revision 2 (Japanese translation ver.2.0) 
    CCMB-2007-09-003 
    - Functional requirements: Part 2 conformance 
    - Assurance requirements: Part 3 conformance 
    2.2 PP Claims, Package Claims 
    This ST and TOE do not conform to any PPs. 
    This ST claims conformance to the following package: 
    Package: EAL3 conformant 
    2.3 Conformance Rationale 
    Since this ST does not claim conformance to PPs, there is no rationale for PP conformance.  
    						
    							  Page 26 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  3 Security Problem Definitions 
    This section provides details of threats, organisational security policies, and assumptions. 
    3.1 Threats 
    Defined and described below are the assumed threats related to the use and environment of this TOE. The 
    threats defined in this section are attacks by unauthorised persons with knowledge of published information 
    about TOE operations and such attackers are capable of potential security attacks. 
    T.ILLEGAL_USE (Abuse of TOE) 
    Attackers may read or delete document data by gaining unauthorised access to the TOE 
    through the devices interfaces (the Operation Panel, network interface, USB Port, or SD 
    card interface). 
    T.UNAUTH_ACCESS (Access violation to protected assets stored in TOE) 
    Authorised TOE users may breach the limits of authorised usage and access document 
    data through the external TOE interfaces (the Operation Panel, network interface, or 
    USB Port) that are provided for them. 
    T.ABUSE_SEC_MNG (Abuse of Security Management Function) 
    Persons not authorised to use Security Management Functions may abuse them. 
    T.SALVAGE   (Salvaging memory) 
    Attackers may remove the HDD from the TOE and disclose document data. 
    T.TRANSIT   (Interceptions and tampering on communication path) 
    Attackers may illegally obtain, leak, or tamper with document data or print data sent or 
    received by the TOE via the internal network. 
    T.FAX_LINE   (Intrusion from telephone line) 
    Attackers may gain access to the TOE through telephone lines. 
    3.2 Organisational Security Policies 
    The following security policy is assumed for organisations that demand integrity of the software installed in 
    its IT products.  
    						
    							  Page 27 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  P.SOFTWARE   (Software integrity checking) 
    Measures shall be provided for verifying the integrity of MFP Control Software, which 
    is installed in the FlashROM of the TOE. 
    3.3 Assumptions 
    Defined and described below are the assumptions related to the use and environment of this TOE: 
    A.ADMIN   (Assumption for administrators) 
    Administrators shall have sufficient knowledge to operate the TOE securely in the roles 
    assigned to them and will instruct general users to operate the TOE securely also. 
    Additionally, administrators shall not abuse their permissions maliciously. 
    A.SUPERVISOR   (Assumption for supervisor) 
    Supervisors shall have sufficient knowledge to operate the TOE securely in the roles 
    assigned to them, and are shall not abuse their permissions maliciously. 
    A.NETWORK   (Assumption for network connections) 
    When the network that the TOE is connected to (the internal network) is connected to an 
    external network such as the Internet, the internal network shall be protected from the 
    external network.  
    						
    							  Page 28 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  4 Security Objectives 
    This section describes the security objectives of the TOE and its security objectives of the operational 
    environment and their rationale. 
    4.1 Security Objectives for TOE 
    The following define the security objectives of the TOE. 
    O.AUDIT   (Audit) 
    The TOE shall record Security Function-related events in an audit log, and provides the 
    machine administrator with a function for reading the audit logs, allowing the machine 
    administrator to detect whether or not a security intrusion has occurred. 
    O.I&A   (Identification and authentication) 
    The TOE shall perform identification and authentication of users prior to their use of the 
    TOE Security Functions, and allows successfully authenticated users to use the 
    functions for which they have permission. 
    O. DOC_ACC   (Access control to protected assets) 
    The TOE shall ensure general users have access to document data according to their 
    permissions to process document data. The TOE shall also allow the file administrator 
    to delete document data stored in the D-BOX. 
    O. MANAGE   (Security management) 
    The TOE shall only allow specified users to manage its Security Functions, TSF data, 
    and security attributes. Such users are required to maintain the TOE security. 
    O.MEM.PROTECT (Prevention of disclosure of data stored in memory) 
    The TOE shall convert the format of the document data stored on the HDD into a format 
    that is difficult to decode. 
    O. NET.PROTECT (Protection of network communication data) 
    The TOE shall protect document data and print data travelling over the communication 
    network from interception, and detect any tampering. 
    O.GENUINE  (Protection of integrity of MFP Control Software) 
    The TOE shall provide TOE users with a function that verifies the integrity of the MFP 
    Control Software, which is installed in the FlashROM.  
    						
    							  Page 29 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  O.LINE_PROTECT (Prevention of intrusion from telephone line) 
    The TOE shall prevent unauthorised access to the TOE from a telephone line connected 
    to the Fax Unit. 
    4.2 Security Objectives of Operational Environment 
    The following describes the security objectives of the operational environment. 
    OE.ADMIN   (Trusted administrators) 
    The responsible manager of the MFP shall select trusted persons as administrators and 
    instructs them on their administrator roles. Once instructed, administrators then shall 
    instruct general users, familiarising them with the compliance rules for secure TOE 
    operation as defined in the administrator guidance for the TOE. 
    OE.SUPERVISOR (Trusted supervisor) 
    The responsible manager of the MFP shall select trusted persons as supervisors and 
    instructs them on the role of supervisor. 
    OE.NETWORK  (Network environment for TOE connection) 
    If the internal network, to which the TOE is connected, is connected to an external 
    network such as the Internet, the organisation that manages operation of the internal 
    network shall close any unnecessary ports between the external and internal networks 
    (e.g. by employing a firewall) 
    4.3 Security Objectives Rationale 
    This section describes the rationale of the security objectives. 
    If all security objectives are fulfilled as explained in the following, the security problems defined in 3. 
    Security Problem Definitions are solved: all threats are countered, all organisational security policies 
    enforced, and all assumptions upheld. 
    4.3.1 Tracing 
    This section describes the correspondence between the previously described 3.1 Threats, 3.2 
    Organisational Security Policies and 3.3 Assumptions, and either 4.1 Security Objectives for TOE or 
    4.2 Security Objectives of Operational Environment with Table 3. The v in the table indicates that each 
    of the elements of the TOE Security Environment is satisfied by security objectives. 
    Table 3 demonstrates that each security objective corresponds to at least one threat, organisational security 
    policy, or assumption. As indicated by the shaded region in Table 3, assumptions are not upheld by TOE 
    security objectives.  
    						
    							  Page 30 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  Table 3: Relationship between security environment and security objectives TOE security Environment    Security objectives A.ADMIN
     
    A.SUPERVISOR
     
    A.NETWORK
     
    T.ILLEGAL_USE
     
    T.UNAUTH_ACCESS
     
    T.ABUSE_SEC_MNG
     
    T.SALVAGE
     
    T.TRANSIT
     
    T.FAX_LINE
     
    P.SOFTWARE
     O.AUDIT    v  v v v v  O.I&A    v v v     O.DOC_ACC     v      O.MANAGE      v     O.MEM.PROTECT       v    O.NET.PROTECT        v   O.GENUINE          v O.LINE_PROTECT         v  OE.ADMIN v          OE.SUPERVISOR  v         OE.NETWORK   v         
    4.3.2 Tracing Justification 
    The following are the rationale for each security objectives being appropriate to satisfy 3.1 Threats, 3.2 
    Organisational Security Policies and 3.3 Assumptions. 
    A.ADMIN    (Assumptions for administrators) 
    As specified by A.ADMIN, administrators shall have sufficient knowledge to operate the TOE securely in 
    the roles assigned to them and instruct general users to operate the TOE securely also. Additionally, 
    administrators are unlikely to abuse their permissions. 
    As specified by OE.ADMIN, the responsible manager of the MFP shall select trusted persons as 
    administrators and instruct them on their administrator roles. Once instructed, administrators then shall 
    instruct general users, familiarising them with the compliance rules for secure TOE operation as defined in 
    the administrator guidance for the TOE. Therefore, A.ADMIN is upheld. 
    A.SUPERVISOR    (Assumptions for supervisors) 
    As specified by A.SUPERVISOR, supervisors shall have sufficient knowledge to operate the TOE securely 
    in the roles assigned to them, and be unlikely to abuse their permissions. 
    As specified by OE.SUPERVISOR, the responsible manager of the MFP shall select trusted persons as 
    supervisors and instruct them on the role of supervisor. Therefore, A.SUPERVISOR is upheld.  
    						
    All Ricoh manuals Comments (0)

    Related Manuals for Ricoh Mp 3351 User Guide