Home > Ricoh > All in One Printer > Ricoh Mp 3351 User Guide

Ricoh Mp 3351 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Ricoh Mp 3351 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							  Page 51 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. Functional requirements Management requirements Management items FMT_MTD.1 a) Managing the group of roles that can 
    interact with the TSF data. None: No groups of roles can interact with 
    TSF data. FMT_SMF.1 None - FMT_SMR.1 a) Managing the group of users that are 
    part of a role. Management of administrator  
    roles by administrators. FPT_STM.1 a) Management of the time. Security Management Function 
    (management of machine control data): 
    The machine administrator manages the 
    following setting items for machine 
    control data. 
    - Data of system clock, time (hour, minute 
    and second). FPT_TST.1 a) Management of the conditions under 
    which TSF self testing occurs, such as 
    during initial start-up, regular interval, 
    or under specified conditions. 
    b) Management of the time interval if 
    appropriate. a) None: The condition under which TSF 
    self-testing occurs is fixed. 
    b) None: No management of time interval. FTP_ITC.1 a) Configuring the actions that require 
    trusted channel, if supported. None: Actions that require  
    Inter-STF trusted channels are fixed. FTP_TRP.1 a) Configuring the actions that require 
    trusted path, if supported. None: Actions that require trusted paths 
    are fixed.  
    FMT_SMR.1 Security roles 
    Hierarchical to: No other components. 
    Dependencies: FIA_UID.1 Timing of identification. 
    FMT_SMR.1.1 The TSF shall maintain the roles [assignment: general users, administrators (machine 
    administrator, file administrator, user administrator, and network administrator) and a 
    supervisor]. 
    FMT_SMR.1.2 The TSF shall be able to associate users with roles. 
    6.1.6 Class FPT: Protection of the TSF 
    FPT_STM.1 Reliable time stamps 
    Hierarchical to: No other components. 
    Dependencies: No dependencies. 
    FPT_STM.1.1 The TSF shall be able to provide reliable time stamps. 
     
    FPT_TST.1 TSF testing 
    Hierarchical to: No other components.  
    						
    							  Page 52 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  Dependencies: No dependencies. 
    FPT_TST.1.1 The TSF shall run a suite of self tests [selection: during initial start-up] to demonstrate the 
    correct operation of [selection: [assignment: encryption function of the Ic Hdd]]. 
    FPT_TST.1.2 The TSF shall provide authorised users with the capability to verify the integrity of the 
    [selection: [assignment: HDD cryptographic key]]. 
    FPT_TST.1.3 The TSF shall provide authorised users with the capability to verify the integrity of stored 
    TSF executable code. 
    6.1.7 Class FTP: Trusted path/channels 
    FTP_ITC.1 Inter-TSF trusted channel 
    Hierarchical to: No other components. 
    Dependencies: No dependencies. 
    FTP_ITC.1.1 The TSF shall provide a communication channel between itself and another trusted IT 
    product that is logically distinct from other communication channels and provides assured 
    identification of its end points and protection of the channel data from modification or 
    disclosure. 
    FTP_ITC.1.2 The TSF shall permit [selection: the TSF] to initiate communication via the trusted channel. 
    FTP_ITC.1.3 The TSF shall initiate communication via the trusted channel for [assignment: Deliver to 
    Folders from TOE to SMB server (IPSec) service and Deliver to Folders from TOE to 
    FTP server (IPSec) service]. 
     
    FTP_TRP.1 Trusted path 
    Hierarchical to: No other components. 
    Dependencies: No dependencies. 
    FTP_TRP.1.1 The TSF shall provide a communication path between itself and [selection: remote] users 
    that is logically distinct from other communication paths and provides assured identification 
    of its end points and protection of the communicated data from [selection: modification and 
    disclosure]. 
    FTP_TRP.1.2 The TSF shall permit [selection: the TSF, remote users] to initiate communication via the 
    trusted path. 
    FTP_TRP.1.3 The TSF shall require the use of the trusted path for [selection: initial user authentication, 
    [assignment: TOE web service, printing service from a client computer, fax service from 
    a client computer, and e-mail service to a client computer from the TOE]]. 
    Table 20 shows the services that require the trusted path defined in FTP_TRP.1.3 and used by each user who 
    communicates via trusted path described in FTP_TRP.1.2.  
    						
    							  Page 53 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  Table 20: Services requiring trusted paths Related persons for communication Services that require a trusted path TSF E-mail service to client computer from  TOE (S/MIME) Remote users Initial user authentication (SSL) 
    TOE web service from client PC (SSL) 
    Printing service from client PC (SSL) 
    Fax service from client PC (SSL)  
    						
    							  Page 54 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  6.2 Security Assurance Requirements 
    The evaluation assurance level of this TOE is EAL3. Table 21 lists the assurance components of the TOE. 
    These components meet evaluation assurance level 3 (EAL3). Other requirements are not included. 
    Table 21: TOE Security assurance requirements (EAL3) Assurance classes Assurance components ADV_ARC.1 Security architecture description ADV_FSP.3 Functional specification with complete 
    summary ADV: Development 
    ADV_TDS.2 Architectural design AGD_OPE.1 Operational user guidance AGD: Guidance documents 
    AGD_PRE.1 Preparative procedures ALC_CMC.3 Authorisation controls ALC_CMS.3 Implementation representation CM coverage ALC_DEL.1 Delivery procedures ALC_DVS.1 Identification of security measures ALC: Life-cycle support 
    ALC_LCD.1 Developer defined life-cycle model ASE_CCL.1 Conformance claims ASE_ECD.1 Extended components definition ASE_INT.1 ST introduction ASE_OBJ.2 Security objectives ASE_REQ.2 Derived security requirements ASE_SPD.1 Security problem definition ASE: Security Target evaluation 
    ASE_TSS.1 TOE summary specification ATE_COV.2 Analysis of coverage ATE_DPT.1 Testing: basic design ATE_FUN.1 Functional testing ATE: Tests 
    ATE_IND.2 Independent testing – sample AVA: Vulnerability assessment AVA_VAN.2 Vulnerability analysis   
    						
    							  Page 55 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  6.3 Security Requirements Rationale 
    This section describes the rationale behind the security requirements. If all security functional requirements 
    are satisfied as below, the security objectives defined in 4.1Security Objectives for TOE are fulfilled. 
    6.3.1 Tracing 
    Table 22 shows the relationship between the TOE security functional requirements and TOE security 
    objectives. The v in the table indicates that the TOE security functional requirement fulfills the TOE 
    security objective. 
    Table 22 shows that each TOE security functional requirement fulfills at least one TOE security objective. 
    Table 22: Relationship between security objectives and functional requirements  O.AUDIT
     
    O.I&A
     
    O.DOC_ACC
     
    O.MANAGE
     
    O.MEM.PROTECT
     
    O.NET.PROTECT
     
    O.GENUINE
     
    O.LINE_PROTECT
     FAU_GEN.1 v        FAU_SAR.1 v        FAU_SAR.2 v        FAU_STG.1 v        FAU_STG.4 v        FCS_CKM.1     v    FCS_COP.1     v    FDP_ACC.1   v      FDP_ACF.1   v      FDP_IFC.1        v FDP_IFF.1        v FIA_AFL.1  v       FIA_ATD.1  v       FIA_SOS.1  v       FIA_UAU.2  v       FIA_UAU.7  v       FIA_UID.2  v        
    						
    							  Page 56 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  O.AUDIT
     
    O.I&A
     
    O.DOC_ACC
     
    O.MANAGE
     
    O.MEM.PROTECT
     
    O.NET.PROTECT
     
    O.GENUINE
     
    O.LINE_PROTECT
     FIA_USB.1  v       FMT_MSA.1    v     FMT_MSA.3    v     FMT_MTD.1    v     FMT_SMF.1    v     FMT_SMR.1    v     FPT_STM.1 v        FPT_TST.1     v  v  FTP_ITC.1      v   FTP_TRP.1      v    
    6.3.2 Justification of Traceability 
    This section describes how the TOE security objectives are fulfilled by the TOE security functional 
    requirements corresponding to the TOE security objectives shown in Table 22. 
    O.AUDIT Audit 
    Following are the rationale behind the functional requirements corresponding to O.AUDIT in Table 22, and 
    these requirements are included to fulfill the O.AUDIT specification. 
    a) Record audit logs 
    To fulfill O.AUDIT, the performance of Security Functions should be recorded as audit logs. For this, 
    FAU_GEN.1 generates audit information whenever an Audit Function starts and ends, whenever an 
    identification or authentication function is performed, whenever users operate protected assets, 
    whenever protected assets are encrypted, and whenever a major Management Function is performed. 
    The log also records the date, time, type, subject identity, and outcome of each event. 
    b) Provide Audit Function 
    To fulfill O.AUDIT, access to audit logs should be restricted to the machine administrator only, and in a 
    format that can be audited. For this, FAU_SAR.1 allows only the machine administrator to read audit 
    logs, and FAU_SAR.2 prohibits persons other than the machine administrator reading audit logs. 
    c) Protect audit logs 
    To fulfill O.AUDIT, audit logs should have adequate protection. For this, FAU_STG.4 protects audit 
    logs from unauthorised deletion and prevents unauthorised tampering. If auditable events occur and the 
    audit log files are full, FAU_STG.4 prevents loss of recent audit logs by writing the newer audit logs 
    over audit logs that have the oldest time stamp.  
    						
    							  Page 57 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  d) Reliable record of time of event 
    To fulfill O.AUDIT, a reliable record of the times when events occurred should be available, as this will 
    help identify security breaches. 
    For this, FPT_STM.1 provides a trusted time stamp. 
    O.I&A User identification and authentication 
    Following are the rationale behind the functional requirements corresponding to O.I&A in Table 22, and 
    these requirements are included to fulfill the O.I&A specification. 
    a) Identify and authenticate users before they use the TOE. 
    To fulfill O.I&A, user identification and authentication shall be performed prior to allowing user access 
    to the TOE Security Functions. 
    For this, FIA_UID.2 identifies users prior to their use of TOE Security Functions, and FIA_UAU.2 
    authenticates identified users. 
    b) Allow successfully identified and authenticated users to use the TOE. 
    To fulfill O.I&A, users who authenticate successfully before they use any TOE Security Functions shall 
    be allowed use of the functions they have permission for. 
    For this, FIA_ATD.1 and FIA_USB.1 bind successfully identified and authenticated users with relevant 
    subjects. Association and maintenance of the subjects with security attributes is also performed by 
    FIA_ATD.1 and FIA_USB.1. 
    c) Complicate decoding of passwords. 
    To fulfill O.I&A, passwords for user authentication shall be protected from others while they are being 
    entered, and must not be easily guessable. 
    For this, FIA_UAU.7 prevents passwords being viewed by displaying masking characters (*: asterisks 
    or ?: bullets) in place of each password character entered in the authentication feedback area. 
    FIA_SOS.1 accepts only passwords that satisfy the Minimum Password Length and password character 
    combination specified by the user administrator, and it enables only passwords that are not easily 
    guessable. FIA_AFL.1 also reduces the possibility of users guessing passwords by locking out users 
    when their number of authentication attempts reaches the number specified by the machine 
    administrator. The authentication attempts include user authentication attempts from the Operation 
    Panel, the Web browser of a client computer, or a client computer when printing or faxing. 
    O.DOC_ACC Control of access to protected assets 
    Following are the rationale behind the functional requirements corresponding to O.DOC_ACC in Table 22, 
    and these requirements are included to fulfill the O.DOC_ACC specification. 
    a) Specify access control to document data and perform operations. 
    To fulfill O.DOC_ACC, each user shall be allowed to perform operations on document data according 
    to the operation permissions for document data set for each type of subject associated with the users and 
    each security attribute associated with the subject. 
    For this, FDP_ACC.1 and FDP_ACF.1 allow the administrator to delete document data if the 
    administrators role associated with the administrator process is the file administrator. For general users, 
    FDP_ACC.1 and FDP_ACF.1 allow storage of document data, and when the general user IDs 
    associated with general user processes are registered in the document data ACL of a document,  
    						
    							  Page 58 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  FDP_ACC.1 and FDP_ADF.1 allow the general user to perform operations on document data. The 
    operations that are permitted follow the operation permissions specified in the document data for each 
    general user ID in the document data ACL. 
    O. MANAGE Security management 
    Following are the rationale behind the functional requirements corresponding to O.MANAGE in Table 22, 
    and these requirements are included to fulfill the O.MANAGE specification. 
    a) Management of security attributes. 
    To fulfill O.MANAGE, management of security attributes shall be permitted to specified users only, 
    and a default value shall be specified for the document data ACL, which is a security attribute. For this, 
    FMT_MSA.1 allows: 
    - the user administrator to query, newly create, and change general user IDs; 
    - general users to query general user IDs; 
    - administrators to query and change their own administrator IDs; 
    - supervisors to query administrator IDs; 
    - administrators to query, add, and delete administrator roles assigned to themselves; 
    - supervisors to query and change supervisor IDs; 
    - the file administrator, document file owners, and general users with full control operation permission 
    for the document data to query and modify its document data ACL; and 
    - the user administrator and general users with full control operation permission for the document data 
    to query and modify the default ACLs of document data. 
    FMT_MSA.3 specifies the default value of the document data ACL for storage of new document data. 
    b) Management and protection of TSF data. 
    To fulfill O.MANAGE, access to TSF data shall be limited to specified users. For this, FMT_MTD.1 
    allows: 
    - the machine administrator to query and specify the Number of Attempts before Lockout, specify the 
    setting of the Lockout release timer, specify a Lockout time, specify a Lockout Flag for supervisors, 
    specify the date and time of the system clock, specify the service mode lock setting, newly create and 
    query HDD cryptographic keys, and query and delete audit logs.  
    FMT_MTD.1 also allows: 
    - authorised TOE users to query the date and time of the system clock and the service mode lock 
    setting; 
    - the user administrator to query and specify the Minimum Password Length, complexity setting, and a 
    Lockout Flag for general users; 
    - the user administrator and applicable general users to specify the authentication information of 
    general users, and newly create, delete, and change S/MIME user information; 
    - the user administrator and general users to query S/MIME user information and destination details 
    when sending data to folders; 
    - supervisors to query and specify the Lockout Flag for administrators, and specify supervisor 
    authentication information; and 
    - supervisors and applicable administrators to change administrator authentication information. 
    c) Specify Management Functions. 
    To fulfill O.MANAGE, the Security Management Functions for the implemented TSF shall be  
    						
    							  Page 59 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  performed. 
    For this, FMT_SMF.1 specifies the required Security Management Functions for the Security Function 
    requirements. 
    d) Authorised use of Security Management Functions. 
    To fulfill O.MANAGE, authorised users shall be associated with the security management roles, and 
    operation permissions for the Security Management Functions shall be maintained, since the use of the 
    Security Management Functions depends on the authorised user roles. 
    FMT_SMR.1 associates authorised users with a general user, one of the four administrator roles (user 
    administrator, machine administrator, file administrator, or network administrator), or the supervisor 
    role, and maintains this association. 
    O.MEM.PROTECT Prevention of disclosure of data stored in memory 
    Following are the rationale behind the functional requirements corresponding to O.MEM.PROTECT in 
    Table 22, and these requirements are included to fulfill the O.MEM.PROTECT specification. 
    a) Generate the encryption keys and perform encryption operations adequately. 
    To fulfill O.MEM.PROTECT, the document data stored on the HDD shall be sufficiently encrypted to 
    make decoding difficult unless the document data is read with normal methods using the TOE. 
    For this, FCS_CKM.1 generates encryption keys at a key size of 256 bits with TRNG for the encryption 
    key generation algorithm (based on BSI-AIS31); and FCS_COP.1 encrypts document data when it is 
    stored on the HDD and decrypts it when it is read from the HDD using the encryption keys generated 
    with the AES encryption algorithm (which corresponds to FIPS197). Additionally, FTP_TST.1 tests at 
    the TOE start-up the validity of encryption keys and the performance of the Ic Hdd where encryption is 
    performed, and this prevents storage of unencrypted document data on the HDD. 
    O.NET.PROTECT Protection of network communication data 
    Following are the rationale behind the functional requirements corresponding to O.NET.PROTECT in Table 
    22, and these requirements are included to fulfill the O.NET.PROTECT specification. 
    a) Protect assets on communication path. 
    To fulfill O.NET.PROTECT, document data and print data on the communication path shall be 
    protected from leakage, and attempts at tampering with it shall also be detected.  
    For this, FTP_ITC.1 uses the IPSec protocol to protect data sent from the TOE to folders on FTP or 
    SMB servers, to protect document data on the network from leakage, and also to detect attempts at 
    tampering with document data.  
    FTP_TRP.1 also protects document data on networks from leakage and detects attempts at tampering 
    by use of a trusted path (described later) between the TOE and remote users. The mail service is 
    protected by S/MIME, which protects data sent by e-mail from the TOE to a client computer, protects 
    document data or print data on the network from leakage, and detects attempts at tampering. 
    The SSL protocol protects document data and print data that are is travelling through a web service, 
    print service, or fax service from a client computer from leakage and attempts at tampering.  
    						
    							  Page 60 of 81 
    Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.  O.GENUINE Protection of integrity of MFP Control Software integrity 
    Following are the rationale behind the functional requirements corresponding to O.GENUINE in Table 22, 
    and these requirements are included to fulfill the O.GENUINE specification. 
    a) Check the integrity of the MFP Control Software. 
    To fulfill O.GENUINE, the integrity of the MFP Control Software, which is installed in FlashROM, 
    shall be verified. For this, FPT_TST.1 tests the integrity of the executable code of the MFP Control 
    Software, which is installed in the FlashROM, and verifies its integrity at TOE start-up. 
    O.LINE_PROTECT  Protection from intrusion via telephone line 
    Following are the rationale behind the functional requirements corresponding to O.LINE.PROTECT in Table 
    22, and these requirements are included to fulfill the O.LINE.PROTECT specification. 
    a) Prohibit intrusion via the fax line. 
    To fulfill O.LINE_PROTECT, unauthorised access by an attacker to the TOE via telephone line shall 
    be prevented. 
    For this, FDP_IFC.1 and FDP_IFF.1 allow fax data to pass from the fax process on the Fax Unit to the 
    fax reception process on the Controller Board only if the data received from the telephone line is fax 
    data. 
    6.3.3 Dependency Analysis 
    Table 23 shows the correspondence of dependencies in this ST for the TOE security functional requirements. 
    Table 23: Correspondence of dependencies of TOE security functional requirements TOE security functional requirements Dependencies claimed by CC Dependencies satisfied in ST Dependencies not satisfied in ST FAU_GEN.1 FPT_STM.1 FPT_STM.1 None FAU_SAR.1 FAU_GEN.1 FAU_GEN.1 None FAU_SAR.2 FAU_SAR.1 FAU_SAR.1 None FAU_STG.1 FAU_GEN.1 FAU_GEN.1 None FAU_STG.4 FAU_STG.1 FAU_STG.1 None FCS_CKM.1 [FCS_CKM.2 or 
    FCS_COP.1] 
    FCS_CKM.4 FCS_COP.1 FCS_CKM.4 FCS_COP.1 [FDP_ITC.1 or 
    FDP_ITC.2 or 
    FCS_CKM.1] 
    FCS_CKM.4 FCS_CKM.1 FCS_CKM.4 FDP_ACC.1 FDP_ACF.1 FDP_ACF.1 None FDP_ACF.1 FDP_ACC.1 
    FMT_MSA.3 FDP_ACC.1 
    FMT_MSA.3 None  
    						
    All Ricoh manuals Comments (0)

    Related Manuals for Ricoh Mp 3351 User Guide