Ricoh Mp C3001 Instruction Manual
Here you can view all the pages of manual Ricoh Mp C3001 Instruction Manual. The Ricoh manuals for All in One Printer are available online for free. You can easily download all the documents as PDF.
Page 31
Page 30 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. Terms Definitions Users for stored and received documents A list of the normal users who are authorised to read and delete received fax documents. Folder transmission A function that sends documents from the MFP via networks to a shared folder in an SMB Server by using SMB protocol or that sends documents to a shared folder in an FTP Server by using FTP protocol. The following documents can be delivered to folders:...
Page 32
Page 31 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 2 Conformance Claim This section describes Conformance Claim. 2.1 CC Conformance Claim The CC conformance claim of this ST and TOE is as follows: - CC version for which this ST and TOE claim conformance Part 1: Introduction and general model July 2009 Version 3.1 Revision 3 Final (Japanese translation ver.1.0 Final) CCMB-2009-07-001 Part 2: Security functional components July 2009 Version 3.1 Revision 3 Final...
Page 33
Page 32 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 2600.1-SMI conformant 2.4 Conformance Claim Rationale 2.4.1 Consistency Claim with TOE Type in PP The targeted product type by the PP is the Hardcopy devices (hereafter, HCDs). The HCDs consist of the scanner device and print device, and have the interface to connect telephone line. The HCDs combine these devices and equip one or more functions of Copy Function, Scanner Function, Printer Function or Fax Function. The...
Page 34
Page 33 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. For those points mentioned above, the security problems and security objectives in this ST are consistent with those in the PP. 2.4.3 Consistency Claim with Security Requirements in PP The SFRs for this TOE consist of the Common Security Functional Requirements, 2600.1-PRT, 2600.1-SCN, 2600.1-CPY, 2600.1-FAX, 2600.1-DSR, and 2600.1-SMI. The Common Security Functional Requirements are the indispensable SFR specified by...
Page 35
Page 34 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. Ownership of Received Fax Documents For the ownership of the received fax documents, the TOE has the characteristic that the ownership of the document is assigned to the intended user. This is according to PP APPLICATION NOTE 93. Augmentation of FCS_CKM.1 and FCS_COP.1 This TOE claims O.STORAGE.ENCRYPTED as the security objectives for the data protection applied to non-volatile memory media that are neither allowed to be...
Page 36
Page 35 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. The TOE allows the MFP administrator to delete document data and user jobs (document access control SFP, FDP_ACC.1(a) and FDP_ACF.1(a)), and as a result, the TSF restrictively allows the MFP administrator to access the TOE functions. Therefore, the requirements described in FDP_ACF.1.3(b) in the PP are satisfied at the same time. The fax reception process, which is accessed when receiving from a telephone line, is...
Page 37
Page 36 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 3 Security Problem Definitions This section describes Threats, Organisational Security Policies and Assumptions. 3.1 Threats Defined and described below are the assumed threats related to the use and environment of this TOE. The threats defined in this section are unauthorised persons with knowledge of published information about the TOE operations and such attackers are capable of Basic attack potential. T.DOC.DIS...
Page 38
Page 37 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 3.2 Organisational Security Policies The following organisational security policies are taken: P.USER.AUTHORIZATION User identification and authentication Only users with operation permission of the TOE shall be authorised to use the TOE. P.SOFTWARE.VERIFICATION Software verification Procedures shall exist to self-verify executable code in the TSF. P.AUDIT.LOGGING Management of audit log records The TOE shall...
Page 39
Page 38 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. A.ADMIN.TRAINING Administrator training Administrators are aware of the security policies and procedures of their organisation, are competent to correctly configure and operate the TOE in accordance with the guidance document following those policies and procedures. A.ADMIN.TRUST Trusted administrator The responsible manager of MFP selects administrators who do not use their privileged access rights for malicious...
Page 40
Page 39 of 93 Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 4 Security Objectives This section describes Security Objectives for TOE, Security Objectives of Operational Environment and Security Objectives Rationale. 4.1 Security Objectives for TOE This section describes the security objectives for the TOE. O.DOC.NO_DIS Protection of document disclosure The TOE shall protect documents from unauthorised disclosure by persons without a login user name, or by persons with a...