
Xerox Multi-Function Device Security Target
3
Copyright2013 Xerox Corporation. All rights reserved.
Table of Contents
1. INTRODUCTION........................................................................................................6
1.1. ST AND TOE IDENTIFICATION.......................................................................................................6
1.2. TOE OVERVIEW ........................................................................................................................7
1.2.1. Usage and Security Features............................................................................................7
1.2.2. TOE Type ........................................................................................................................10
1.2.3. Required Non-TOE Hardware, Software and Firmware .................................................10
1.3. TOE DESCRIPTION ...................................................................................................................11
1.3.1. Physical Scope of the TOE ..............................................................................................11
1.3.2. Logical Scope of the TOE ................................................................................................12
1.4. EVALUATED CONFIGURATION.....................................................................................................15
2. CONFORMANCE CLAIMS......................................................................................16
2.1. COMMON CRITERIA CONFORMANCE CLAIMS ................................................................................16
2.2. PROTECTION PROFILE CLAIMS ....................................................................................................16
2.3. PACKAGE CLAIMS ....................................................................................................................16
2.4. RATIONALE .............................................................................................................................17
3. SECURITY PROBLEM DEFINITION.......................................................................19
3.1. DEFINITIONS ...........................................................................................................................19
3.1.1. Users ..............................................................................................................................19
3.1.2. Objects (Assets) ..............................................................................................................19
3.1.3. Operations......................................................................................................................21
3.1.4. Channels.........................................................................................................................21
3.2. ASSUMPTIONS.........................................................................................................................22
3.3. THREATS ................................................................................................................................23
3.3.1. Threats Addressed by the TOE .......................................................................................23
3.3.2. Threats Addressed by the IT Environment......................................................................23
3.4. ORGANIZATIONAL SECURITY POLICIES ..........................................................................................24
4. SECURITY OBJECTIVES........................................................................................25
4.1. SECURITY OBJECTIVES FOR THE TOE............................................................................................25
4.2. SECURITY OBJECTIVES FOR THE OPERATIONAL ENVIRONMENT ..........................................................26
4.3. SECURITY OBJECTIVES FOR THE NON-IT ENVIRONMENT ..................................................................27
4.4. RATIONALE FOR SECURITY OBJECTIVES .........................................................................................27
5. EXTENDED COMPONENTS DEFINITION..............................................................33
5.1. FPT_FDI_EXP RESTRICTED FORWARDING OF DATA TO EXTERNAL INTERFACES ....................................33
6. SECURITY REQUIREMENTS .................................................................................36
6.1. CONVENTIONS ........................................................................................................................36
6.2. TOE SECURITY POLICIES............................................................................................................37
6.2.1. IP Filter SFP.....................................................................................................................37
6.2.2. User Access Control SFP .................................................................................................37
6.2.3. TOE Function Access Control SFP ...................................................................................39
6.3. SECURITY FUNCTIONAL REQUIREMENTS .......................................................................................40
6.3.1. Class FAU: Security audit................................................................................................41
6.3.2. Class FCO: Communication ............................................................................................43
6.3.3. Class FCS: Cryptographic support...................................................................................43