
Xerox® Security Guide for Light Production Mono Class Products
Table of Contents
1INTRODUCTION ...................................................................................................................................3
PURPOSE ....................................................................................................................................................3
TARGET AUDIENCE ......................................................................................................................................3
DISCLAIMER.................................................................................................................................................3
PHYSICAL COMPONENTS..............................................................................................................................4
ARCHITECTURE............................................................................................................................................4
USER INTERFACE.........................................................................................................................................5
SCANNER ....................................................................................................................................................5
MARKING ENGINE ........................................................................................................................................6
CONTROLLER ..............................................................................................................................................6
OPTIONAL EQUIPMENT.................................................................................................................................8
2USER DATA PROTECTION .................................................................................................................9
USER DATA PROTECTION WHILE WITHIN PRODUCT .........................................................................................9
USER DATA IN TRANSIT ..............................................................................................................................10
3NETWORK SECURITY.......................................................................................................................12
TCP/IP PORTS &SERVICES.......................................................................................................................12
NETWORK ENCRYPTION .............................................................................................................................19
NETWORK ACCESS CONTROL.....................................................................................................................24
CONTEXTUAL ENDPOINT CONNECTION MANAGEMENT..................................................................................25
FIPS140-2 COMPLIANCE VALIDATION.........................................................................................................25
ADDITIONAL NETWORK SECURITY CONTROLS .............................................................................................25
4DEVICE SECURITY: BIOS, FIRMWARE, OS, RUNTIME, AND OPERATIONAL SECURITY
CONTROLS................................................................................................................................................27
FAIL SECURE VS FAIL SAFE........................................................................................................................27
PRE-BOOT SECURITY.................................................................................................................................28
BOOT PROCESS SECURITY.........................................................................................................................28
RUNTIME SECURITY ...................................................................................................................................28
EVENT MONITORING &LOGGING ................................................................................................................29
OPERATIONAL SECURITY............................................................................................................................29
BACKUP &RESTORE (CLONING).................................................................................................................30
EIP APPLICATIONS.....................................................................................................................................30
5CONFIGURATION & SECURITY POLICY MANAGEMENT SOLUTIONS........................................31
6IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION.....................................................32
AUTHENTICATION.......................................................................................................................................32
AUTHORIZATION (ROLE BASED ACCESS CONTROLS)...................................................................................35
7ADDITIONAL INFORMATION & RESOURCES.................................................................................38
SECURITY @XEROX®...............................................................................................................................38
RESPONSES TO KNOWN VULNERABILITIES ..................................................................................................38
ADDITIONAL RESOURCES ...........................................................................................................................38
APPENDIX A: PRODUCT SECURITY PROFILES...................................................................................39
LEGACY®4110, 4112/4127, 4590 EPS PRINTERS....................................................................................40
LEGACY®4110, 4112/4127, 4590 COPIER/PRINTERS................................................................................43
D-SERIES®D95A/D110/D125/D136 COPIER/PRINTERS............................................................................46