
Xerox® Security Guide for Entry Production Color Class Products
March 2019 Page 1-1
Table of Contents
1INTRODUCTION ................................................................................................................................1-3
PURPOSE .................................................................................................................................................1-3
TARGET AUDIENCE ...................................................................................................................................1-3
DISCLAIMER..............................................................................................................................................1-3
PHYSICAL COMPONENTS...........................................................................................................................1-3
ARCHITECTURE.........................................................................................................................................1-4
USER INTERFACE......................................................................................................................................1-4
SCANNER .................................................................................................................................................1-4
MARKING ENGINE .....................................................................................................................................1-4
CONTROLLER ...........................................................................................................................................1-5
OPTIONAL EQUIPMENT..............................................................................................................................1-5
2USER DATA PROTECTION ..............................................................................................................2-7
USER DATA PROTECTION WHILE WITHIN PRODUCT ......................................................................................2-7
USER DATA IN TRANSIT .............................................................................................................................2-8
3NETWORK SECURITY....................................................................................................................3-10
TCP/IP PORTS &SERVICES....................................................................................................................3-10
NETWORK ENCRYPTION ..........................................................................................................................3-11
NETWORK ACCESS CONTROL..................................................................................................................3-16
CONTEXTUAL ENDPOINT CONNECTION MANAGEMENT...............................................................................3-17
FIPS140-2 COMPLIANCE VALIDATION......................................................................................................3-17
ADDITIONAL NETWORK SECURITY CONTROLS ..........................................................................................3-17
4DEVICE SECURITY: BIOS, FIRMWARE, OS, RUNTIME, AND OPERATIONAL SECURITY
CONTROLS.............................................................................................................................................4-19
FAIL SECURE VS FAIL SAFE.....................................................................................................................4-19
PRE-BOOT SECURITY..............................................................................................................................4-20
BOOT PROCESS SECURITY......................................................................................................................4-20
RUNTIME SECURITY ...................................................................................ERROR!BOOKMARK NOT DEFINED.
EVENT MONITORING &LOGGING .............................................................................................................4-20
OPERATIONAL SECURITY.........................................................................................................................4-21
BACKUP &RESTORE (CLONING)..............................................................................................................4-21
EIP APPLICATIONS..................................................................................................................................4-21
5CONFIGURATION & SECURITY POLICY MANAGEMENT SOLUTIONS.....................................5-22
6IDENTIFICATION, AUTHENTICATION, AND AUTHORIZATION..................................................6-23
AUTHENTICATION....................................................................................................................................6-23
AUTHORIZATION (ROLE BASED ACCESS CONTROLS)................................................................................6-25
7ADDITIONAL INFORMATION & RESOURCES..............................................................................7-26
SECURITY @XEROX®............................................................................................................................7-26
RESPONSES TO KNOWN VULNERABILITIES ...............................................................................................7-26
ADDITIONAL RESOURCES ........................................................................................................................7-26
APPENDIX A: PRODUCT SECURITY PROFILES................................................................................7-27
VERSANT®80/180 ................................................................................................................................7-28
VERSANT®2100/3100...........................................................................................................................7-31