Home
        bizhub C554 / bizhub / bizhub / bizhub C454
         Contents
1.                                             6 1 1 5  TOE Access    FTA_SSL 3 TSF initiated termination    FTA_SSL 3 1  The TSF shall terminate an interactive session after a assignment  time interval of user inactivity             assignment  time interval of user inactivity     Time decided from the final operation depending on the system auto reset time  1 9 minute s  while a  administrator or a user is operating on the panel  Hierarchical to   No other components                Dependencies   No dependencies       6 1 1 6  Trusted path Channel    FTP_ITC 1 Inter TSF trusted channel    FTP_ITC 1 1  The TSF shall provide a communication channel between itself and another trusted IT product that is  logically distinct from other communication channels and provides assured identification of its end                   Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   63 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          points and protection of the channel data from modification or disclosure   FTP_ITC 1 2  The TSF shall permit  selection  the TSF another trusted IT product  to initiate communication via the  trusted channel    selection   the TSF another trusted IT product   The other trusted IT product  FTP_ITC 1 3    The TSF shall initiate communication via the trus
2.                            mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 2            FIA_AFL 1 4  Authentication failure handling       FIA_AFL 1 1 4     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events            Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   44 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target           assignment  Let of authentication events       Authentication for accessing the TOE by user    Re authentication when a user changes his her own user password   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 4   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jist of actions     selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt     While authentication is perfor
3.        Encryption key generation function  Performs encryption decryption by ASIC when writing data in HDD or reading data from  HDD   TOE does not process the encryption and description itself    The operational setup of this function is performed by the administrator function  When  activated  TOE generates the encryption key by the encryption passphrase that was entered  on the panel        Remote diagnostic function  MFP   s equipment information such as operating state and the number of printed sheets is  managed by making use of the connection by a port of FAX public line  by a modem through  RS 232C or by E mail or WebDAV to communicate with the support center of MFP produced  by Konica Minolta Business Technologies  Inc  In addition  if necessary  appropriate services   shipment of additional toner packages  account claim  dispatch of service engineers due to  the failure diagnosis  etc   are provided        Updating function of TOE  TOE facilitated with the function to update itself  As for the update means  there are a  method that exists as one of items of remote diagnostic function  a method that downloads  from FTP server through Ethernet  TOE update function via Internet   and a method that    performs the connection of external memory       Encryption communication function  TOE can encrypt the data transmitted from client PC to MFP  and the data received by  download from MFP by using SSL TLS   The operational setup of this function is performed by the adminis
4.      7 1 3 8  User Box Setup      User Box Registration  When the administrator attribute is related  the view of the list of user boxes is permitted  A  personal user box  a group user box  and a public user box are registered by selecting the user  attribute to the non registration user box ID selected from the list of user boxes  When they  are registered     public    is specified on the user attribute of the user box by default  however  a  user ID or an account ID can be selected    gt  Inthe case of the personal user box  the arbitrary user ID registered is specified    gt  Inthe case of the public user box  verify that a user box password registered satisfies the  following conditions   e It is composed of the characters and by the number of digits  shown in the user box  password of the Table 13    e Tt shall not be composed of one kind of character     gt  Specify the arbitrary account ID registered when group user box       Change of User Box Password   gt  The user box password set to the public user box is changed    gt  It verifies whether the user box password newly set have been satisfied the following  qualities   e It is composed of the characters and by the number of digits  shown in the user box  password of the Table 13   e Tt shall not be composed of one kind of character        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   91 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828 
5.    The TSF shall enforce the  assignment  access control SFP s   information flow control SFP s  to  restrict the ability to  selection  change_default  query  modify  delete   assignment  other operations     the security attributes  assignment  Jet of security attributes  to assignment  the authorized identified  roles                                 assignment  list of security attributes     User attributes of user box that is set the  Account ID     selection  change_default  query  modify  delete   assignment  other operations     modify  modify to luser ID    public  or other  account ID    assignment  the authorized identified roles       User who is permitted to use that account    Administrator                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   54 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target           assignment  access control SFP information flow control SFP            User box access control  Hierarchical to   No other components  Dependencies   FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FAT_SMF 1  FMT_SMF 1          FMT _SMR 1  FMT_SMR 1 2   FMT_SMR 1 6      FMT_MSA 3 1  Static attribute initialization    FMT_MSA 3 1 1           The TSF shall enforce the  assignment  access control SFP information flow control SEH to provide   selection  ch
6.    The generation of the audit log related to all authentication functions and to all jobs necessary  to be audited must be maintained  Also  the audit log must be protected from a person who  does not have the authority of disclosure or change  and it must be set to be accessed by a  person who has the authority        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   22 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       4  Security Objectives    In this chapter  in relation to the assumptions  the threats  and the organizational security  policy identified in Chapter 3  the required security objectives for the TOE and the environment  for the usage of the TOE are described by being divided into the categories of the security  objectives for the TOE and the security objectives for the environment  as follows     4 1  Security Objectives for the TOE  In this section  the security objectives for the TOE is identified and described   O REGISTERED USER  Utilization of permitted user   TOE permits the use of MFP installed TOE only to the user who succeeded in the  identification and authentication     O PRIVATE BOX  Personal user box access control    e TOE permits only a user to use the user function of the personal user box that this user  owns    e TOE permits only a user
7.   2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   39 115       bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          lassignment  access control SFP  Secure print file access control   FDP_ACF 1 2 2    The TSF shall enforce the following rules to determine if an operation among controlled subjects and   controlled objects is allowed   assignment  rules governing access among controlled subjects and controlled    _ objects using controlled operations on controlled objects     assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects       A task to act for a user who has a user attribute  user ID  is permitted to display the list of all the secure  print files     A task to act for a user who has the file attribute  the secure print internal control ID  is permitted the  print operation to the secure print file that has matched the file attribute  secure print internal control    ID  with the file attribute  secure print internal control ID    FDP_ACF 1 3 2   The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects     assignment  rules  based on security attri
8.   7 1 3 10  Operation Setup of HDD Encryption Function     lt Encryption Passphrase Change gt   The encryption passphrase is changed  It is changed when the newly setup encryption       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   94 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    passphrase satisfies quality requirements  and F CRYPTO is performed     Verify that the encryption passphrase newly set satisfies the following qualities     gt  It is composed of the characters and by the number of digits shown in the encryption   passphrase of the Table 13    gt  It shall not be composed of one kind of character    gt  It shall not be matched with the current value   As described above  FIA_SOS 1 3   FMT_MTD 1 3   FMT _SMF1 and FMT _SMR 1 2  are   realized     7 1 3 11  Change of SNMP Password    The SNMP password  Privacy password and Authentication password  is changed  This is  performed when the newly setup password satisfies quality requirements     Verifies that the SNMP password which is newly set satisfies the following qualities     gt  It is composed of the characters and by the number of digits shown in SNMP password of   the Table 13     gt  It shall not be composed of one kind of character     gt  It shall not be matched with the current value    As describe
9.   User who is  permitted to use secure print file    Hierarchical to   FIA_UAU 1                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   49 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target             Dependencies   FIA_UID 1  FIA_UID 2 4      FIA_UAU 2 4  User authentication before any action    FIA_UAU 2 1 4   The TSF shall require each user  User who is permitted to use the public user box  to be  successfully authenticated before allowing any other TSF mediated actions on behalf of that user   User who is permitted to use the public user box                       Hierarchical to   FIA_UAU 1   Dependencies   FIA_UID 1  FIA_UID 2 5    FIA_UAU 6 Re authenticating  FIA_UAU 6 1       The TSF shall re authenticate the user under the conditions  assignment  et of conditions under  which re authentication is required    l assignment  Jet of conditions under which re authentication is required      When the service engineer modifies the CE password      When the administrator modifies the administrator password      When the user changes his her user password      When a user permitted to use a public user box changes the user box password of the public user                            box   Hierarchical to   No other components  Dependencies   No dependencies  F
10.   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       T BACKUP RESTORE  Unauthorized use of backup function and restoration function   User box files  secure print files  or ID  amp  print files can leak by those malicious including users  using the backup function and the restoration function illegally  Also highly confidential data  such as passwords can be exposed  so that settings might be falsified     3 4  Organizational Security Policies    Recently  there are a lot of organizations that demand security of network in office  Although a  threat of wiretapping activities etc  in intra office LAN is not assumed in this ST  TOE security  environment that corresponds to the organization that demanded security measures in  intra office LAN is assumed  Moreover  although a accumulated data in a client PC and a server  existing in internal network  and a general data traveling across the internal network are not  protected assets  TOE security environment that corresponds to the organization that prohibited  the access to internal network via MFP from Fax public line portal is assumed    Also  there are a lot of organizations that want to decrease the motivation of illegal operations  such as the unauthorized use of MFP by an attacker and the exposure and falsification of image  files which are the assets  Since the audit log function can trac
11.   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       e Jt shall not be equal to the value which is currently set        Change of user attribute of user box   gt  Specify the user attribute of a personal user box to the other user or the account that  registered    gt  Specify the user attribute of group user box to the user or the other account that  registered    gt  Specify the user attribute of public user box to the user or account that registered    gt  Specify the user attribute of a personal user box or group user box to public   e If a user box password is not registered at the same time  the password shall be  registered  and the same processing as the change of user box password mentioned  above is performed     As described above  FDP _ACC 1 1   FDP_ACFil 1   FIA_S08 1 1   FMT _MSA 1 1    FMT_MSA 1 2   FMT_MSA 1 3   FMT_MSA 3 1   FMT_MTD 1 4   FMT_MTD 115   FMT_SMF 1  and FMT_SMR 1 2  are realized     7 1 3 4  Release of Lock       Reset  clear all  the number of times of authentication failure for each users    gt  Ifthere is a user to whom access is locked  the lock is released      Reset  clear all  the number of times of authentication failure for all secure print passwords    gt  If there is a secure print password to which access is locked  the lock is released      Reset  clear all  the number of times of authentication failure of each user boxes    gt   Ifthere is a user box 
12.   e Modification function of administrator password    The following is a set of operation setting functions related especially to the behavior of the    security function       Authentication setup of the service engineer with the CE    password    gt  Whether to activate or stop the function is selected   e Setup of remote diagnostic function  later description    gt  Able to select permission or prohibition      Setup of a TOE update function via Internet   gt  Able to select permission or prohibition     Setup of maintenance function   gt  Able to select permission or prohibition   e The format function of HDD   gt  Alogical format and a physical format are executable   e Installation setting of HDD   gt  An explicit installation setting is necessary to use HDD as a data storage area      Initialization function   gt  The various settings that the user or the administrator has set and the data that the user  has stored are deleted     1 4 3 7  Other Functions    TOE provides the functions that run background without awareness of the user and the  updating function of TOE  The following explains the major functions     7 An abbreviation of Customer Service engineer       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   15 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  
13.   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         Account authentication function  for administrator    synchronized method  The method which utilizes an account ID associated with user ID beforehand     Account authentication function  for administrator    method not synchronized  The method to authenticate by the account ID and the account password at the time of access   without utilizing the account ID that associated with user ID beforehand      Account authentication function  for administrator    not use  Utilize only the authentication function by user ID  and not utilize the identification and  authentication by account information     Account authentication function  for administrator    Synchronize by User  Registered user sets    Synchronize or Do Not synchronize    for User Authentication  amp  Account  Track   As described above  FMT_MOF 1  2   FMT_MOF1 3   FMT_MTD 1 3   FMT_MTD 1 11    FMT_SMF 1 and FMT_SMR 1 2  are realized     7 1 3 6  Unauthorized Access Setup      Setup of unauthorized access detection threshold  The unauthorized access detection threshold in the authentication operation prohibition  function is set for 1 3 times       Setup of the release time of operation prohibition for Administrator Authentication  Set the release time of operation prohibition for Administrator Authentication between 5 60    minutes   As described above  FMT_MTD 1 3   FMT SMF 1 and FMT_SMR 1 2  are realized     7 1 3 7  Se
14.   it locks all the authentication functions to the user    gt  The administrator specifies the failure frequency threshold by the operation setting of  the authentication operation prohibition function   e The lock of authentication function is released by performing the lock release function to the  concerned user of FADMIN   As described above  FIA_AFL 1 4   FIA_AFL 1 8   FIA_ATD 1  FIA_UAU  1 1   FIA_UAU 7  FIA_UID 2 3  and FIA_USB 1 are realized      lt  Account authentication  Account registration function when the belonging account of user is   not registered in the synchronized method gt      Require the Account authentication after User identification and authentication      Register the successful account ID as account name when succeeding in the account  authentication   By this  FAT_MTD 1 12   FMT_SMF 1 and FMT_SMR 1 6  are realized     The detail of the account authentication is the same as processing of the items explained in  the following  lt  Account authentication  User identification and authentication in the  authentication method not synchronized gt       lt  Account authentication  User identification and authentication in the authentication method  not synchronized gt    When the access request for the user box and the store request for the secure print file  it is  identified and authenticated to be a permitted user  The detail of user authentication is the same  as account authentication  user identification and authentication in the synchronized metho
15.  Authorisation controls ALC_CMC 3  Implementation representation CM coverage ALC_CMS 3  ALC  Life Cycle Support Delivery procedures ALC_DEL1   Identification of security measures ALC_DVS 1  Developer defined life cycle model ALC_LCD 1  Conformance claims ASE_CCL 1  Extended components definition ASE_ECD 1  ST introduction ASE_INT 1       AGD  Guidance documents    ASE  Security Target Evaluation   Security objectives ASE_OBJ 2  Derived security requirements ASE_REQ 2       Security problem definition ASE_SPD 1  TOE summary specification ASE_TSS 1  Analysis of coverage ATE_COV 2  Testing  basic design ATE_DPT 1  Functional testing ATE_FUN 1  Independent testing   sample ATE_IND 2  AVA  Vulnerability Assessment   Vulnerability analysis AVA_VAN 2       ATE  Tests             6 2  IT Security Requirements Rationale  6 2 1  Rationale for IT Security Functional Requirements  6 2 1 1  Necessity    The correspondence between the security objectives and the IT security functional  requirements are shown in the following table  It shows that the IT security functional       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   67 115    bizhub C554  bizhub C454  bizhub C864  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554 ineot 454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    requirements correspond to at least one security objective     Table 10 Conformity of IT Security Functional Re
16.  C7828   bizhub C7822   ineo  564  ineot 454   ineo     364   ineo  284   ineo  224 Control Software _A2XKOY0 0100 G00 56 Security Target  7 2 1  Identification and Authentication Function by SNMP Password        c ccsccceeseeseeeseeeeeeeeeseeeeeneeesineeeneeeseneeeneeeeae 99  7 2 2  Management Function USING SNMP  nenene 100  7 3  F SERVICE  Service Mode Function           sssesssesssesressresttrettntrtrerttntttntttnntnrettnnttnntennnnnnt renee nee 100  7 3 1  Service Engineer Identification Authentication Functon   100  7 3 2  Function Supported in Service Mode  101  7 4  FUSER   User FUunction        ccccccccsecsscsessssseesescseseteeesscesscssesscsevssseteseteaesesesesnsessceeesecstesesiesceesscssees 102  7 4 1  User Authentication FUNCTION         cccsccccccecsecccsenneneteanensennsenesusnsenessneenansedeessusesenesasenasueneesenensetensasensnenestsneenens 102  7 4 2  Operation Method Setup Function of Account Authentication Functon  104  7 4 3  Auto Logout Function in User Identification and Authentication DOMAIN         ccccccceeseeeneeeeteneeeennneteteneees 104  7 4 4  Modification Function of User Password  105  7 5  F BOX  User Box FUNCTION     tee edd ee 105  7 9 1  Personal User Box  FUNCION enero ipee etarmen ienaa aneta aaa aAa aparia ae Aaaa aeaii e iaaeaie iiiad 106  7 9 2  Public  User Box ele 107  7 5 3  Group Us  r BOX FUNCUON sernpri iet eitn Ee Fe ced NAA E Aa E AA EA AE EEEa TEATE ATE TANTE 109  7 6  F PRINT  Secure Print Function  ID  amp  Print Fonctio
17.  FIA_UAU 6  FIA_UAU 7  FMT_MTD 1 6    FMT_SMF 1 and FMT_SMR  112  are realized     7 1 3 2  User Setup    e User Registration  Only the user who uses with the machine authentication as User  authentication method    User is registered by setting the user ID  Though user ID is composed of the user name and  the authentication server information   only user name is registered in case of the machine  authentication   and registering the user password  It verifies whether the user password  newly set have been satisfied the following qualities    gt  Itis composed of the characters and by the number of digits  shown in the user password   of the Table 18     gt  It shall not be composed of one kind of character   While the external server authentication is effective  the user password cannot be registered   Also register the belonging account  account ID   and relate   The account setting is  necessary beforehand      e Change of user password  Only the user who uses with the machine authentication as User  authentication method         14 Te associates with the external server authentication setting data that is set in the case of the use of the  external server  only Active Directly method is applicable  as the method of the user authentication function   Because it deals when there are plural user information management servers  there is a case in which plural sets  of authentication server information are included in the external server information setting data        Copyrig
18.  FMT_MTD 1 1 13     The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF datal     User ID   Account ID   selection  change_default  query  modify  delete  clear   assignment  other operationell     assignment  other operations    Pause and resume    assignment  the authorized identified roles                           Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1 FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 5         FMT_MTD 1 14  Management of TSF data    FMT_MTD 1 1 14     The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the lassignment  list of TSF datal to  assignment  the authorized identified roles    l assignment  list of TSF datal    Audit log   selection  change default  query  modify  delete  clear   assignment  other operationell   query  delete   assignment  the authorized identified roles                              Administrator  Hierarchical to   No other components  Dependencies    FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MTD 1 15  Management of TSF data    FMT_MTD 1 1 15     The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the lassignment  list of TSF datal to  assignmen
19.  Reserved   12 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       Set an Account ID on a user beforehand  and associate the user with the account ID of the  user   s account when he she is authenticated     2  Method not synchronized with User Authentication  Associate a user with his her account ID when the user is authenticated by the account  password set for each account ID     1 4 3 5  Administrator Function    TOE provides the functions such as the management of user boxes  management of user  information at the time of MFP authentication and management of various settings of the  network  image quality  etc in the administrator mode that only authenticated administrator can  manipulate     The following shows the functions related to the security     Se User registration management   gt  Registration or change of user IDs passwords  deletion of users  and pause resume of users   gt  Change of the association between users and account IDs     Account registration management   gt  Registration or change of account IDs passwords and pause resume of accounts      Management of user box settings   gt  Registration or change of user box passwords  and management of user attributes     Operational setup of automatic system reset   gt  Setup of the function that logs out automatically when the setting time pass
20.  Rights Reserved   9 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Power switches for activating MFP       Panel  An exclusive control device for the operation of MFP  equipped with a touch panel of a liquid  crystal monitor  ten key  start key  stop key  screen switch key  etc        Scan unit automatic document feeder  A device that scans images and photos from paper and converts them into digital data       Printer unit  A device to actually print the image data which were converted for printing when receives a  print request from the MFP controller       Ethernet  Supports 1OBASE T  100OBASE TX  and Gigabit Ethernet     e USB  Copying image file to an external memory  copying or printing image file from an external  memory  and update of TOE  etc  can be performed through this interface  This is also usable  as a connection interface of the optional parts  There is the device interface kit which is need  for copy or print from Bluetooth device and the USB keyboard  to complement key entry from  the panel  Including an external memory  it is necessary to be able to use them       RS 232C  Serial connection using D sub 9 pin connectors is usable  The maintenance function is usable  through this interface in the case of failure  It is also possible to use the remote diagnostic  function  described later 
21.  This condition assumes each password and encryption passphrase using for the use of TOE  should not be leaked by each user    OE SECRET regulates that the administrator makes the user to execute the operation rule  concerning the secure print password  user box password  user password  and account  password and that the administrator executes the operation rule concerning the  administrator password  SNMP password  encryption passphrase  and account password  It  also regulates that the service engineer executes the operation rule concerning the CE  password  and that the service engineer makes the administrator to execute the operation  rule concerning the administrator password  so that this condition is realized     4 3 3  Sufficiency of Threats  The security objectives against threats are described as follows     e T DISCARD MFP  Lease return and discard of MFP   This threat assumes the possibility of leaking information from MFP collected from the user   O OVERWRITE is that TOE provides the function to overwrite the image data area of HDD  by data for deletion  so that the possibility of the threat is reduced by executing this function  before MFP is collected  Also  OE SETTING SECURITY indicates the operation of the       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   28 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  2
22.  account    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1  8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1  7  locks the authentication function for that account from then  on  This lock status is released by the administrator s release operation    FMT_MTD 1 3  permits only the administrator the setup of the threshold of the unauthorized  access detection value that is the trial frequency of the failure authentication in the  authentication of the user who is permitted the use of the group user box    When FIA_ATD 1 and FIA_USB 1 relates to the user box ID under the task to act for user   FDP_ACC 1 1  and FDP_ACF 1 1  permit the user box file that has a corresponding object  attribute to the account ID and the user box ID of the subject attribute the operation such as    print  download  transmissions  movement and copy      lt Management of the group user box gt    FMT_MAS 1  3  permits the modification operation of the user attribute of the user box that  is set  account ID  to the user who is permitted the access to the group user box and the  administrator    For the user box attribute of the user box file  the user box attribute value of the selected user  box as storage is set by FMT_MSA 3  3       lt Management of the subject attribute
23.  account locks in the administrator authentication and CE authentication      1  CE Authentication function lock release processing function  The function is executed by the specific operation  and the lock is released by clearing the  failure frequency of the CE authentication to 0 after the release time of operation prohibition  for CE authentication   As described above  FIA_AFL 1 1  is realized        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   111 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target     2  Administrator authentication function lock release processing function  The function is executed by OFF ON of the main power supply  and the lock is released by  clearing the failure frequency of the administrator authentication to 0 after the release time of  operation prohibition for Administrator authentication   As described above  FIA_AFL 1 2  is realized     7 9  FTRUSTED PATH  Trust Channel Function     F TRUSTED PATH is a function that generates and achieves the Trusted Channel by using  SSL or TSL protocol when transmitting and receiving the following image file between client PC  and MFP      User box file  download from MFP to client PC      Image file that will be stored as a user box file  upload from client PC to MFP       Image file that will be stored
24.  as Secure Print file  upload from client PC to MFP      Image file that will be stored as an ID  amp  print file  upload from client PC to MFP    As described above  FTP_ITC 1 is realized     7 10  FS MIME  S MIME Encryption Processing Function     F S MIME is a function to encrypt the user box file when transmitting the user box file as  S MIME      lt User box file Encryption Key generation gt     The Encryption key is generated to encrypt the user box file by the pseudorandom number  Generation Algorithm which FIPS 186 2 provides   Encryption key length is 128  168  192  or 256 bits    As described above  FCS_CKM 1 is realized      lt Encryption of User box file  gt      Itis encrypted by AES which FIPS PUB 197 provides by using encryption key  128  192 and  256 bits  to encrypt the user box file      Itis encrypted by the 3 Key Triple DES which SP800 67 provides by using the encryption  key  168 bits  to encrypt the user box file   As described above  FCS_COP 1 is realized      lt Encryption of User box files Encryption key gt     The encryption key to encrypt the user box file is encrypted by RSA which FIPS 186 2  provides      The key length of the encryption key used in this case is 1024  2048  3072 or 4096 bits   As described above  FCS_COP 1 is realized     7 11  FFAX CONTROL  FAX Unit Control Function     F FAX CONTROL is the function that prohibits an access to internal network connected to  MFP through the FAX unit by TOE control        Copyright c  2011 2012 KON
25.  attribute corresponding to the user attribute  user ID  of the subject attribute            lt Operation control to Group user box gt   A task to act for a user is permitted to do the list display operation to the user box with the Account  Name of an object attribute corresponding to the Account Name  account ID  of the subject attribute      lt Operation control to Public user box gt   A task to act for the user who is related to the user attribute  user ID  is permitted to do the list  display operation to the user box where  Public  is set to the user attributes of the object attribute      lt Operational control to User box file gt   A task to act for a user is permitted to print  transmit  E mail transmission  FTP transmission  SMB  transmission  FAX transmission and WebDAV transmission   download  move to other user boxes   copy to the other user boxes and copy to external memory  to the user box file that have the matched    the user box attribute  user box ID  of the object attribute with the user box attribute of the subject  attribute        FDP_ACF 1 3 1   The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects     assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects      A task to act for the user that has an administrator attribute is permitted to operate 
26.  by connecting with the public line via a modem       FAX unit    optional part   A device that has a port of Fax public line and is used for communications for FAX data  transmission and remote diagnostic  described later  via the public line  Is not pre installed  in MFP as a standard function according to the circumstances in sales  but sold as an optional  part  Fax unit is purchased when the organization needs it  and the installation is not  indispensable     1 4 2 3  Guidance    e bizhub C554   C454   C364   C284   C224 Service Manual Security Functions  Japanese    e bizhub C554   C454   C364   C284   C224   C7828   C7822 SERVICE MANUAL SECURITY  FUNCTION     ineo  554   454   364   284   224 SERVICE MANUAL SECURITY FUNCTION   e bizhub C554   C454   C364   C284   C224 User s Guide Security Functions  Japanese    e bizhub C554   C454   C364   C284   C224 User s Guide  Security Operations        1 It is usable when the display language is English  French  Italian  German or Spanish  It does not affect the  operation of security functions        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   10 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       e bizhub C7828   C7822 User s Guide  Security Operations     ineo  554   454   364   284   224 User s Guide  Security Ope
27.  control      lt User box access control  a group user box  gt    After the user has been identified and authenticated  the user ID is associated with the task  of acting a use by FIA_ATD 1 and FIA_USB 1  And after the account has been authenticated   the account ID is associated with the task of acting a use by FIA_ATD 1 and FIA_USB 1   FDP_ACC 1 1  and FDP_ACF 1 1  permits a task to act for the user to operate the list to the       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   73 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       user box  group user box  where the user attribute corresponded with the Account Name   account ID  in the security attribute of the subject is set    It is required to be a user who is permitted the use of the group user box to operate the user  box file in the group user box which is not a pause status of use  When the Account  authentication method is  the method not synchronized   FIA_UID 2  6  and FIA_UAU 1  2   identifies and authenticates that it is a user who is permitted the use of the group user box   When the account authentication method is  synchronized method  and the Account that user  belongs to is not registered  FIA_UID 2  6  and FIA_UAU 1  2  identifies and authenticates  that it is a user who is permitted the use of the
28.  for the user authentication function by the Active  Directory of the user information management server     This security objective is satisfied by this functional requirement     e O CRYPTO CAPABILITY  Support action to use the HDD encryption function   This security objective regulates that TOE supports the action to encrypt the data stored in  HDD by ASIC that is the entity outside TOE  and needs various requirements that regulates  to support the external entity action   Applying FIT_CAP 1 2   a support function to process all data in HDD through the HDD  encryption function implemented by ASIC is achieved for that HDD encryption function   This security objective is satisfied by this functional requirement     e O AUDIT LOGGED  Acquisition and management of Audit log   This security objective regulates that TOE maintains the generation of the audit log related  to all authentication functions and to all jobs necessary to be audited  and protects the audit  log from a person who does not have the authority of disclosure or change  and needs  requirement that relates to the audit log   Applying FAU_GEN 1 and FAU_GEN 2  the function to generate the audit log related to all  authentication functions and jobs  necessary to be audited  applying FAU_SAR 1 FAU_SAR 2   FAU_STG 1  FAU_STG 4 1   FAU_STG 4I 2   the function to protects the audit log from a  person who does not have the authority of disclosure or change are achieved   In order to provide user information and date ti
29.  gt  The encryption method used for communications is set up     Setup of the transmission address data     gt  A transmission address or method used for box file transmission etc  is selected        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   14 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        gt  S MIME certificates are imported     Setup of the FTP server function   gt  Whether to activate or stop the function is selected      Setup of the S MIME function   gt  Whether permit or prohibit the S MIME certificate automatic registration function is  selected    gt  The encryption method used for data encryption is selected      Setup of the ID  amp  print function   gt  Whether to activate the ID  amp  print function or not in normal printing is selected     Setup of the HDD data overwrite deletion function   gt  The deletion method is selected      Operational Setup of the Audit log when it is full    gt  The operational setting of the audit log when it is full is selected     1 4 3 6  Service Engineer Function    TOE provides a management function of administrator and a maintenance function  such as  adjusting the device for Scan Print etc  within the service mode that only a service engineer can  operate  The following shows the functions related to security   
30.  in this ST    FIA_USB 1 FIA_ATD 1 I  FMT_MOF 1 MT_SME 1   FMT_MOF 1 Ce i  FMT_MOF 1    FMT_MOF 1 5     FMT_MSA 1         1    2    3    1    2    3    1    2     FMT _MSA 1     MT_SMF1   2 i MT_SMR 1 2   FMT_SMR 1 4   FMT_MSA 1    S   Neither is applicable     lt The reason not to apply FMT_MSA 1 gt   This is the internal control ID that is identified  uniquely  and this does not require the management   FMT_MSA 3 such as change or deletion  after this is assigned once    lt FMT_SMR 1 gt   The assignment of FMT_MSA 3 2 2  is not applicable   FMT_SMR 1 is the dependency that is set relating to  the following and so there is no necessity of  application     FMT_MSA 1  Neither is applicable   FMT_SMR 1                 lt The reason not to apply FMT_MSA 1 gt    The user box attribute of a user box file always needs  to correspond with the user box  Therefore  the value  only has to be given at the time of storage  It is not  necessary to change the value of this attribute at the  time of other operational timing  Accordingly  the  management requirement is unnecessary    lt FMT_SMR 1 gt    The assignment of FMT_MSA 3 2 3  is not applicable   FMT_SMR 1 is the dependency that is set relating to  the following and so there is no necessity of    FMT _MSA 3 3     application   FMT_MSA 1  Neither is applicable   FMT_SMR 1       FMT _MSA 3 4        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   85 115    bizhub C554  bizhub C454 bizhub C364  bi
31.  initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                                   None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  N A    FMT_SMR 1  N A        FMT_MTD 1 1  Management of TSF data    FMT_MTD 1 1 1      When the  machine authentication  is selected as the User authentication method  The TSF shall  restrict the ability to  selection  change_default  query  modify  delete  clear  assignment  other  operationell the  assignment  List of TSF data  to  assignment the authorized identified roles    lassignment  list of TSF datal     User password           selection  change_default  query  modify  delete  clear   assignment other operationell    assignment  other operations    Registration   assignment  the authorized identified roles                   Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2         FMT_MTD 1 2  Management of TSF data    FMT_MTD 1 1 2    When the  machine authentication  is selected as the User authentication method  The TSF shall  restrict the ability to  selection  change_default  query  modify  delete  clear   assignment  other    operationell the  assignment  List of TSF datal to  assignment  the authorized identified roles    lassignment  Jet of TSF data       User s own user password   selection  change_default  query  modify  delete  clear   assignment other ope
32.  is the optional parts and sets to  utilize the function of the Fax unit     OE SECRET  Appropriate management of confidential information   The administrator has the user implement the following operation   e Keep the user password and secure print password confidential   e Keep the user box password and account password confidential between the users who  commonly utilize it   e Should not set the value that can be guessed for the user password  secure print password  and the user box password   e The user password and the user box password should be properly changed   e When the administrator changes the user password or the user box password  make the user  to change them promptly   The administrator executes the following operation   e Avoid setting an easy to guess value on the administrator password  account password   SNMP password  and encryption passphrase   e Keep the administrator password  account password  SNMP password  and encryption  passpharse confidential   e Change the administrator password  account password  SNMP password  and encryption  passphrase appropriately   The service engineer executes the following operation   e Should not set the value that can be guessed for the CE password   e Keep the CE password confidential   e The CE password should be properly changed   e When the service engineer changes the administrator password  make the administrator to  change it promptly   OE SETTING SECURITY  Security related Setting  Maintenance  Operation   Th
33.  lt Role and controlling function for each management gt    As the role of doing these managements  FMT_SMR 1 1  maintains a service engineer and  FMT_SMR 1 2  maintains an administrator  Moreover  FMT_SMF 1 specifies these  management functions     This security objective is satisfied by the completion of these multiple functional    requirements        O OVERWRITE  Overwrite deletion   This security objective regulates that it deletes all data areas of HDD and requires various  requirements that relate to the deletion   FAD_RIP 1 guarantees that these objective information not to be able to use the content of  any previous information by the deletion operation   Therefore  this security objective is satisfied        O CRYPTO KEY  Encryption key generation   This security objective regulates that the encryption key necessary to encrypt all the data  written in HDD by ASIC is generated  and needs various requirements that relate to the  encryption key generation   Using Konica Minolta HDD encryption key generation algorism according to the Konica  Minolta encryption specification standard  FCS_CKM 1 generates an encryption key 128 bits  long  In addition  the encryption key is generated on RAM that is a volatility memory with  the power supply ON and is disappeared with the power supply OFF   This security objective is satisfied by this functional requirement     e O TRUSTED PATH  Usage of Trusted Channel   This security objective generates the Trusted Channel in the transmis
34.  of PUBLIC   Prohibited     User Name List   Prohibited     Print without authentication   Prohibited      Simple print authentication   Prohibited      Password policy function   Valid      Setup of Authentication Operation Prohibition function      The panel and account are locked out for 5  seconds when authentication has failed  failure  frequency threshold  1 3        Secure print access method   Work with the setting of Authentication  operation prohibition function      User box management function   Prohibited     SNMP vi1 v2c Write function   Prohibited      WriteUser Authentication by SNMPv3   Valid     Setup of HDD encryption function   Valid     Print data capture function   Prohibited     Address registration user change function     Prohibited      Setup of limitation of SSL encryption severity  Valid  Only 3DES and  AES are  user selectable      SSL protocol setting   Valid      Setup of operation prohibition release time of Administrator authentication      Setup prohibited for 1 4 minutes    Setup of operation prohibition release time of CE authentication     Setup prohibited for 1 4 minutes    FTP Server function   Prohibited    Automatic registration of S MIME certificate   Prohibited       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   17 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A
35.  of TOE  This behaves according to the setup of FADMIN    As described above  FAU_GEN 1  FAU_GEN 2  FAU_SAR 1  FAU_SAR 2  FAU_STG 1  and  FAU_STG 4 are realized        End          Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   115 115    
36.  operation panel in User box mode  Send from the operation panel       and network in User box mode    gt  Secure Print file  ID  amp  Print file  Jobs related to the secure print file and ID  amp  Print file are as follows  The record of  following job is obtained     Saved job in user box via driver and network  Save in User box through the printer driver or network    Output job from User box       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   114 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       Print from the operation panel     3  Success and failure of all authentication function  Administrator   CE Identification authentication  User authentication  account track   Public user box authentication    VV WW    Secure print access authentication    Also     Date   time information       User ID       Job name  job type     and    Result    are recorded as  the log obtained item  The Date   time information that is set by the administrator by F ADMIN  is recorded  The administrator is able to export log file through the network and the log is  deleted when it   s exported  User other than administrator cannot perform the export and  deletion of log  When the audit record becomes full  it is overwritten from the oldest audit log in  order or prohibited the behavior
37.  organization security policies     Table 1 Conformity of security objectives to assumptions  threats  and organization security policies    VM    Organization security  policies   Assumptions   Threats    Wd    NINAV V   LANG  MYOMLAN V  LAYS Vv  XOd OITANd SSHDOV L  XOd dNOUD SSHOOV L  ONILLAS SSHO00V LE  AYOLSHY dNYOVa L   ANTT LOACA   ONIODOT LIGNV d    3  DO  es   sl  zZ  EN  CH       e  LO  k    S   gt   Q  Ka    XOJ ALVAINd SSH99V L  INIYd danods Ssaoov iL  VIVC NOILVOINOINWNOO d    NOISSINSNVUL da Load Xd Nn iE    Security objectives          gt  lt     tales UP Ae SST e RER    O SECURE PRINT  O CONFIG  O OVERWRITE    O CRYPTO KEY    Ge  Ge  Ge  x       O TRUSTED PATH  O CRYPTO MAIL  O FAX CONTROL              gt  lt     O AUDIT LOGGED    OE SESSION   Ok ADMIN   OE SERVICE  OE NETWORK  OE FAX UNIT  OE SECRET  OE SETTING SECURITY  OE AUDIT_STORAGE PR  OTECTED  OE AUDIT_ACCESS AUT  HORIZED  OE AUDIT REVIEWED          LE AAAAAAAAAAAANS  LE AAAAAAAAAAAAAA    St    EE ACP  are       Gell          Ge       Ge             Ge  Ge  Ge  Ge  Ge  Ge                                  o  e  Q   gt   Ee  F  ks  as   E     E   Wi  WS  m  es  e  W    Ka  fed            LI UIT TT TT WNSNNNNNNNNNNWN          Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   27 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G
38.  print internal control ID     Account name  Account ID                                        Administrator Attribute  Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 1 1  Verification of secrets  FIA_SOS 1 1 1        The TSF shall provide a mechanism to verify that secrets  User Password  Administrator Password   CE Password  secure print password  user box password  and account password  meet lassignment  a  defined quality metricl         assignment  a defined quality metric       Number of digits  8 or more and up to 64 digits    Character type  possible to choose from 94 or more characters    Rule     Do not compose by only one and the same character    2  Do not set the same password as the current setting after change   Hierarchical to   No other components             Dependencies   No dependencies    FIA_SOS 1 2  Verification of secrets             FIA_SOS 1 1 2           Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   47 115          bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          The TSF shall provide a mechanism to verify that secrets  SNMP Password  meet lassignment  a  defined quality metricl         assignment  a defined quality metric       Number of digits  8 or more and up to 32 digits    Character type  possible to ch
39.  range of acceptable values       assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 7    When the defined number of unsuccessful authentication attempts has been  selection  met    surpassed   the TSF shall  assignment  Jet of actions      selection  met  surpassed    Met   assignment  list of actions      lt Action when it is detected gt              Lock the authentication function for the concerned account  and deny the access to the TOE by the  user who permitted the use of the account      lt Operation for recovering the normal condition gt   Perform the delete function of authentication failure frequency offered within the administrator          mode   Hierarchical to   No other components  Dependencies    FIA_UAU 1  FIA_UAU 1 2               FIA_AFL 1 8  Authentication failure handling    FIA_AFL 1 1 8     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events     assignment  Let of authentication events                Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   46 115    bizhub C554   bizhub C454   bizhub C364 bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 010
40.  related with the group user box gt    FMT_MTD 1 11  and FMT_MTD 11 13  restricts the registration  pause of use and resumption  of use of the account ID and account password only to the administrator  Also  FMT_MTD 1   3  restricts the modification of the account ID and account password only to the  administrator  FMT_MTD 1  12  restricts the registration of the belonging account assigned  to the user  to the administrator and to the user who is permitted the use of the account   FIA_SOS 1  1  verifies the quality of the account password      lt Management of the account authentication method gt    FMT_MOF 1  3  restricts the behavior management of the account authentication function   for administrator  and the stop operation management only to the administrator    On FMT _MOF1I3   the administrator selects the operation method of the account  authentication function  for administrator  to    user set     and so the operation method of the  account authentication function is left to the account authentication function  for user    FMT_MOF1 5  restricts the behavior management of the account authentication function   for user  to the user self who is permitted to use that account  However  FAT_MOF 1 5  is       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   74 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Softwa
41.  to the task acting on the behalf of users when authenticated with the access to the  account     In the method synchronized with User authentication  the account ID that is set to the concerned  user associates to the task acting on the behalf of users when authenticated with the access to the  user    lt File attribute gt   The secure print internal control ID of the concerned secure print file associates to the task acting on  the behalf of users when authenticated with the access to the secure print file    lt User attribute gt   The user ID of the concerned user associates to the task acting on the behalf of users when  authenticated as the user    lt Administrator attribute gt   The Administrator   s attributes associate to the task acting on the behalf of users when authenticated  as the Administrator   FIA_USB 1 3  The TSF shall enforce the following rules governing changes to the user security attributes associated  with subjects acting on the behalf of users   assignment  rules for the changing of attributes     assignment  rules for the changing of attributes                              None  Hierarchical to   No other components  Dependencies   FIA_ATD 1  FIA_ATD 1        6 1 1 4  Security Management    FMT_MOF 1 1  Management of security functions behavior    FMT_MOF 1 1 1   The TSF shall restrict the ability to  selection  determine the behavior of disable  enable  modify the  behavior off the functions  assignment  Jet of functions  to  assignment  the authori
42.  to use the user function of the use box file in the personal user box    that this user owns     O PUBLIC BOX  Public user box access control    e TOE permits the user who succeeded in identification and authentication the reading  operation of the public user box    e TOE permits the user function of the public user box only to the user who is permitted the  use of this public user box    e TOE permits the user function of the user box file in the public user box only to the user who  is permitted the use of this public user box     O GROUP BOX  Group user box access control    e TOE permits the user function of the group user box that this account owns only to the user  who is permitted the use of this account    e TOE permits the user function of the user box file in the group user box that this account  owns only to the user who is permitted the use of this account     O SECURE  PRINT  Access control for secure print files and ID  amp  print files    e TOE permits the user function of a secure print file only to the user who was allowed to use  the file    e TOE permits the user function of an ID  amp  print file only to the user who stored that file     O CONFIG  Access limitation to management function   TOE permits only the administrator the operation of the following functions   e The setting function related to the SMTP server  e The setting function related to the DNS server  e The setting function related to the address of MFP  e Backup function    e Restoration f
43.  uses MFP will assign a person who can  faithfully execute the given role during the operation of the MFP with TOE as an    administrator     OE SERVICE  The service engineer s guarantee    e The responsible person in the organization managing the maintenance of MFP educates a  service engineer in order to faithfully carry out the given role for the installation of the TOE   the setup of TOE and the maintenance of the MFP with TOE    e The administrator observes the maintenance work of MFP with TOE by a service engineer     OE NETWORK  Network Environment in which the MFP is connected    e The responsible person in the organization who uses MFP carries out the tapping prevention  measures by setting the cipher communications equipment and the tapping detection  equipment to the LAN of the office where MFP with TOE is installed    e The responsible person in the organization who uses MFP carries out the measures for the  unauthorized access from the outside by setting up the equipment such as the firewall to  intercept the access from an external network to MFP with TOE        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   25 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       OE FAX UNIT  Utilization of Fax unit   The service engineer installs the Fax unit on MFP which
44. 0 G00 56 Security Target            Authentication when it accesses service mode from the panel    Authentication when it accesses administrator mode from the panel    User authentication when user accesses TOE from the panel    Account authentication when user accesses TOE from the panel    Authentication when it accesses secure print file from the panel    Authentication when it accesses Public user box from the panel   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values     fassignment  positive integer number   1  FIA_AFL 1 2 8   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  ist of actions     selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt   Deny all access from the panel    lt Operation for recovering the normal condition gt   Automatically release the lock after 5 seconds   Hierarchical to   No other components  Dependencies   FIA_UAU 1 FIA_UAU 2 1   FIA_UAU 2 2   FIA_UAU 1 1   FIA_UAU 2 3    FIA_UAU 2I4   FIA_UAU 11 2      FIA_ATD 1 User attribute definition    FIA_ATD 1 1  The TSF shall maintain the following list of security attributes belonging to individual users    assignment   ist of security attributes     assignment  Jet of security attributes     User attributes  User ID     User box attributes  User box ID     File attributes  Secure
45. 00 56 Security Target       4 3 2  Sufficiency of Assumptions  The security objectives for the assumptions are described as follows       A ADMIN  Personnel Conditions to be an Administrator   This condition assumes that administrators are not malicious   With Ok ADMIN  the organization that uses the MFP assigns personnel who are reliable in  the organization that uses the MFP  so the reliability of the administrator is realized     e A SERVICE  Personnel Conditions to be a Service Engineer   This condition assumes the service engineer are not malicious   With OE SERVICE  the organization that manages the maintenance of the MFP educates the  service engineer  Also the administrator needs to observe the maintenance of the MFP  so that    the reliability of service engineers is assured     e A NETWORK  Network Connection Conditions for the MFP    This condition assumes that there are no wiretapping activities and no access by an  unspecified person from an external network to the intra office LAN    OE NETWORK regulates the wiretapping prevention by the installation of devices such as a  wiretapping detection device and device to perform the encryption communication on the  intra office LAN  It also regulates the unauthorized access prevention from external by the  installation of devices such as firewall in order to block access to the MFP from the external  networks  so that this condition is realized        A SECRET  Operating condition concerning confidential information   
46. 0100 G00 56 Security Target    that is the trial frequency of the failure authentication in the administrator authentication  using the SNMP password only to the administrator   FMT_MTD 1  3  restricts the change of the SNMP password to the administrator  FIA_SOS 1   2  verifies the quality of the SNMP password    FMT_MOF 1  2  restricts the method of the SNMP password authentication function only to    the administrator      lt  Operational Limit of Trusted Channel function setting data gt   The behavior and the stop setting of Trusted Channel function are permitted only to the  administrator by FMT_MOF 1  3       lt Operational Limit for S MIME function gt    The registration of the S MIME certificate is permitted only to the administrator by  FMT_MTD 1  11   The modification of the registered S MIME certificate is permitted only to  the administrator by FMT_MTD 1  8   In addition  the setup of transmission address data is  permitted only to the administrator by FDP_ACC 1  3  and FDP_ACF 1  3   The behavior of  the S MIME function is permitted only to the administrator by the FMT_MOF 1  2       lt Operational Limit for FAX function gt    The registration of the user box to be stored in TSI reception  TSI reception setting  is  permitted only to the administrator by FMT_MTD 1  11   The modification of the registered  TSI reception setting is permitted only to the administrator by FMT_MTD 1  3   In addition   the setting of the area stored when PC FAX is received  PC FAX rece
47. 012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   13 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        gt  Setup of FAX output at PC FAX receiving  Storing in user box or common area for all users  are available      The functions below are the operation setting functions related especially to the behavior of the    security function       Method setup of a user authentication function   gt  Machine authentication  external server authentication  or user authentication stop is  selected    gt  Combination with Account Authentication is set up   Method synchronized with User  Authentication  Method not synchronized with User Authentication     Setup of access when the user attribute is public   gt  Itis selected whether to permit or prohibit MFP utilization of the user who is not identified  by user ID      Setup of a password policy function   gt  It is selected whether to enable or disable the function to check the several conditions of  the password  such as the number of valid digits of various passwords      Setup of the authentication method of Secure Print and the authentication operation  prohibition function    gt  When secure print files are authenticated  the authentication operation prohibition  function operates in a mode  and does not operate in the other mode    gt  The ope
48. 1       The TSF shall perform  assignment  ist of Cryptographic operations  in accordance with a specified  cryptographic algorithm  assignment  cryptographic algorithm  and cryptographic key sizes   assignment  cryptographic key sizes  that meet the following   assignment  Jist of standards         l assignment  Jet of standards     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation        lassignment  cryptographic algorithm     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation    assignment  cryptographic key sizes     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation         assignment  list of cryptographic operation     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation        Hierarchical to  Dependencies       No other components    FDP_ITC 1 or FDP_ITC 2 or FCS_CKM 1  FCS_CKM 1   only a part of events     FCS_CKM 4  N A           Table 3 Cryptographic Operation  Relation of Algorithm Key sizes Cryptographic Operation    List of  standards    FIPS PUB 197    Cryptographic  Algorithm    Cryptographic  key sizes    128 bits    192 bits    256 bits    Contents of Cryptographic operation    Encryption of S MIME transmission data       SP800 67    3 Key Triple DES      168 bits    Encryption of S MIME transmission data       FIPS 186 2       RSA         1024 bits    2048 bits    807
49. 2   ineo  554   ineo  454   ineo  364   ineo  284   ineo  224 control software  which is the  TOE  is an embedded software product installed in the SSD on the MFP controller to control the  operation of the whole MFP     1 3 2  Usage of TOE and Main Security Functions    bizhub C554   bizhub C454   bizhub C364   bizhub C284   bizhub C224   bizhub C7828   bizhub  C7822   ineo  554   ineo  454   ineo  364   ineo  284   ineo  224 are digital multi function  products provided by Konica Minolta Business Technologies  Inc   composed by selecting and    combining copy  print  scan and FAX functions   Hereinafter all the products are referred to as   MFP    TOE is the    control software for bizhub C554   bizhub C454   bizhub C364   bizhub C284       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     6 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo  364   ineo  284    ineo  224  that controls the entire operation of MFP  including the operation control processing  and the image data management triggered by the panel of the main body of MFP or through the  network    TOE supports the protection from exposure of the highly confidential documents stored in  MFP  Moreover  for the danger of illegally bri
50. 2 bits    4096 bits       Encryption of cryptographic key to encrypt  S MIME transmission data          Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     36 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       6 1 1 2  User Data Protection    FDP_ACC 1 1  Subset access control       FDP_ACC 1 1 1   The TSF shall enforce the  assignment access control SFP on  assignment  List of subjects  objects  and  operations among subjects and objects covered by the SFA           l assignment  list of subjects  objects  and operations among subjects and objects covered by the SFP    Listed in  Table4 User box access control operational list     assignment  access control SFP    User Box access control  Hierarchical to   No other components  Dependencies   FDP_ACF 1  FDP_ACF 1 1                  Table 4 User Box Access Control  Operational List    Operational List  A task to act for a user    User Box File   Print    Transmission  E mail transmission  FTP transmission     SMB transmission  FAX transmission and WebDAV    transmission     Download    Move to other user boxes    Copy to other user boxes    Copy to external memory    Backup       FDP_ACC 1 2  Subset access control       FDP_AGC 1 1 2   The TSF shall enforce the  assignment  access control SFP on  assignment  List of su
51. 24 Control Software A2XKOY0 0100 G00 56 Security Target    function to overwrite the image data area of HDD provided by TOE by data for deletion  so  that the possibility of the threat is reduced by operating it before MFP is collected   Accordingly  this threat is countered sufficiently     e T BRING OUT STORAGE  Unauthorized bringing out HDD   This threat assumes the possibility that the image data in HDD leaks by being stolen from  the operational environment under MFP used or by installing the unauthorized HDD and  taking away with the data accumulated in it   For the above  the possibility of the threat is reduced because O CRYPTO KEY assumes that  TOE generates an encryption key to encrypt the data written in the HDD  a mechanical  operation to use the HDD encryption function by ASIC is supported by O CRYPTO   CAPABILITY  and OE  SETTING SECURITY performs the setting along with the  description of guidance including the enhanced security function  and the operation related to  the maintenance   Accordingly  this threat is countered sufficiently        T ACCESS PRIVATE BOX  Unauthorized access to personal user box using user function   This threat assumes the possibility that an unauthorized operation is done by using the user  function for the personal user box which each user uses to store the image file   O REGISTERED USER is assumed that only the user to whom TOE succeed identification  and authentication is permitted to use MFP installed TOE  furthermore  the operat
52. 2XKOY0 0100 G00 56 Security Target          Setup of limitation of S MIME encryption severity    Valid  Only 3DES and AES are  user selectable         Image log transmission   Prohibited     Remote panel function   Prohibited    External application connection   Prohibited    2  Conformance Claims  2 1  CC Conformance Claim  This ST conforms to the following standards     Common Criteria for Information Technology Security Evaluation  Part 1  Introduction and general model Version 3 1 Revision 3  Japanese Translation v1 0   Part 2  Security functional components Version 3 1 Revision 3  Japanese Translation v1 0   Part 3  Security assurance components Version 3 1 Revision 3  Japanese Translation v1 0     e Security function requirement   Part2 Extended    e Security assurance requirement   Part3 Conformant  2 2  PP Claim   There is no PP that is referenced by this ST   2 3  Package Claim   This ST conforms to Package   EAL3  There is no additional assurance component   2 4  Reference    e Common Criteria for Information Technology Security Evaluation Part 1 Introduction and  general model Version 3 1 Revision 3 CCMB 2009 07 001   e Common Criteria for Information Technology Security Evaluation Part 2 Security functional  components Version 3 1 Revision 3 CCMB 2009 07 002   e Common Criteria for Information Technology Security Evaluation Part 3 Security assurance  components Version 3 1 Revision 3 CCMB 2009 07 003   e Common Methodology for Information Technology Security Evalu
53. 4       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   5 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    1  ST Introduction    1 1  ST Reference      ST Title      ST Version    Created on    Created by    1 2  TOE Reference      TOE Name      TOE Version    TOE Type    Created by    1 3  TOE Overview    bizhub C554   bizhub C454   bizhub C364   bizhub C284   bizhub C224    bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo  364    ineo  284   ineo  224 Control Software   A2XKOY0 0100 G00 56 Security Target   1 01   August 24  2012   KONICA MINOLTA BUSINESS TECHNOLOGIES  INC     Japanese Name    bizhub C554   bizhub C454   bizhub C364   bizhub C284   bizhub C224    bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo  364    ineo  284   ineo  224 Zentai Seigyo Software   English Name     bizhub C554   bizhub C454   bizhub C364   bizhub C284   bizhub C224    bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo  364    ineo  284   ineo  224 Control Software   A2XK0Y0 0100 G00 56   Software   KONICA MINOLTA BUSINESS TECHNOLOGIES  INC     This paragraph explains the usage  main security functions  and operational environment of    TOE     1 3 1  TOE Type    bizhub C554   bizhub C454   bizhub C364   bizhub C284   bizhub C224   bizhub C7828   bizhub  C782
54. 454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target     gt  When the group user box of the account ID exists  it is selected weather that group user  box is set to the public user box of  user attributes  public  or it is deleted       Pause resume of Account  Account ID is specified  and the use of the account is paused or the use of the account in the  pause state is resumed  The account in the pause state is not done the identification and  authentication  and becomes impossible to use the user function to need the identification    and authentication of account     As described above  FIA_SOS 1 1   FMT_MSA 1 8   FMT_MTD 1 3   FMT_MTD 1 11    FMT_MTD 1 13   FMT_SMF 1 and FMT_SMR 1 2  are realized     7 1 3 14  Setup of Trusted Channel Function    Set the setting data of Trusted Channel function by SSL TLS     Communication Encryption Strength Setting  Modification of the communication encryption  method       Operation and Stop Setting of the Trusted Channel function  As described above  FMT_MOF 1 3   FMT_SMF 1 and FMT_SMR 1 2  are realized     7 1 3 15  Setup of S MIME Transmission Function    Set the setting data which are used when the user box file is S MIME transmitted     Transmission address data  e mail address     Registration and modification of S MIME certificate     Setup of Encryption Strength for S MIME function  As described above  FDP_ACC 1 3   FDP_ACF1 3   FMT_MOF1 2   FMT_MTD 1 3    FMT_MTD 1 11   FMT_SMF 1  and F
55. 54   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target     gt  Temporary data file generated in print image file processing  3 2  Assumptions    The present section identifies and describes the assumptions for the environment for using the  TOE     A ADMIN  Personnel conditions to be an administrator   Administrators  in the role given to them  will not carry out a malicious act during the series of    permitted operations given to them     A SERVICE  Personnel conditions to be a service engineer   Service engineers  in the role given to them  will not carry out a malicious act during series of  permitted operations given to them     A NETWORK  Network connection conditions for MFP    e The intra office LAN where the MFP with the TOE will be installed is not intercepted    e When the intra office LAN where the MFP with the TOE will be installed is connected to an  external network  access from the external network to the MFP is not allowed     A SECRET  Operational condition about secret information   Each password and encryption passphrase does not leak from each user in the use of TOE     3 3  Threats    In this section  threats that are assumed during the use of the TOE and the environment for  using the TOE are identified and described     T DISCARD MFP  Lease return and discard of MFP   When leased MFPs are returned or discarded MFPs are collected  secure print files  user box  files  ID  amp  print files  stored image files  HDD rem
56. 84   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       When accessing from a network  the account is not authenticated after the user authentication  but the user and the account are processed with one sequence  When authenticating the account   the account ID is associated with the user ID  and the user ID and the account ID are measured  by the session information which is the same as user identification and authentication in the  account authentication  the synchronized method      Provides the user authentication mechanism that authenticates the user by the user  password that consists of the characters shown in Table 13    gt  After the user is authenticated to the access from the network  the user authentication  mechanism using session information besides the user password is provided    gt  According to the protocol  it uses the session information more than 10   or it generates  and uses the session information more than 10    As described above  FIA_ATD 1  FIA_SOS 1 4   FIA_SOS 2 and FIA_USB 1 are realized      lt Account authentication  User identification and authentication when it does not used gt    When the access request for the user box and the store request of the secure print file  it is  identified and authenticated to be a permitted user  The detail of the user authentication is the  same as account authentication  user identification and authentication in the synchronized  method  The use of F BOX and F PRINT is permitted to the user w
57. AU 2  3  identifies and authenticates that it is a user who is permitted the use of  the secure print file    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    FIA_AFL 1  8  refuses all input acceptances from the panel for 5 seconds in every failure   When the authentication failure reaches 1 3 times  FIA_AFL 1  5  locks the authentication  function for the concerned secure print file  This lock status is released by the administrator s  release operation    FMT_MTD 1  3  permits only to the administrator the setup of the threshold of the  authentication failure frequency that is the trial frequency of the failure authentication in  the authentication of the user who is permitted the use of the secure print file    When FIA_ATD 1 and FIA_USB 1 relate the secure print internal control ID to the task of  acting use  FDP_ACC 1  2  and FDP_ACF 1  2  permit the print operation to the secure print  file that has a corresponding object attribute to the secure print internal control ID of the  subject attribute    As for secure print internal control ID  FMT_MSA 3  2  gives the value uniquely identified    when the secure print file is stored        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   75 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Softw
58. DP_ACF 1  2       the ID  amp  print files by FDP_ACC 1  4  and FDP_ACF 1  4     In addition  the restoration operation is permitted for     SMTP server group object  DNS server group object  MFP address group object  PC FAX   operation setting object  and transmission address data object by FDP_ACC 1 3  and  FDP_ACF 1 3     Moreover  the restoration operation  modification operation  is permitted only to the  administrator for the following data      the enhanced security setting data by FMT_MOF 1  1      the operation setting data of user authentication function  encryption strength setting data  for S MIME function and the operation setting data of SNMP password authentication  function by FMT_MOF 1 2       the Trusted Channel setting data  encryption passphrase and the operation setting data of  account authentication function by FMT_MOF 1 3       the users attribute of the user box by FMT_MSA 1  1   FMT_MSA 1  2  and FMT_MSA 1  3      the user password by FMT_MTD 1  2       the user ID  the SNMP password  the system auto reset time  the authentication failure  frequency  the secure print password  the external authentication setting data  the account ID   the account password  the S MIME certificate  the belonging account of user  release time of  operation prohibition for administrator authentication  and TSI receiving setting by  FMT_MTD 1 3       the user box password by FMT_MTD 1  4      FMT_MTD 1  7  permits only to the administrator the backup operation  inquiry op
59. EF 1     This security objective is satisfied by the completion of these multiple functional requirements     e O PRIVATE BOX  personal user box access control   This security objective limits access to the personal user box and the user box file in the  personal user box to only the user who owns that user box  and needs various requirements    that relate to the access control      lt User box access control  a personal user box  gt    After the user has been identified and authenticated  the user ID is associated with the task  of acting a use by FIA_ATD 1 and FIA_USB 1  By FDP_ACC 1  1  and FDP_ACF 1  1   the  task of acting the user has a user ID  and is permitted to display the list of the user box with a  corresponding user attribute  In addition  after the user box has been selected  when the user  box ID is associated with the task of acting a use by FIA_ATD 1 and FIA_USB 1  the  operation such as a print  a download  transmissions  a movement  and a copy is permitted to  the user box file that has a corresponding object attribute to user ID and user box ID of the  subject attribute      lt Management of a personal user box gt   FMT_MSA 1  1  permits to the user and the administrator the change operation of the user  attribute of the user box where the user ID is set        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   71 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   in
60. IA_UAU 7 Protected authentication feedback  FIA_UAU 7 1  The TSF shall provide only  assignment  Jet of feedback  to the user while the authentication is in  progress         assignment  list of feedback     Display     every character data input        Hierarchical to   No other components       Dependencies   FIA_UAU 1  FIA_UAU 2 1   FIA_UAU 2 2   FIA_UAU 1 1   FIA_UAU 2 3    FIA_UAU 2 4   FIA UA    i    FIA_UID 2 1  User identification before any action    FIA_UID 2 1 1              The TSF shall require each user  Service Engineer  to be successfully identified before allowing any  other TSF mediated actions on behalf of that user  Service Engineer                     Hierarchical to   FIA_UID 1   Dependencies   No dependencies   FIA_UID 2 2  User identification before any action  FIA_UID 2 1 2     The TSF shall require each user  Administrator  to be successfully identified before allowing any other  TSF mediated actions on behalf of that user  Administrator         Hierarchical to   FIA_UID 1          Dependencies   No dependencies             Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   50 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target      aau     FIA_UID 2 3  User identification before any action      FIA_UID 2 1 3     The TSF shall require each user  User  t
61. ICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   112 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    TOE controls the function that transfer the data received from public line to internal LAN   The prohibition of access  data forwarding except image data  from public line to internal  network is realized by TOE control    As described above  FDP_IFC 1 and FDP_IFF 1 are realized     7 12  FSUPPORT AUTH  External Server Authentication Operation Support Function     F SUPPORT AUTH is the function that realizes the user authentication function in  cooperation with the user information management server of Active Directory   the function that  operates with FUSER     When the    external server authentication    is selected for user authentication method  the  inquiry for the authentication information of the user is done for the user information  management server under the user s request of the identification and authentication process   After this inquiry  the user identification and authentication process is realized by getting the  user authentication information returned back from user information management server    As described above  FCS_CAP 1  1  is realized     7 13  FSUPPORT CRYPTO  ASIC Support Function     F SUPPORT CRYPTO is the function that operates the HDD encryption function th
62. ME   FCS_COP 1 encrypts these  encryption keys by RSA of FIPS 186 2 by using a public key of S MIME certificate of each  destination  1024  2048  3072 or 4096 bits     This security objective is satisfied by the completion of these plural functional requirements     e O  FAX CONTROL  Fax unit control   This security objective regulates to prohibit an access to internal network which the MFP  concerned connects with  from public line via the Fax public line portal   This means that communication  like remote diagnostic function or illegal operation  command  except image data which is sent from public line network and forwarded to  internal network via MFP is not forwarded to internal network  and various requirements  related to the flow control of Fax unit are necessary   Applying FDP_IFC 1 and FDP_IFF 1  the flow control not to send data  except the image data  which the reception function from a public line received  to internal network is achieved     This security objective is satisfied by this functional requirement        O AUTH CAPABILITY  Support action to use user authentication function   This security objective regulates that TOE supports the user authentication function using an  user information management server that is the entity outside TOE  and needs various  requirements that regulate to support the external entity action   Applying FIT_CAP 1  1   the inquiry and the acquirement function for the identification and  authentication objective user are achieved
63. MT_SMR 1 2      FMT_MOF 1 3  Management of security functions behavior    FMT_MOF 1 1 3     The TSF shall restrict the ability to  selection  determine the behaviour of  disable  enable  modify the  behaviour off the functions  assignment  Jet of functions  to  assignment  the authorized identified  roles    lassignment  Jist of functions        Account Authentication Function  For administrator      Trusted Channel Function   selection  determine the behavior of  disable  enable  modify the behaviour oft   modify the behavior of  disable   assignment  the authorized identified roles                                            Administrator  Hierarchical to   No other components  Dependencies   FMT _SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2            FMT_MOF 1 4  Management of security functions behavior    FMT_MOF 1 1 4     The TSF shall restrict the ability to  selection  determine the behaviour of  disable  enable  modify the  behaviour off the functions  assignment  Jet of functions  to lassignment  the authorized identified  roles       assignment  Jist of functions       All area overwrite deletion function   selection  determine the behavior of  disable  enable  modify the behaviour oft                         Enable   assignment  the authorized identified roles   Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MOF 1 5  Management of security functions behavior    FMT_MOF 1 1 5     The TSF sha
64. MT_SMR 1 2    MT_SMF 1    MT_SMR 1 3    MT_SMF1   MT_SMR 1 1    MT_SMF1   MT_SMR 1 2   FMT_SMR 1 5   MT_SMF1   MT_SMR 1 2     Fi aja 8 ja aja aja aja aja aja   lt  zZ  Ka Ka         Ae ai ai    ebe  ss  e   n    T_SMF 1  MR 1    MT_SMF1  MT_SMR 1 2   MT_SMF1  MT_SMR 1 2     2    m          yy    MT_SMR 1 2    FMT_SMR 1 3     is no necessity of       N A    F   FMT_SMF   MT_SMR 1 4  FIA_UID 215    FIA_UID 216           FPT_STM 1    N A    Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   86 115       bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Functional  Requirements  Component for   this ST    Dependencies on CC Part 2 Dependencies Relation in this ST    FTA_SSL 3  FTP_ITC 1    FIT_CAP 1 1  None N A  FIT_CAP 1 2  None N A          6 2 2  Rationale for IT Security Assurance Requirements    This TOE is installed and used in an environment where adequate security is maintained in  terms of the physical  personnel  and connectivity  Nonetheless  adequate effectiveness in the  environment where the TOE is used must be assured  As a general commercial office product   the execution of tests based on function specifications and TOE design  and analysis of the  strength of function and a search for vulnerabilities are required  In addition  it is desirable that  it has a developme
65. MT_SMR 1 2  are realized     7 1 3 16  Setup of FAX    Set the setting data of FAX related settings as follows     PC FAX reception Setting   gt  Setting either of two modes at PC FAX operation which are to store in each user box and  to store in common area for all users according to the designated information at FAX  transmission     TSI reception Setting   gt  Setting the storing user box at TSI reception by relating the transmitter   s telephone  number with the user box as the identification information of transmitter   s terminal   As described above  FDP_ACC 1 3   FDP_ACP 1 3   FMT_MTD 1 3   FMT_MTD 1 11    FMT_SMF 1 and FMT_SMR 1 2  are realized     7 1 38 17  Function Related to Enhanced Security Function    The function that influences the setup of the Enhanced Security function that the  administrator operates is as follows     It has explained the influence of the backup and       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   96 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    restoration function in 7 1 8 9       Operational setup of Enhanced Security function  Function to set valid or invalid of Enhanced Security function     Other than the operational setup of Enhanced Security function  the setting could be invalid  by executing the followings  HDD logi
66. Moreover  this  assumes that confidential data such as passwords might leak or various settings are falsified   so that user box files  secure print files  or ID  amp  print files may leak   O CONFIG regulates that the use of the back up function and the restoration function is  permitted only to the administrator  so that the possibility of the threat is removed   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  OE FEED BACK uses the application regulating that the protected feedback is returned for  the entered password by the administrator authentication and OE SESSION is also  requested the log out operation after the operation ends  and so O CONFIG is sufficiently  supported   Accordingly  this threat is countered sufficiently     4 3 4  Sufficiency of Organizational Security Policies  Security objective corresponding to organizational security policies is explained as follows     e PCOMMUNICATION DATA  secure communication of image file   This organizational security policy prescribes carrying out processing via trusted path toa  correct destination or encrypting to ensure the confidentiality about the image file which  flows on a network in the case of the organization or the user expect to be protected  As this  corresponds as one s request  there is no need to provide secure communication function for  all communication  At least one secure co
67. N  Table 15   For the HDD encryption function  the encryption passphrase which was set  is disabled by turning off the operational setup  The setup of the Enhanced Security function  becomes invalid in the execution of this function   Refer to the description for the operational  setup of the Enhanced Security function in F ADMIN     As described above  FAD_RIP 1  FMT_MOF 1 4   FMT_SMF 1  and FMT_ SMR 1 2  is realized     Table 14 Types and Methods of Overwrite Deletion of Overall Area    Method Overwritten data type and their order  Mode 1 0x00    Random numbers  gt  Random numbers  gt  0x00    Mode 3 0x00  gt  OxFF  gt  Random numbers  gt  Verification  Mode 4 Random numbers  gt  0x00  gt  OxFF             Mode 6 0x00  gt  OxFF  gt  0x00  gt  OxFF  gt  0x00  gt  OxFF  gt  Random numbers          7 2  FADMIN SNMP  SNMP Administrator Function     F ADMIN SNMP is a security function  which identifies and authenticates the administrator  in the access through the network by using SNMP from client PC  and then permits the  operation of a setting function of the network only to the administrator whose identification and    authentication was succeeded   7 2 1  Identification and Authentication Function by SNMP Password    It identifies and authenticates by the SNMP password  that the user who accesses the MIB  object through the network with the use of SNMP is an administrator     Provides the SNMP authentication mechanism which authenticates by the SNMP password  that consists o
68. Setting Function of User Authentication Function by administrator     Operation Method Setting Function of Account Authentication Function by administrator     Operation Setting Function of SNMP password authentication function by administrator    operation prohibition function     Backup Function by administrator 11     Restoration Function by administrator 12     Registration function of account ID by administrator     Modification function of account ID by administrator     Registration function of account password by administrator     Modification function of account password by administrator     Panel Auto Log out Time Setting Function by administrator     Modification function of administrator password by administrator     Modification function of SNMP password by administrator     Registration function of user box password by administrator     Modification function of user box password by administrator     Registration function of user box by administrator     Modification function of user attributes of the user box by the administrator     Registration function of user ID by administrator     Stop function of user by administrator     Resume function of user by administrator     Stop function of account by administrator     Resume function of account by administrator     Registration function of user password when method of user authentication by administrator is  machine authentication     Modification function of user password when method of user authentication by a
69. USINESS TECHNOLOGIES  INC   All Rights Reserved   32 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       This organizational security policy prohibits being accessed to a stored data in a client PC  and a server existing in internal network or a general data flowing on internal network from  public line via the port of Fax public line on Fax unit installed to MFP    This means that communication  like remote diagnostic function or illegal operation  command  except image data which is sent from public line network and forwarded to  internal network via the port of Fax public line of MFP is not forwarded to internal network   even though Fax unit is installed on MFP at the request of the organization   O FAX CONTROL prohibits the access to the data existing in internal network including a  general data from public line via the Fax public line portal    Also  OE FAX UNIT is regulated to install Fax unit which is the optional part on MFP by  service engineer  so that O FAX CONTROL is supported    Accordingly  this organizational security policy is achieved     e PAUDIT LOGGING  Acquisition and management of Audit log   This organizational security policy must maintain the generation of the audit log related to  all authentication functions and jobs  necessary to be audited  Also  it regulates that it  protects 
70. _SMR 1  FMT_SMR 1 2      FMT_MTD 1 4  Management of TSF data    FMT_MTD 1 1 4   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operations   the  assignment  ist of TSF data  to  assignment  the authorized identified roles    l assignment  list of TSF datal    User box password of the relevant user box   selection  change_default  query  modify  delete  clear   assignment  other operationell   modify  l assignment  the authorized identified roles       User who is permitted to use that public user box                                                      Administrator  Hierarchical to   No other components  Dependencies   FMT _SMF 1 FMT_SMEF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 11 4    FMT_MTD 1 5  Management of TSF data  FMT_MTD 1 1 5           The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment                 Tt intends the operation of replacing a settable digital certificate for each user in stead of the modification of the  value itself        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   57 115       bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  564   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          other operationell the lassignment  list of TSF data  to  assignment  the authorized identifi
71. able 8 Auditable events list                      FAU_SAR 1 2  The TSF shall provide the audit records in a manner suitable for the user to interpret the information   Hierarchical to   No other components  Dependencies   FAU_GEN 1  FAU_SAR 2 Restricted audit review  FAU_SAR 2 1       The TSF shall prohibit all users read access to the audit records  except those users that have been  granted explicit read access                          Hierarchical to   No other components  Dependencies   FAU_SAR 1  FAU_STG 1 Protected audit trail storage  FAU_STG1 1  The TSF shall protect the stored audit records in the audit trail from unauthorised deletion   FAU_STG1 2       The TSF shall be able to  selection  choose one of  prevent  detect  unauthorised modifications to the  stored audit records in the audit trail    selection  choose one of  prevent  detect                        prevent  Hierarchical to   No other components  Dependencies   FAU_GEN 1  FAU_STG 4 1  Prevention of audit data loss    FAU_STG 4 1 1   The TSF shall  selection  choose one of     ignore audited events        prevent audited events  except those    Dm 66    taken by the authorised user with special rights        overwrite the oldest stored audit records     and   assignment  other actions to be taken in case of audit storage failure  if the audit trail is full Gf the audit  trail is full  in the state where operation when the audit trail was full was set as  overwrite prohibition       29 66     selection  ch
72. address of MFP is modified  illegally  it assumes the possibility to use the print function to the unauthorized entity from  client PC by the user who believes as TOE  Especially  it becomes a problem if a secure print  file or an ID  amp  print file which is required to be concealed from other users in the office is  transmitted to the unauthorized entity   In addition to this  the setting of PC FAX reception and the setting of TSI reception assumes  the possibility of unintended user box file storing at FAX reception   On the other hand  O CONFIG regulates that the role to operate the network setting relating  to the transmission of TOE  the setting of PC FAX reception and the setting of TSI reception  are limited to the administrator  and so the possibility of this threat is removed   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  OE FEED BACK uses the application regulating that the feedback protected is returned for  the entered password by the administrator s authentication and OE SESSION requires to  logout after the operation ends  so that O CONFIG is supported sufficiently   Accordingly  this threat is countered sufficiently        T ACCESS SETTING  Unauthorized change of function setting condition related to security   This threat assumes the possibility of developing consequentially into the leakage of the user  box files  secure print fil
73. aining image files  and image related files  can leak by the person with malicious intent when he she analyzes the HDD in the MFP     T BRING OUT STORAGE  Unauthorized bring out of HDD    e Secure print files  user box files  ID  amp  print files  stored image files  HDD remaining image  files  and image related files can leak by a malicious person or a user illegally when he she  brings out the files to analyze the HDD in a MFP    e Aperson or a user with malicious intent illegally replaces the HDD in MFP  In the replaced  HDD  newly created files such as secure print files  user box files  ID  amp  print files  stored  image files  HDD remaining image files  and image related files are accumulated  A person    or a user with malicious intent takes out to analyze the replaced HDD  so that such image  files will leak     T ACCESS PRIVATE BOX  Unauthorized access to the personal user box which used a user  function        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   20 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       Exposure of the user box file when a person or a user with malicious intent accesses the user  box where other user owns  and operates the user box file  such as copies  moves  downloads   prints  transmits  and so on     T ACCESS PUBLIC BOX  Unauthori
74. all explicitly deny access of subjects to objects based on the following additional rules        assignment  rules  based on security attributes  that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                 None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 3     FMT_MSA 3  N A        FDP_ACF 1 4  Security attribute based access control    FDP_ACF 1 1 4     The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment  list of the subjects and objects controlled under the indicated SFP  and for each  SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  Jet of the subjects and objects controlled under the indicated SFP  and for each   SFP relevant security attributes  or named groups of SFP relevant security attributes    lt Subject gt   lt Subject attributes gt    A task to act for a user  gt   User attributes  user ID      Administrator attributes   lt Object gt   lt Object attributes gt     ID  amp  print file  gt    User attributes  user ID               assignment  access control SFP    ID  amp  print file access control    FDP_ACF 1 2 4   The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment  rules governing access among controlled subjects and    _ con
75. are A2XKOY0 0100 G00 56 Security Target        lt Secure print password gt   FMT_MTD 1  8  permits only to the user the registration of the secure print password used  for the authentication  FIA_SOS 1  1  verifies the quality of the secure print password     Next  for ID  amp  print file  this security objective limits the print of the ID  amp  print file only for  the user who stored that file  so that various requirements regarding access control are    necessary      lt ID  amp  print file access control gt    FDP_ACC 1 4  and FDP_ACF 1 4  permit the task substituting for a user with a user ID to  list and print the ID  amp  print file with the user attribute consistent with the user ID    For the user attribute set in the ID  amp  print file  the user ID of the user who stores the file  when the file is stored is set by FMT_MSA 3  4       lt Operation management of the ID  amp  print function gt   Management of this operation mode is limited only to the administrator by FAT_MOF 1  2       lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing these managements  FMT_SMR 1  2  maintains an administrator and  FMT_SMR 1  3  maintains a user  Moreover  FMT_SMF1 specifies these management    functions     This security objective is satisfied by the completion of the
76. at utilizes  ASIC from TOE    For all data written in HDD  an encryption key generated by F  CRYPTO is set in ASIC  and  encryption is performed by the ASIC  On the other hand  for the encrypted data read out of the  HDD  the encryption key generated by F CRYPTO is set in ASIC in the same manner as above   and decryption is performed by the ASIC    As described above  FCS_CAP 1  2  is realized     7 14  RFOVERWRITE  HDD Data Overwrite Deletion Function     FOVERWRITE executes the overwrite deletion in the data area in order not to be able to use  the image data unnecessary in HDD again       The image data that is the object for the overwrite deletion is as follows    gt  User box file   Secure print file   ID  amp  print file   Stored image file   HDD remaining image file   Image related file    e  VV WM WV WW WW    he operating timing of the overwrite deletion is as follows   When job such as print or scan is completed or stopped  When the data becomes unnecessary to be kept by the deletion operation  When the remaining information exists when the power is on at the time of the  unexpected power off        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   113 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target      The deletion methods such as the data overwritten in HDD and t
77. ation  Evaluation methodology Version 3 1 Revision 3 CCMB 2009 07 004       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   18 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       3  Security Problem Definition    This chapter will describe the concept of protected assets  assumptions  threats  and    organizational security policies   3 1  Protected Assets    Security concept of TOE is  the protection of data that can be disclosed against the intention of       the user    As MFP is generally used  the following image file in available situation becomes the protected  assets   e Secure Print file  An image file registered by Secure Print   e ID  amp  print file  An image file saved as an ID  amp  print file when print data are registered by the ID  amp  print  function   e User Box file  An image file stored in the personal user box  public user box and group user box     As for a image file of a job kept as a wait state by activities of plural jobs  and a image file of a  job kept that prints the remainder of copies becoming as a wait state for confirmation of the  finish  and other than the image file dealt with the above mentioned is not intended to be  protected in the general use of MFP  so that it is not treated as the protected assets    In the store of a secure p
78. ation is limited only for the user who owns it  the public user box  performs access control by sharing a password set to the user box among users  And the group  box limits operations only for the users of the account that are permitted to use it    TOE processes the following operation requests to a user box or image files in the user box that  is transmitted from the panel or the network unit through a network from a client PC     e Print  transmit  and download from a client PC  of image files in a user box   gt  The encryption of user box file is possible in the E mail that is one of the transmission  methods     Delete an image file in a user box  move copy it to other user boxes and copy it to external  memory       Set a storing period of image files in a user box  delete automatically after the period passes      Change the name and password of a user box  or delete a user box    Set attributes of a user box  change the type of a personal user box  public user box  or group  user box     1 4 3 3  User Authentication Function    TOE can limit the user who uses MFP  For access through the panel or the network  TOE  identifies and authenticates that the user is permitted to use the MFP by applying the user  password and user ID  When the identification and authentication succeeds  TOE permits the  user the use of the basic function and the user box function  etc     Several types of user authentication like below are supported      1  Machine authentication   A method t
79. ation of the user who is permitted the use of the user box    When FIA_ATD 1 and FIA_USB 1 relates a user box ID to the task of acting use  FDP_ACC 1       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   72 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        1  and FDP_ACF 1  1  permit the user box file that has a corresponding object attribute to  the user box ID of the subject attribute and is set public to the user attribute of user box  the  operation such as a print  a download  transmissions  a movement  and a copy    FIA_SOS 1  4  secures the quality verification of the session information used in the user box  authentication via the network  and FIA_SOS 2 secures the quality of the session information  which is generated and used      lt Management of a public user box gt    FMT_MSA 1 2  permits the user who is permitted the use of the user box and the  administrator to operate the change of the user attribute of use box which  Public  is set   FMT_MTD 1  4  permits the change in the user box password only to the administrator and  the user who is permitted to the use of the user box  FIA_SOS 1  1  verifies the quality of the  user box password  If a user permitted to use a public user box changes the user box password  of the public user box  FIA_UAU 6 re auth
80. ation of user box by user operation gt   To register a personal user box  a group user box or public user box by selecting the user  attribute to the non registration user box ID selected  When it s registered  it is possible to select     User ID  or  Account ID  in the user attribute of the user box which have been specified  Public   as a default value        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   105 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         In the case of the personal user box  the arbitrary user ID registered is specified     In the case of the public user box  verify that a user box password registered satisfies the   following conditions     gt  It is composed of the characters and by the number of digits  shown in the user box   password of the Table 13     gt  It shall not be composed of one kind of character     In the case of group user box  the arbitrary account ID registered is specified    As described above  FIA_SOS 1 1   FMT_MSA 3 1   FMT_MTD 1 5   FMT_SMF1 and  FMT_SMR 1 3  are realized      lt Automatic registration of user box gt     In the user box operation to store of the print job  when the specified user box is unregistered   the personal user box which is set the user ID of the user who operates the job concerned is  automat
81. before allowing any  other TSF mediated actions on behalf of that user  External Server    Hierarchical to   FIA_UID 1    Dependencies   No dependencies                      FIA_USB 1 1  The TSF shall associate the following user security attributes with subjects acting on the behalf of that  user   assignment  Jet of user security attributes    assignment  Jet of user security attributes      User attributes  User ID     User box attributes  User box ID     File attributes  Secure print internal control ID     Account name  Account ID     Administrator Attribute                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   51 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          FIA_USB 1 2  The TSF shall enforce the following rules on the initial association of user security attributes with  subjects acting on the behalf of users   assignment  rules for the initial association of attributes     assignment  rules for the initial association of attributes     lt User box attribute gt   The user box ID of the concerned user box associates to the task acting on the behalf of users when  authenticated with the access to the user box    lt Account Name gt     In the method not synchronized with User authentication  the account ID of the concerned account  associates
82. bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554  ineot 454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       KONICA MINOLTA    bizhub C554   bizhub C454   bizhub C364   bizhub C284      bizhub C224   bizhub C7828   bizhub C7822  ineot 554  ineot 454  ineot 364  ineot 284  ineot 224    Control Software  A2XKOY0 0100 G00 56    Security Target    This document is a translation of the evaluated and certified security target  written in Japanese    Version  1 01  Issued on  August 24  2012    Created by  KONICA MINOLTA BUSINESS TECHNOLOGIES  INC     Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   1 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo     364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        lt Revision History gt        Date   Division Approved   Checked Created Revision  2011 10 27 Office Software Hirota Tada Chiba Initial Version   Development Div  1  2012 8 24 Sg Office Products Suzuki Nagata Chiba Deal with typos   System Control  Development Div  1                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   2 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo     364   
83. bjects  objects  and  operations among subjects and objects covered by the SEH            assignment  Jet of subjects  objects  and operations among subjects and objects covered by the SFP    Listed in  Table 5 Secure print file access control operational list    assignment  access control SFP    Secure print file access control  Hierarchical to   No other components  Dependencies   FDP_ACF 1  FDP_ACF 1 2                     Table 5 Secure Print File Access Control  Operational List    Operational list    A task to act for a user Secure Print File       FDP_ACC 1 3  Subset access control    FDP_ACC 1 1 3        The TSF shall enforce the  assignment access control SFP on  assignment  List of subjects  objects  and  operations among subjects and objects covered by the SEH              lassignment  Jet of subjects  objects  and operations among subjects and objects covered by the SFP               Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   37 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          Listed in  Table6 Setting management access control operational list    assignment  access control SFP    Setting management access control  Hierarchical to   No other components  Dependencies   PDP ACEL  FDP_ACF 1 3                  Table 6 Setting Management Access Contro
84. butes  that explicitly authorise access of subjects to objects   A task to act for a user who has an administrator attribute is permitted to back up secure print file   FDP_ACF 1 4 2   The TSF shall explicitly deny access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                                None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 2     FMT_MSA 3  FMT_MSA 3 2         FDP_ACF 1 3  Security attribute based access control      FDP_ACF 1 1 3     The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP  and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  list of subjects and objects controlled under the indicated SFP  and for each  the  SFP relevant security attributes  or named groups of SFP relevant security attributes     lt Subject gt   lt Subject attributes gt     A task to act for a user  gt   Administrator attributes     lt Object gt      SMTP server group object     DNS server group object     MFP address group object     PC FAX reception setting object     Transmission Address data object         No Object Attribute   assignme
85. c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   88 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         In the case of access from a panel  it doesn t accept the input from a panel for five seconds  when failing in the authentication      Locks all the authentication functions to use the administrator password when detecting the  authentication failure that becomes 1 3 times at total in each authentication function by  using the administrator password   Refuse the access to the administrator mode    gt  The administrator specifies the failure frequency threshold by the unauthorized access  detected threshold setting function      FRESET works and the lock of authentication function is released   As described above  FIA_AFL 1 2   FIA_AFL 1 8   FIA_SOS 1 4   FIA_SOS 2  FIA_UAU 2 2    FIA_UAU 7 and FIA_UID 2I 2  are realized     Table 13 Characters and Number of Digits for Password      Objectives Number Characters  of      User Password Selectable from 161 or more characters in total    CE Password  Alphabet  numeric  and symbols  Some are not included     Administrator Password Special characters  Some are not included     Account Password    User Box Password    Secure Print Password Selectable from 94 or more characters in total     Alphabet  numeric  symbols  Some are not incl
86. cal format function  all area overwrite deletion function   etc  These operations are limited to all administrators     As described above  FMT MOF  1 1   FMT _SMF 1 and FMT_SMR 1 2  are realized   7 1 3 18  Function Related to Password Initialization Function    The function that relates to the initialization of the password that the administrator operates  is as follows      All area overwrite deletion function  The settings of the administrator password and the SNMP password are initialized to the  values at factory shipment by executing the overwrite deletion of all area   As described above  FMT_MTD 1 3    FMT_MTD 1 6   FMT SMF1 and FMT _SMR 1 2  are  realized     7 1 3 19  Operational Setup of the ID  amp  Print Function    The operation modes of the ID  amp  print function are set up as follows      ID  amp  print automatic operation mode  An operation mode that stores a print file sent from a client PC as an ID  amp  print file even if  printing is requested by the normal print setup      ID  amp print specified operation mode  An operation mode that stores a print file sent from a client PC as an ID  amp  print file only  when it is requested to store that file as an ID  amp  print file   As described above  FMT_MOF 1 2   FMT SMF 1  and FMT_SMR 1 2  are realized     7 1 3 20  Operational Setup of the HDD data overwrite deletion Function    This sets the deletion methods of the HDD data overwrite deletion function to    Model    or   Mode    Refer to table 15 for deta
87. canner Unit p  er ain Sut Printer   FAX unit Geo gi Panel  Automatic U  aia Document Feeder nit    Public line Operator Operator Paper Paper       Figure 2 Hardware composition relevant to TOE    Figure 2 shows the structure of the hardware environment in MFP that TOE needs for the  operation  The MFP controller is installed in the main body of MFP  and TOE exists in SSD on  the MFP controller  loaded into the main memory    The following explains about the unique hardware on the MFP controller  the hardware having  interfaces to the MFP controller  and the connection using interfaces  shown in Figure 2     e SSD  A storage medium that stores the object code of the  MFP Control Software   which is the  TOE  Additionally  stores the message data expressed in each country s language to display  the response to access through the panel and network  and various settings that MFP needs  for processing TOE       NVRAM  A nonvolatile memory  This memory medium stores various settings that MFP needs for  processing of TOE        ASIC  An integrated circuit for specific applications which implements an HDD encryption functions  for enciphering the data written in HDD     e HDD  A hard disk drive of 250GB in capacity  This is used not only for storing image data as files  but also as an area to save image data and destination data temporarily during extension    conversion and so on       Main sub power supply       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All
88. components  Dependencies   FDP_IFC 1 FDP_IFC 1    FMT_MSA 3  N A        FDP_RIP 1 Subset residual information protection    Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   42 115          bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       FDP_RIP 1 1       The TSF shall ensure that any previous information content of a resource is made unavailable upon the   selection  allocation of the resource to  deallocation of the resource from  the following objects    assignment  Jet of objects          assignment  ist of objects       User box files    Secure print files    ID  amp  print files    Stored image files    HDD remaining image files    Image related files        selection  allocation of the resource to  deallocation of the resource from     Deallocation of the resource from       Hierarchical to   No other components  Dependencies   No dependencies             6 1 1 8  Identification and Authentication    FIA_AFL 1 1  Authentication failure handling    FIA_AFL 1 1 1        The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events          assignment  Let of authent
89. cted in the user authentication method  the user who is  authenticated the identification is permitted from an external server and registered  automatically by this requirement   This corresponds to the user ID registration of the   external server    At this registration  the external server accessing TOE is identified the  external server registered by FIA_UID 2  7   This management behavior is maintained as the  role of the external server by FMT_SMR 1  5   In addition  the registration function of user ID  is specified for the administration function by FMT_SMF 1    The registration and change operation of an external server setting is limited to only the  administrator by FMT_MTD 1  3  and FMT_MTD 1  11      The quality of the user password is verified by FIA_SOS 1  1   When  machine authentication   is selected in the method of the user authentication  a change of the user password is limited to  the user itself and the administrator by FMT_MTD 1  2   In addition  when a user changes  his her own user password  the user is re authenticated by FIA_UAU 6      lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and management function for each management gt   The role to do these managements is maintained as a administrator by FMT_SMR 1  2  anda  user by FMT_SMR 1  3   Moreover  these management functions are specified by FMT_SM
90. d   FMT_MTD 1  3  permits only to the administrator the setting of the threshold of the  authentication failure frequency which is the trial frequency of the failure authentication in  the administrator authentication and change of the release time of operation prohibition for    administrator authentication      lt Management of session of identified and authenticated administrator gt    The duration of session of the administrator who is identified and authenticated contributes  to reduce the chance of attacking associated with unnecessary session connection by ending  the session after the system auto reset time elapses by FTA_SSL 8  if it logs in from the panel   The change in the system auto reset time is limited to the administrator by FMT_MTD 1  3       lt Management of administrator s authentication information gt    FIA_SOS 1  1  verifies the quality of the administrator password  Moreover  FIA_SOS 1 4   verifies the quality of session information used to authenticate the administrator via the  network  and FIA_SOS 2 secures the quality of session information that is generated and  used  FMT_MTD 1  6  restricts the change in the administrator password to the  administrator and the service engineer  When the administrator changes the administrator  password  FIA_UAU 6 re authenticates it  In this re authentication  when the failure  authentication reaches 1 3 times  FIA_AFL 1  2  logouts it if it s under authentication  and  releases the authentication status of the a
91. d  In  the case of the access from the panel  the account authentication is required  Account Name is  associated with the user ID if succeeding the account authentication  and the use of F BOX and  F PRINT is permitted to the user who is identified and authenticated     Provides account authentication mechanism that is authenticated the account by the   account password that consists of the characters shown in Table 13     Return        for each character as feedback for the entered account password   Resets the number of authentication failure when succeeding in the authentication     Not accept the access from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total for the concerned account is  detected  it locks all the authentication functions to the account    gt  The administrator specifies the failure frequency threshold by the operation setting of  the authentication operation prohibition function         The lock of the authentication function is released by performing the lock release function to  the concerned account of FADMIN   As described above  FIA_AFL 1 7   FIA_AFL 1 8   FIA_ATD 1  FIA_UAU 1 2   FIA_UAU 7  FIA_UID 2I 6  and FIA_USB 1 are realized        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   103 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  2
92. d above  FIA_SOS 1 2   FMT_MTD 1 3   FMT_SMF 1  and FMT_SMR 1 2  are  realized     7 1 3 12  Setup of SNMP Password Authentication Function    The authentication method in the SNMP password authentication function is set to  Only  Authentication password  or the  Authentication password and Privacy password    As described above  FMT _MOF 1 2   FMT SMF1 and FMT_SMR 1 2  are realized     7 1 3 13  Account Setup      Account registration  Account is registered by setting the account ID and registering the account password  It  verifies whether the account password newly set have been satisfied the following qualities    gt  It is composed of the characters and by the number of digits  shown in the account  password of the Table 13    gt  It shall not be composed of one kind of character     e Change of account ID and account password  Account ID and account password is changed  It verifies whether the account password  newly set have been satisfied the following qualities    gt  It is composed of the characters and by the number of digits  shown in the account  password of the Table 13    gt  It shall not be composed of one kind of character    gt  It shall not be matched to the current setting        Account deletion  Account ID and account password are deleted        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   95 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  
93. d change to a personal user box for the registered user   As described above  FIA_SOS 1  1   FMT_MSA 1 3   FMT_SMF 1 and FMT_SMR 1I 6  are  realized     7 6  FPRINT  Secure Print Function  ID  amp  Print Function     F PRINT is a security function related to the secure print function and ID  amp  print function    It provides the access control function that allows the printing and displaying the list of the  secure print file after authenticating if a user is the authorized person to use the secure print file  for the access to the secure print file from the panel to the identified and authenticated user    Moreover  for the user who was identified and authenticated as a permitted user  when ID  amp   print files are accessed from the panel  F  PRINT provides the access control function that allows       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   109 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       the printing and displaying the list of only the ones stored by the user     7 6 1  Secure Print Function    7 6 1 1  Authentication Function by Secure Print Password    When the user is identified and authenticated as the permitted user  it authenticates that the  accessing user is a user to whom the use of the secure print file is permitted  in response to the  acce
94. d to use MFP installing TOE  furthermore  the operation of the  public user box and the user box file in the public user box is restricted only to the user who is  permitted by O PUBLIC BOX  so that the possibility of the threat is reduced  When the  external user information management server is used  the possibility of the threat is reduced  because the user identification and authentication is operated through  O AUTH CAPABILITY supporting the operation for the user authentication function by the       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   29 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       user information management server of Active Directory and through OE SERVER setting to  use the user management by Active Directory by the administrator    OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and user box s authentication  and  OE SESSION requires the log off operation after the operation ends  so that  O REGISTERED USER and O PUBLIC BOX are supported sufficiently    Accordingly  this threat is counte
95. described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized   7 5 1 8  User Attribute Change of Personal User Box    The user attributes can be changed      If another registered user is specified  it becomes a personal user box that another user       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   106 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       manages      If public is specified  it becomes a public user box  It is necessary to register the user box  password  In this case  it is verified that the user box password satisfies the following  requirements    gt  It is composed of the characters and by the number of digits shown in the user box  password of the Table 13    gt  It shall not be composed of one kind of character     If account ID is specified  it becomes a group user box that can be accessed by a user who is  permitted the use of the concerned account   As described above  FIA_SOS 1 1   FMT_MSA1  1   FMT_SMF1 and FMT_SMR 1 3  are  realized     7 5 2  Public User Box Function    When the user is identified and authenticated as a permitted user  the task to act for the user  who is identified and authenticated has  User ID  of the identified and authenticated user as the  user attribute  This task is permitted the display of the 
96. displaying of user  box list    A task to act for the user that has an administrator attribute is permitted to operate the back up the  user box file   FDP_ACF 1 4 1   The TSF shall explicitly deny access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                                None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 1     FMT_MSA 3  FMT_MSA 3 1   FMT_MSA 3 3    FDP_ACF 1 2  Security attribute based access control    FDP_ACF 1 1 2     The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  list of subjects and objects controlled under the indicated SFP  and for each  the SFP relevant  security attributes  or named groups of SFP relevant security attributes    lt Subject gt   lt Subject attributes gt    A task to act for a user  gt   File attributes  Secure print internal control ID     User attributes  User ID     Administrator attributes   lt Object gt   lt Object attributes gt     Secure print file  gt   File attributes  Secure print internal control ID                 Copyright c
97. dministrator from then on  And it locks all the  authentication functions to use the administrator password  The release function is executed  by starting TOE with turning OFF and ON the power supply  so that the lock is released after  the release time of operation prohibition for administrator authentication passed      lt Role and management function for each management gt   FMT_SMR 1  1  have service engineer maintain the role to do these management  and  FMT_SMR 1 2  have the administrator do the same  Additionally  FMT_SMF 1 specifies these    management functions      gt  set service  Set of necessary requirement to keep service engineer secure    lt Identification and Authentication of a service engineer gt   FIA_UID 2  1  and FIA_UAU 2I 1  identifies and authenticates that the accessing user is a       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   81 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       service engineer    FIA_UAU 7 returns     every one character entered as the feedback protected in the panel   and supports the authentication    FIA_AFL 1 8  refuses all the input receipts from the panel for five seconds at each failure   and when the failure authentication reaches 1 3 times  FIA_AFL 1 1  logouts it if it s under  authentication  and locks all t
98. dministrator is  machine authentication     Registration function of S MIME certificate by administrator     Registration modification function of S MIME certificate by administrator     Operation setting function of S MIME function by administrator     Operation setting function of Trusted Channel function by administrator     Registration function of Belonging Account of user by administrator     Modification function of Belonging Account of user by administrator     Modification function of Release time of operation prohibition for Administrator authentication by  administrator     Modification function of Encryption passphrase by administrator     Modification function of TST receiving setting data by administrator     Operation setting function of HDD data overwrite deletion function by administrator     All area overwrite deletion function by administrator     Operation function of audit log by administrator     Operation setting function when audit log is full by administrator     Modification function of date and time information by administrator     Modification function of CE password by service engineer     Modification function of administrator password by service engineer     Stop function of Enhanced Security function by service engineer     Modification function of Release time of operation prohibition for CE authentication by service  engineer          1A part of the backup function corresponds to the inquiry function of TSF data   ae part of the restoration f
99. e  Security D P wg  Functional D    Requirements S  KH          fT f i    x    a ae Ae a  x     X feet ees e e  FIA_UID 2 4  X  Ee ER a SS  EE GE  FIA_UID 2 7  X  XIX XXX F      Ge EE e KR  XJ S ETS A ES RE EE Ss  EIS WEE ERT DEE KE  ES WS 2 ERT RER        XIII      a EC DE SE  KS a ES     x   x    a We  TETEE al      ee Ea ee ee ee es  SESE a ee EE ES  ere ie  ae a EES ee an ee  FMT_MTD 1 1  X  oe GE  X xixi x x       x    txt           a WE EE DEE      an ee  ee ee ee  x     ae A ee ess  FMT_MTD 1 8  X  Ee et mea  pee ag GE  FMT_MTD 1 11  X X     x  III  i  xe S x  E RE f            Txt D      GE  ee ee DEE a  ae EA ES ee  SS ee  LEE EECH EA ER x     SEJME CETE  EH ep SET DE SE  Leg P e ES e Feet Se    XIII      El SES a ae x  T  X eee a DS Ean  FT GaP EEE Ge el EEE GE  FIT_CAP 1 1  X  E es H SSES       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     69 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       Note  set admin and set service indicates the set of the requirements  And the security  objectives assumed to have the correspondence and presented by  X  also correspond to a    series of requirement set associated by   set admin and   set service shown in column     6 2 1 2  Sufficiency  The IT security functional requirements for the security objectives are descr
100. e  is no necessity of the distribution and cryptographic  operation      lt The reason not to apply FCS_CKM 4 gt   The encryption key temporarily exists in the volatile  memory area  but there is no necessity of the  encryption key cancellation since it is automatically  destroyed without the necessity of access from the  outside    FCS_CKM 1 or FDP_ITC 1   FCS_CKM 1  only partial event     or FDP_ITC 2  FCS_CKM 4   The satisfied events  The encryption key for  enciphering the attached file by the S MIME  communication is generated      lt The reason not to satisfy a part of the FCS_CKM 1 or   FDP_ITC 1 or FDP_ITC 2 gt      It seems proper to use FDP_ITC 1 because the  public key to encrypt the encryption key for the  data encryption of S MIME is imported outside of  TSF control area  but S MIME certificate is  registered by the administrator s operation  In that  case  it is unnecessary to consider whether it  passes thorough the untrusted channel or not   There is not inevitability to apply the security    requirement  The use under the condition that  A NETWORK is realized      Also  the attribute information of imported  encryption key doesn t apply to the security  attribute used for the access control  etc   is not    FCS_COP 1    related to the initialization  etc   so there is no  necessity to apply      In FMT_MTD 1I 11   it is expressed as registration  of TSF data  and the object of import operation is  assigned to an appropriate role      As a result  the event co
101. e administrator performs the setting along with the guidance including the enhanced  security function to TOE before user uses  and the settings are kept while TOE is used  Also   when leased MFPs are returned or discarded  the administrator operates along with the  guidance for TOE     OE AUDIT STORAGE PROTECTED  Audit log protection   The administrator protects the audit log from deletion and change by a person who does not  have the operation authority of the exporting log to reliable IT products     OE AUDIT ACCESS AUTHORIZED  Access authority to audit log   The administrator manages that only a person who has the operation authority of the  exporting log to reliable IT products can access     OE AUDIT REVIEWED  Examination of audit log   The administrator carries out the examination of the audit log at appropriate intervals to  detect the compromise and abnormal condition        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   26 115    bizhub C554  bizhub C454  bizhub C864  bizhub C284  bizhub C224   bizhub C7828  bhtzboub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       4 3  Security Objectives Rationale  4 3 1  Necessity  The correspondence between the assumptions  threats and organization security policies and  security objectives are shown in the following table  It shows that the security objectives    correspond to at least one assumption  threat or
102. e secure print file    lt Operation for recovering the normal condition gt      Perform the delete function of authentication failure frequency offered within the administrator                            mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2I 3            FIA_AFL 1 6  Authentication failure handling  FIA_AFL 1 1 6     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events     assignment  list of authentication events         Authentication for accessing a public user box      Re authentication when a user authorized to access a public user box changes the user box                Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   45 115       bizhub COS    brtzbub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          password of the public user box   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 6   When the defined number of unsucc
103. ecessity for applying this requirement  because the security attribute is initialized on the   outside   FDP_RIP 1 N A  FIA_AFL 111  FIA_AFL  112  FIA_AFL 113  FIA_AFL 114  FIA_AFL 115    zZ      D  bd    Faltz  j   4    TA_UAU 1  FIA_UAU 1    FIA_UAU 1 FLA UA 219          FIA_UAU 1 1                 Faltz  Gast    FIA_UAU 1   FIA_UAU 1 FIA_UAU 2I3  FIA_AFL 116 FIA_UAU 1  FIA_AFL 117 FIA_UAU 1  FIA_UAU 2I3   FIA _UAU 2 4   FIA_UAU 1 2    FIA_ATD 1  FIA_SOS 1 1  FIA_SOS 1 2 one  FA GO UA None N A  FIA_SOS 2 None  FIA_UAU 2 1 FIA_UID 1 FIA_UID 2 1   FIA_UAU 212 FIA_UID 1  FIA_UAU 1 1 FIA_UID 1  FIA_UAU 213 FIA_UID 1   FIA_UID 1 FIA_UID 2 5     FIA_UAU 2I4   FIA_UAU I2    FIAUID 1   FIA_UAU 6 one  TA_UAU 1 FIA_UAU 2 1   FIA_UAU 2 2   FIA_UAU 1I1     FIA_UAU 2 3   FIA_UAU 2 4   FIA_UAU 1I 2    N A       eo       n    Z      D  bd          m   m  m  pam Pari Faaa  Vd td   s   Gani          m  m  faery i    Z    FIA_UAU 7       FIA_UID 2  FIA_UID 2  FIA_UID 2  FIA_UID 2  FTA_UID 215  FTA_UID 216    2  3    pa a  RAR Bia  BSS  BA Ra  Z Z Z 2Z 2                   eo       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   84 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Functional  Requirements  Component for    FIA_UID 2 7 N A    Dependencies on CC Part 2 Dependencies Relation
104. ecurity functional requirements components are shown in the  following table  When a dependency regulated in CC Part 2 is not satisfied  the reason is    provided in the section for the  Dependencies Relation in this ST      Table 11 Dependencies of IT Security Functional Requirements Components  N A   Not Applicable    Functional  Requirements  Component for   this ST    FAU_GEN 1 FPT_STM 1 FPT_STM 1    FAU_GEN 2 FAU_GEN 1 FAU_GEN 1  FIA_UID 1 FIA_UID 2 1   FIA_UID 2 2   FLA_UID 2 3   FIA_UID 2 4   FIA_UID 2 5   FLA_UID 2I 6     Dependencies on CC Part 2 Dependencies Relation in this ST          FAU_SAR 1 FAU_GEN 1 FAU_GEN 1  FAU_SAR 2 FAU_SAR 1 FAU_SAR 1  FAU_STG 1 FAU_GEN 1 FAU_GEN 1    FAU_STG 4 FAU_STG 1 FAU_STG 1  FCS_CKM 1 FCS_CKM 2 or FCS_COP 1    FCS_COP 1  only partial event        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   82 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Functional  Requirements  Component for   this ST    Dependencies on CC Part 2 Dependencies Relation in this ST     lt The reason not to fulfill partially FCS_CKM 2 or  FCS_COP 1 gt    The cryptographic operation is performed using key  generated by Konica Minolta HDD cryptographic key  generation algorithm in the IT environment by  FIT_CAP 1 1   TSF only uses this capability  and ther
105. ed      Management of network settings   gt  Connection setting of the intra office LAN  setting of DNS server    gt  SMTP setting  setting of the SMTP server utilized by E mail transmission    gt  IP addresses  NetBIOS names  and AppleTalk printer names etc   e Backup or restore function of NVRAM  SSD and HDD   gt  This is performed through the network by using a backup restore application for the  management installed in the client PC      All area overwrite deletion function of HDD   gt  There are data deletion methods conformed to various military standards  ex  Military  Standard of United States Department of Defense    gt  When this function is started up  in conformity with a set method  the overwrite deletion is  executed for the overall area of HDD   e Format function of HDD   gt  A logical format is executable     Access and deletion function of Audit Log   gt  Export the audit log  and the access and the deletion of log are executable      Management of date time information settings   gt  Setting of the date and time information held by TOE  When the event for audit occurred   this date time information is recorded as the audit log   e Management of FAX setup    Fax unit is installed     gt  Setup of TSI   receiving          An abbreviation of Transmitting Subscriber Identification  The same meaning of Identification of Subscriber s  Terminal  TSI receiving is the function that can designate the user box to be stored for each subscriber        Copyright c  2011 2
106. ed     gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function      The lock of the authentication function is released by the lock release function to the public  user box of FADMIN executed    As described above  FIA_AFL 1 6   FIA_AFL 1 8   FIA_SOS 1 4   FIA_SOS 2  FIA_UAU 2 4     FDP_UAU 7 and FIA_UID 2 5  are realized     The following is a function that the user who is permitted the use of the user box is provided in       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   107 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       the user box identification and authentication domain of the user box   7 5 2 2  Access Control to User Box File in Public User Box    The task to act for the user is related the  User Box ID  of the user box as a user box attribute  in addition to the user attribute  This task is permitted the user box file  which have a  corresponding user box attribute to the user box attribute of the subject attribute  to do the  printing  the E mail transmission  include the S MIME transmission   the FTP transmission  the  FAX transmission  the SMB transmission  the WebDAV transmission  download  the movement  to other user boxes  the copy operations to other user boxes  and the copy o
107. ed identified roles    lassignment  list of TSF datal       CE password     Release time of operation prohibition for CE authentication           selection  change default  query  modify  delete  clear   assignment  other operationell                    modify   assignment  the authorized identified roles     Service Engineer  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 1         FMT_MTD 1 10  Management of TSF data    FMT_MTD 1 1 10   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment the authorized identified roles    lassignment  list of TSF datal    User ID   selection  change default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration   assignment  the authorized identified roles     Administrator  External server  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 5      FMT_MTD 1 11  Management of TSF data    FMT_MTD 1 1 11   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment the authorized identified roles    assignment  list of TSF datal      Account ID    Account password    S MIME certificate    Data of TSI reception setting    Data of externa
108. ed roles     assignment  list of TSF datal    User box password   selection  change_default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration   assignment  the authorized identified roles                        User    Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 83    FMT_MTD 1 6  Management of TSF data  FMT_MTD 1 1 6        The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment   ist of TSF data  to  assignment the authorized identified roles     assignment  list of TSF data      Administrator password   selection  change default  query  modify  delete  clear   assignment  other operationell                    modify   assignment  the authorized identified roles       Administrator    Service Engineer  Hierarchical to   No other components  Dependencies   FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 1   FMT_SMR 1 2         FMT_MTD 1 7  Management of TSF data    FMT_MTD 1 1 7   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  Jet of TSF data  to  assignment  the authorized identified roles    lassignment  list of TSF datal      SNMP password    User password    Account password    User box password    Secure print password   selection  change default  q
109. ed state of the account    FIA_UAU 1 2 2   The TSF shall require each user  User who is permitted to use account  to be successfully  authenticated before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use account                                          Hierarchical to   No other components   Dependencies   FIA_UID 1 FIA_UID 2 3     FIA_UAU 2 1  User authentication before any action  FIA_UAU 2 1 1        The TSF shall require each user  Service Engineer  to be successfully authenticated before allowing  any other TSF mediated actions on behalf of that user  Service Engineer     Hierarchical to   FIA _UAU 1   Dependencies   FIA_UID 1  FIA_UID 2 1      FIA_UAU 2 2  User authentication before any action    FIA_UAU 2 1 2   The TSF shall require each user  Administrator  User who is authenticated by Administrator  password  User who is authenticated by SNMP password  to be successfully authenticated before  allowing any other TSF mediated actions on behalf of that user  Administrator  User who is  authenticated by Administrator password  User who is authenticated by SNMP password     Hierarchical to   FIA_UAU 1   Dependencies   FIA_UID 1  FIA_UID 2I 2                                    FIA_UAU 2 3  User authentication before any action    FIA_UAU 2 1 3     The TSF shall require each user  User who is permitted to use secure print file  to be successfully  authenticated before allowing any other TSF mediated actions on behalf of that user
110. eding in the authentication    Not accept the input from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total in each authentication  function by using the CE password is detected  it locks all the authentication functions to use  the CE password   The access to the service mode is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function    e Lock of authentication function is released with F RESET function operated    As described above  FIA_AFL 1 1   FIA_AFL 1 8   FIA_UAU 2 1   FIA_UAU 7 and  FIA_UID 2 1  are realized     7 3 2  Function Supported in Service Mode    When a user is identified and authenticated as a service engineer by the service engineer  identification authentication function at the access request to the service mode  the use of the    following functions is permitted   7 3 2 1  Change of CE Password    When a user is re authenticated as a service engineer and the new password satisfies the  quality  it is changed      Provides the CE authentication mechanism that is re authenticated by the CE password that  consists of the characters shown in Table 18      Resets the authentication failure frequency when succeeding in the re authentication    e Return     for each character as feedback for the entered CE password in the  re authentication      When the authentication failure that becomes 1 3 times at 
111. eeeeeeeeeeeeaeeeeeeeeeeteeeeneeseaeeeaeeeas 9          List of Tables                                          0 0 0 0 020202nenennnnnnnnnnnnenenenennnns  Table 1 Conformity of security objectives to assumptions  threats  and organization security   Oe 27   Table 2 Cryptographic Key Generation  Relation of Standards Algorithm Key sizes 35  Table 3 Cryptographic Operation  Relation of Algorithm Key sizes Cryptographic Operation       36  Table 4 User Box Access Control  Operational Uiet  Ree 37  Table 5 Secure Print File Access Control  Operational List    37  Table 6 Setting Management Access Control  Operational Ust 38  Table 7 ID  amp  Print file Access Control  Operational List           ec ceceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 38  Table 8 Auditable evenits  list 1 20 A A ELSE A TEY 64  Table 9 TOE Security Assurance Requirement                cescccscecseeeeseeeseeceeeeeseeeseeeeaeeeseeseeseaeteeesseees 67  Table 10 Conformity of IT Security Functional Requirements to Security Objectives               0  0    68  Table 11 Dependencies of IT Security Functional Requirements Components 82  Table 12 Names and Identifiers of TOE Security Function              ee eeeeeeeeeeeseeeseeteeeeeeeeeeeteaeeeeeeseees 88  Table 13 Characters and Number of Digits for Password           eeeeeeeeeeeeeeeeeseeeeeeteeeeeseeteeteaeeeeetaeees 89  Table 14 Types and Methods of Overwrite Deletion of Overall Area    99  Table 15 Types and Methods of Overwrite Deletion of Temporary data  11
112. egistration by user     Modification function of user attribute of user box by user who is permitted the use of public user box     Modification function of user box password of the user box by user who is permitted the use of public  user box     Modification function of the concerned user box s user attribute by user who is permitted the use of  the group user box             Hierarchical to   No other components  Dependencies   No dependencies  FMT_SMR 1 1  Security roles  FMT_SMR 1 1 1        The TSF shall maintain the roles  assignment  the authorised identified roled    assignment  the authorised identified roles                                Service Engineer  FMT_SMR 1 2 1    The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA _UID 1  FIA_UID 2 1    FMT_SMR 1 2  Security roles  FMT_SMR 1 1 2        The TSF shall maintain the roles  assignment  the authorised identified roles         assignment  the authorised identified roles                          Administrator  FMT_SMR 1 2 2    The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA _UID 1  FIA_UID 2 2    FMT_SMR 1 3  Security roles  FMT_SMR 1 1 3        The TSF shall maintain the roles  assignment  the authorised identified roles         assignment  the authorised identified roles                    User  FMT_SMR 1 2 3   The TSF shall be able to associate users with roles   Hierarchical to   No othe
113. eived data from public line   lt Security attribute gt     Image data attribute    Data attribute other than image data  FDP_IFF 1 2  The TSF shall permit an information flow between a controlled subject and controlled information via a  controlled operation if the following rules hold   assignment  for each operation  the security  attribute based relationship that must hold between subject and information security attributes     assignment  for each operation  the security attribute based relationship that must hold between subject  and information security attributes     Does not send data other than image data received from FAX unit to internal network     FDP_IFF 1 3      The TSF shall enforce the lassignment  additional information How control SFP ruled    assignment  additional information flow control SFP rules     None  FDP_IFF 1 4  The TSF shall explicitly authorise an information flow based on the following rules   assignment  rules   based on security attributes  that explicitly authorise information flows     assignment  rules  based on security attributes  that explicitly authorise information flows     None  FDP_IFF 1 5  The TSF shall explicitly deny an information flow based on the following rules   assignment  rules  based  on security attributes  that explicitly deny information flows     assignment  rules  based on security attributes  that explicitly deny information flows                                                    None  Hierarchical to   No other 
114. election  choose one of  restrictive  permissive   assignment  other property  default values for  security attributes  Secure print internal control ID  that are used to enforce the SFP    selection  choose one of  restrictive  permissive   assignment  other property     lassignment  other property    Identified uniquely   assignment  access control SFP  information flow control SFP    Secure print file access control  FMT_MSA 3 2 2   The TSF shall allow the  assignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                                   None  Hierarchical to   No other components  Dependencies   EFMT_MSA 1  N A    FMT_SMR 1  N A   FMT_MSA 3 3  Static attribute initialization  FMT_MSA 3 1 3        The TSF shall enforce the  assignment  access control SFP information flow control SEH to provide   selection  choose one of  restrictive  permissive   assignment  other property  default values for  security attributes  User box attributes of user box file  that are used to enforce the SFP     selection  choose one of  restrictive  permissive   assignment  other property                        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   55 115       bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  564  ineot 454   ineo   364   i
115. enticates the user    As for the user box registration  FMT_MSA 3  1  specifies the public to the user attribute of  the user box  and permits only the user and administrator to give the initial value to change  the user attribute  FMT_MTD 1  5  permits the registration of the user box password only to  the user or the administrator  For the user box attribute of the user box file  the user box  attribute value of the selected user box as storage is set by FMT_MSA 3  3       lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing these managements  FMT_SMR 1 2  maintains an administrator and  FMT_SMR 1 4  maintains a user permitted the use of the user box  FMT_SMF 1 specifies    these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O GROUP BOX  Group user box access control   This security objective permits the browser of the group user box only to the user who is  permitted the use of the account  It also limits the set of the group user box which is not a  pause status of use and the operation of the user function of the user box file in the group  user box only to the user who is permitted the use of the group user box  and requires various    requirements that relate to the access
116. entity    Meaning of abbreviation  CAP  CAPability of using IT environment     FIT_CAP 1   Capability of using security service of IT environment entity  corresponds to the  substantiation of capability needed to use the security function correctly provided by IT    environment entity        Audit   FIT_CAP 1    The following actions should be auditable if FAU_GEN Security audit data generation is included in the  PP ST   a  Minimal Failure of operation for IT environment entity          b  Basic Use all operation of IT environment entity  success  failure   Management   FIT_CAP 1  The following actions could be considered for the management functions in FMT           There is no management activity expected    FIT_CAP 1 Capability of using security service of IT environment entity    FIT_CAP 1 1  TSF shall provide the necessary capability to use the service for  assignment security service provided             by IT environment entity      assignment  necessary capability list for the operation of security service   Hierarchical to   No other components  Dependencies   No dependencies                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   34 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       6  IT Security Requirements  In this chapter  the TOE security r
117. eo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       As for the registration of the user box  public is appointed to the user attribute of the user box  by FMT_MSA 3  1   and it is permitted only to the user and administrator to give the initial  value to change the public attribute  In addition  when the job to store the non registered user  box into the user box appointed is executed due to the same requirement  a user ID of the user  who executes a job concerned is appointed automatically    As for the user box attribute of the user box file  the value consistent with the user box  attribute of the user box which was selected as the file saved is set up by FMT_MSA 3  3       lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing these managements  FMT_SMR 1  2  maintains an administrator and  FMT_SMR 1  3  maintains a user permitted the use of the user box  FMT_SMF 1 specifies    these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O PUBLIC BOX  a public user box access control   This security objective permits the inspection of the public user box to all users  and limits  the setting of the public user box and the o
118. equirements are described      lt Definition of Label gt    The security function requirements required for the TOE are described  Those regulated in CC  Part 2 will be directly used for the functional requirements components  and the same labels will  be used as well  The new additional requirement which is not described in CC part 2 is newly  established and identified with the label that doesn t compete with CC part 2      lt  Method of specifying security function requirement  Operation   gt   In the following description  when items are indicated in  italic  and  bold   it means that they       are assigned or selected  When items are indicated in  italic  and  bold  with parenthesis right       after the underlined original sentences  it means that the underlined sentences are refined  A  number in the parentheses after a label means that the functional requirement is used       repeatedly      lt Method of clear indication of dependency gt    The label in the parentheses      in the dependent section indicates a label for the security  functional requirements used in this ST  When it is a dependency that is not required to be used  in this ST  it is described as  N A  in the same parentheses     6 1  TOE Security Requirements  6 1 1  TOE Security Functional Requirements  6 1 1 1  Cryptographic Support    FCS_CKM 1 Cryptographic key generation    FCS _CKM 1 1  The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation  algorith
119. eration   of the SNMP password  the user password  the user box password  and the secure print    password  and the account password      lt Operational limitation of Enhanced Security function gt   FMT_MOF 1  1  permits only the administrator and service engineer to disable the setting for  the enhanced security function      lt Management of encryption passphrase  gt   FMT_MTD 1  3  permits only administrator the modification operation to the encryption  passphrase  FIA_SOS 1  3  verifies the quality of the encryption passphrase      lt Necessary requirement for accessing MIB object gt    The SMTP server group object  the DNS server group object and the MFP address group  object exists as an MIB object as well  so that the restriction is necessary even in the access  from the SNMP    FIA_UID 2  2  and FIA_UAU 2  2  identifies and authenticates that the user who accesses  the MIB object is an administrator    FIA_AFL 1  3  locks the authentication function to access the MIB object when the failure  authentication reaches 1 3 times  This lock is released by the lock release operation by the  administrator    FMT_MTD 1  3  restricts the threshold setting of the unauthorized access detection value       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   77 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 
120. es  or ID  amp  print files by having been changed the specific function  setting which relates to security   O CONFIG regulates that only the administrator and the service engineer are permitted to  perform the setup of the enhanced security function that controls all setting function related  to a series of security  and so the possibility of the threat is removed   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  OE FEED BACK uses the application regulating that the feedback protected is returned for  the entered various passwords by the administrator s authentication  and OE SESSION is  also requested to logout respectively after the operations of the administrator mode ends  so  that O CONFIG is supported sufficiently        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   31 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       Accordingly  this threat is countered sufficiently        T BACKUP RESTORE  Unauthorized use of back up function and restoration function   This threat assumes a possibility that user box files  secure print files  or ID  amp  print files may  leak when the back up function or the restoration function is illegally used  
121. es not have the authority of disclosure or change     4 2  Security Objectives for the Operational Environment  In this section  the security objectives for TOE operational environment are described   OE FEED BACK  Utilization of application to show secure password   The administrator and user utilize the application of a browser etc   used by client PC to access  MFP  which provides appropriate protected feedback to the user password  user box password   account password  administrator password  secure print password  and SNMP password     which will be entered     OE SERVER  Utilization of user information management server   The administrator sets to utilize user management by Active Directory in case of using  external user information management server instead of MFP for the management of user    account     OE SESSION  Termination of session after operation   The administrator has the user implement the following operation   e After the operation of secure print files  ID  amp  print files  and the user box and user box files  ends  the logoff operation is performed   The administrator executes the following operation   e After the operation of the various function in administrator mode ends  the logoff operation  is performed  The service engineer executes the following operation   e After the operation of the various function in service mode ends  the logoff operation is  performed     OE ADMIN  A reliable administrator   The responsible person in the organization who
122. es the quality of the session information  which is generated and used      lt Necessary requirements for managing session of user who is identified and authenticated gt   The duration of session of the user who is identified and authenticated contributes to reduce  the chance of attacking associated with unnecessary session connection  by ending the session  after the system auto reset time elapses with FTA_SSL 3  when it logs in from the panel  The  change in the system auto reset time is limited to the administrator by FMT_MTD 1  3       lt Necessary requirement for managing the identification and authentication information of the  user gt    When  the machine authentication  is chosen in a method of the user authentication by  FMT_MTD 1  1   the initial registration of a user password in the user s registration is  permitted only by the administrator    When  the machine authentication  has been selected in the method of the user authentication     the registration of the user ID  pause and resumption of use in the user registration is       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   70 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       permitted to the administrator be FMT_MTD 1  10  and FMT_MTD 1  13   When the  external  server authentication   has been sele
123. essful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Let of actions     selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt     While authentication is performed  log out from the authentication status of the user box  and lock  the authentication function for the concerned user box     Otherwise  lock the authentication function which uses the user box password    lt Operation for recovering the normal condition gt     Perform the delete function of authentication failure frequency offered within the administrator                      mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2I4            FIA_AFL 1 7  Authentication failure handling    FIA_AFL 1 1 7     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events     assignment  Let of authentication events       Account authentication  Account authentication when the belonging account of the user who  accesses in the synchronized method is not registered       Account authentication  Account authentication of the user who accesses in the method not  synchronized            selection   assignment  positive integer number   an administrator configurable positive integer   within lassignment 
124. f extension  In case of TOE using the external security functions  the external security function to be  surely secure is important  but TOE ability to provide is very important in order to use  correctly the external security function  But there is no concept as this requirement in the    security function requirements        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   33 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        gt  Reason for applied class  FIT   There is no such concept in CC part 2  Therefore  new Class was defined     gt  Reason for applied family  CAP 1   As similar to class  there is no such concept in CC part 2  Therefore  new Family was  defined     5 1 1  FIT_CAP 1 Definition       Class name  FIT  Support for IT environment entity  Meaning of abbreviation  FIT  Functional requirement for IT environment support        Class behavior  This class contains a family specifying the requirement related with the use of the security  service provided by IT environment entity  One family exists here       Use of IT environment entity  FIT_CAP      Family behavior  This family corresponds to the capability definition for TOE at the use of security function of    IT environment entity        Component leveling    FIT_CAP Capability of using IT environment 
125. f the TOE   Release process is performed after time set in the release time  setting of operation prohibition for Administrator authentication passed by the boot process                     Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 2                  FIA_AFL 1 3  Authentication failure handling  FIA_AFL 1 1 3     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events    lassignment  Jet of authentication events       Authentication for accessing the MIB object through SNMP   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values       assignment  range of acceptable values    an administrator configurable positive integer within 1 3   FIA_AFL 1 2 3    When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  ist of actions     selection  met  surpassed    Met   assignment   ist of actions      lt Action when it is detected gt    Deny the access to the MIB object and lock the authentication function to use SNMP password    lt Operation for recovering the normal condition gt      Perform the delete function of authentication failure frequency offered within the administrator 
126. f the character shown in Table 13    gt  Only Authentication password or both the Privacy password and the Authentication   password is used    gt  In the case of SNMP  the SNMP password is used for every session without requiring the  administrator authentication mechanism by the separate session information      Reset the authentication failure frequency if it succeeds in authentication    gt  In the case of both the Privacy password and the Authentication password are used  the   authentication failure frequency is reset only when both passwords together succeeded in  the authentication      When the authentication failure that becomes the 1 3 times at total in each authentication  function by using the SNMP password is detected  all the authentication functions to use the  SNMP password are locked   The access to the MIB object is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   99 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target     gt  In the case of both the Privacy password and the Authentication password are utilized   even though both passwords together fail in authentication  it is detected as one failure     The 
127. h printing data  the image file is  stored as standby status  Then  printing is performed by a print direction and password entry  from the panel   When printing is requested by a client PC  this function eliminates the possibility that other  users stole a glance at the printing of highly confidential data  or such data is slipped into the    other printings       ID  amp  Print Function  When this function is set up  usual print data are saved in the print waiting state  and  printed by the user authentication processing from the panel  Even when this function is not  set up  if it is specified on the print data to activate this function  the system will operate in    the same manner as this function is set up by a user   1 4 3 2  User Box Function    A directory called a  user box  can be created as an area to store image files in HDD  Three  types of user box are usable  the first is the personal user box which a user possesses  the second  is the public user box which is shared by registered users who made a certain number of groups   and the third is the group box which is shared by the users belonging to same account  As for the       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   11 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       personal user box  the oper
128. he authentication functions to use the CE password  The CE  authentication lock release function is executed and the release time of operation prohibition  for CE authentication elapses  so that this lock status is released    FMT_MTD 1  3  permits only to the administrator the setting of the threshold of the  authentication failure frequency that is the trial frequency of the failure authentication in the  service engineer authentication  FMT_MTD 1  9  permits only to the service engineer the  setting of the release time of operation prohibition for CE authentication      lt Management of service engineer s authentication information gt    FIA_SOS 1 1  verifies the quality of the CE password  FMT_MTD 1  9  restricts the change in  the CE password to the service engineer  Moreover  FIA_UAU 6 re authenticates it  In this  re authentication  when the failure authentication reaches 1 3 times  FIA_AFL 1 1  releases  the authentication status of the service engineer and locks all the authentication functions to  use the CE password  The CE authentication lock release function is executed and the release  time of operation prohibition for CE authentication elapses  so that this lock status is  released      lt Role and management function for each management gt   FMT_SMR 1  1  maintains the role to do these managements as a service engineer   FMT_SMF 1 specifies these management functions     6 2 1 3  Dependencies of IT Security Functional Requirements  The dependencies of the IT s
129. he user for the use of MFP various function  To the  identified and authenticated user  it provides the management function of the user password  that is managed in the MFP at the time of machine authentication  besides the permission of the  use of functions such as F BOX and F PRINT     7 4 1  User Authentication Function   lt Account Authentication  User identification and authentication in the synchronized method gt     When the access request for the user box and the store request for the secure print file  it is  identified and authenticated to be a permitted user  Account Name  account ID  is associated       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   102 115    bizhub COS    brtzbub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       with the concerned user ID that is set up beforehand besides the user ID for the identified and  authenticated user  and the use of F BOX and F PRINT is permitted to the identified and  authenticated user     Return     for each character as feedback for the entered user password     Resets the number of authentication failure when succeeding in the authentication      Not accept the access from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total for the concerned user is  detected
130. he writing frequency is  executed according to the deletion method of the HDD data overwrite deletion function set by  F ADMIN Table 15      As described above  FAD_RIP 1 is realized     Table 15 Types and Methods of Overwrite Deletion of Temporary data    Overwritten data type and their order       0x00  gt  0xFF  gt  0x61  gt  Verification    7 15  FAUDIT LOGGED  Audit log function     F AUDIT LOGGED is the function to generate audit record log when the auditable event  related to security occurred  This generates the record of following events      1  Start up   Shut down  This obtains the record of start up and end of MFP and the record of ON OFF of the audit  log function      2  Start and end of job  necessary to be audited    This obtains the operation logs of user box file  secure print file and ID  amp  print file which  are the protected assets registered in MFP  These operations are necessary to be audited  and the record of the start and end timing is obtained      gt  User box file  Jobs related to the user box file are as follows  The record of following jobs is obtained     Panel job  Save in User box from the operation panel in Copy  Scan and User Box mode    Saved job in User box via driver   network  Save in User box through the printer driver or network    Saved job in User box via USB   Bluetooth  Save in User box through USB or Bluetooth    Saved job in FAX RX user box  Save in User box through Fax receiving   lt   Output job from User box  Print from the
131. her operations     Modify  modify to other user s  User ID    account ID  or  public     assignment  the authorized identified roles       User    Administrator   assignment  access control SFP  information flow control SFP    User box access control  Hierarchical to   No other components  Dependencies   FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FMT_SMF 1  FMT_SMF 1     FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 3      FMT_MSA 1 2  Management of security attributes    FMT_MSA 1 1 2     The TSF shall enforce the  assignment  access control SFP s   information flow control SFP s  to  restrict the ability to  selection  change_default  query  modify  delete   assignment  other operations     the security attributes  assignment  Jet of security attributes  to assignment  the authorized identified  roles                                    assignment  list of security attributes     User attributes of user box that is set the  public     selection  change default  query  modify  delete   assignment  other operations     modify  modify to  User ID  or  account ID    assignment  the authorized identified roles       User who is permitted to use that public user box    Administrator   assignment  access control SFP  information flow control SFP    User box access control  Hierarchical to   No other components  Dependencies   FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FMT_SMF 1  FMT_SMF 1     FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 4      FMT_MSA 1 3  Management of security attributes    FMT_MSA 1 1 3  
132. ho is identified and  authenticated    As described above  FIA_AFL 1 4   FIA_AFL 1 8   FIA_ATD 1  FIA_UAU  1 1   FIA_UAU 7  FIA_UID 2 3  and FIA_USB 1 are realized      lt Automatic registration of the User ID gt    In the case of the    External server authentication    has been selected as the user  authentication method  the identified and authenticated user is registered as a user ID with the  user name and authentication server information that was used with identification and  authentication    As described above  FIA_UID 2 7   FMT_MTD 1 10   FMT_SMF1 and FMT_SMR 1 5  are  realized     7 4 2  Operation Method Setup Function of Account Authentication Function    Set the following authentication method in the account authentication function used with a  user authentication function       Account Authentication Function  for user   synchronized method  The method which utilizes an account ID associated with user ID beforehand      Account Authentication Function  for user   method not synchronized  The method to authenticate by the account ID and the account password at the time of access   without utilizing the account ID that associated with user ID beforehand   As described above  FMT_MOF 1 5   FMT_SMF 1 and FMT_SMR 1I 6  are realized     7 4 3  Auto Logout Function in User Identification and Authentication Domain  While the user who is identified and authenticated is accessing from a panel  if it does not    accept any operations for more than the  panel automatic logo
133. ht c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   90 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       User password is changed  It verifies whether the user password newly set have been   satisfied the following qualities     gt  Itis composed of the characters and by the number of digits  shown in the user password  of the Table 13     gt  It shall not be composed of one kind of character     gt  It shall not be equal to the value which is currently set       User deletion  User ID and user password is deleted    gt  When a personal user box that a concerned user owns exists  it is selected whether that  personal user box is set to the public user box of  user attributes  public  or it is deleted     e Pause resume of User  Only in the machine authentication as User authentication method    Specify the User ID and pause the user or resume the user in the pause state  The user in the  pause state is not identified and not authenticated  so that the user cannot use the user  function after identification and authentication     e Change of the belonging account  The belonging account that related to user is changed  As described above  FIA_SOS 1 1   FMT_MTD 1 1   FMT_MTD 1 2   FMT_MTD 1 3    FMT_MTD 1 10   FMT_MTD 1 12   FMT_MTD 1 13   FMT_SMF 1 and FMT_SMR 1 2  are  realized
134. hub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and access authentication to the secure print   and OE SESSION requires the log off operation after the operation ends  so that  O REGISTERED USER and O SECURE PRINT are supported sufficiently    Accordingly  this threat is countered sufficiently        T UNEXPECTED TRANSMISSION  Transmission to unintended address   This threat assumes the possibility of sending the user box file to the address that isn t  intended  when the network setting that relates to the transmission is illegally changed  This  is concerned about a possibility that the user box file is transmitted to the specified server  illegally without the change of the network environment constitution by the malicious person  by  for instance  illegally being changed the address of the SMTP server that relays E mail for  the E mail  or illegally being changed the address of the DNS server where the domain name  is inquired when the address of the SMTP server is used for a search of the domain name   For FTP transmission  by being likely to use the mechanism of the search of the domain name  is concerned about the similar possibility of the incident might be occurred by E mailing   Furthermore  when the network setting which is related to the 
135. ibed as follows        O REGISTERED USER  Usage of a permitted user   This security objective limits the utilization of MFP installing TOE to only the user who  succeeded in identification and authentication  and needs various requirements regarding    user identification and authentication      lt Necessary requirement for identification and authentication of the user gt    It identifies and authenticates that the user who accesses is a permitted user by FIA_UID 2  3   and FIA_UAU 1  1     FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1  8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1  4  locks the authentication function for that user from then on   This lock status is released by the administrator s release operation    FMT_MOF 1  2  permits only the administrator the selection of the user authentication  methods which are  Machine authentication  and  External server authentication    FMT_MTD 1  3  permits only the administrator the setting  modification  of the threshold of  the Authentication failure frequency which is the trial frequency of the failure authentication  in the user authentication    FIA_SOS 1  4  secures the quality verification of the session information used in the user  authentication via the network  and FIA_SOS 2 secur
136. ically registered   As described above  FMT_MSA 3 1  and FMT_SMF 1 are realized      lt Storing of user box file gt      In the new storing operation  move or copy operation of user box file  the user box ID  equivalent to the user box specified as target storage is set to the user box attribute as the  user box file   As described above  FMT_MSA 3 3  is realized     7 5 1  Personal User Box Function  7 5 1 1  Access Control Function to Personal User Box    The task to act for the identified and authenticated user has  User ID  of the user who is  identified and authenticated for the user attribute  This task is permitted the display of the list  of the personal user box which has a corresponding user attribute with this user attribute    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1   and FDP_ACF 1 1  are realized     7 5 1 2  Access Control Function to User Box File in Personal User Box    When the user box to operate is selected   User Box ID  of the user box is associated with the  task as a user box attribute in addition to the user attribute  This task is permitted  to the user  box file with the user box attribute corresponding to the user box attribute of itself  the printing   the E mail transmission  include the S MIME transmission   the FTP transmission  the FAX  transmission  the SMB transmission  WebDAV transmission  download  the removing to other  user boxes  the copy operations to other user boxes  and the copy operations to an external  memory     As 
137. ication events     Authentication for accessing the service mode    Re authentication for changing the CE password    selection   assignment  positive integer number   an administrator configurable positive integer  within lassignment  range of acceptable values    assignment  range of acceptable values    an administrator configurable positive integer within 1 3       FIA_AFL 1 2 1        When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions          selection  met  surpassed   Met        assignment  List of actions      lt Action when it is detected gt     Log out from the authentication status of the service mode if it is  and lock the authentication  function which uses the CE password     If its not under the authentication status  lock the authentication function which uses the CE  password    lt Operation for recovering the normal condition gt   Perform the lock release function of CE authentication by specific operation    When time set in the release time setting of operation prohibition for CE authentication passed  from specific operation  the release process is performed                     Hierarchical to   No other components   Dependencies   FIA_UAU 1  FIA_UAU 2 1    FIA_AFL 1 2  Authentication failure handling  FIA_AFL 1 1 2        The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignme
138. ile with a corresponding file  attribute to the file attribute of this task   As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1  2  and FDP_ACF 1 2  are realized     7 6 1 8  Registration Function of Secure Print File    When it is authenticated as a permitted user in the store request of the secure print file  the    user is permitted to register the secure print password with the concerned secure print file       Registration of the secure print password  The registered secure print password is verified to meet the following requirements    gt  Itis composed of the characters and by the number of digits shown in Table 13    gt  It shall not be composed of one kind of character        Giving of the secure print internal control ID  When the verification of the secure print password is completed in a store request of the       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   110 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    secure print file  the secure print internal control ID uniquely identified is set to the  concerned secure print file   As described above  FMT_SOS 1  1   FMT_MSA 3 2   FMT_MTD 1 8   FMT_SMF 1 and  FMT_SMR 1 3  are realized     7 6 2  ID  amp  print Function  7 6 2 1  ID  amp  Print File Registration Function    For the storing request of ID  am
139. ils of    Model    and    Mode2      As described above  FMT _MOF 1 2   FMT SMF 1  and FMT_SMR 1 2  are realized     7 1 3 21  Function Related to the Audit Log Function      Access and delete of Audit log  This exports the audit log obtained by the audit log function   Audit log is deleted at the  time of export   Also  there is the deletion operation of audit log other than the deletion by  the export operation  Both are operated only by administrator       Operational setup when the audit log is full  Either is set up for the operation of audit log when it is full     Permit Overwrite    setting to  overwrite from the oldest audit log     Prohibit overwrite    setting to stop the acceptance of job        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   97 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    As described above  FMT_MOF 1 2   FMT_MTD 1 14   FMT_SMF 1  and FMT_SMR 1 2  are  realized     7 1 3 22  Setting of date and time information      Set the date and time information  The date and time information is set only by  administrator   If each value is not in the value in a parenthesis  the setting cannot be determined   Year  00 37   Month  01 12   Day  01 31   Hour  00 23   Minute  00 59   Also  refer to the  time function in MFP and time information of NTP se
140. ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         Contents Jemen  1  ST ERO UCU ON esis casita cscs eee eege eege Eeer 6  Meas ST Ee 6   tel EE 6  1 3  TOE Overvlew   00      ecccccecccececceeeccceeeceeeeeeeeceaeeecsaeescaaeeseaeeesaeessaeeescaeeeseaeesseaeeseeeeseaeeeeeaeesseeeessueesseaeees 6  TBD LOE TVPG EEN 6  1 3 2  Usage of TOE and Main Security Functons nenen 6   A TOE De Serie EE E 7    TT 7  1 4 2  Physical SCOpe 0l I OE va fs5  cis ssa tecet a bilities straint aaa aya all ena ili etnies 8  1 4 3  LOGiCal SCODE  ee 11  2  CGo  ntormance ei E E 18  Debs GC  Gonformance  ein 18  E e e EE 18  2 3  Package Claim EE 18  DA  RETCTON CO EE 18  3  Security Problem Definition suc cccsccvccccise cescceccisecciestessticscettencecasstese cated neces 19  ST HProtected oTe 1 e  CAPE AEAEE EEE ETTET EEEE EE EE EE EE 19  3 2 ASSUMPUIONS ea E E r called eae canes  20   lt  E Re 20  3 4  Organizational Security e 22  4   Security Obj  ctiveS riria ech acetal tects amet beeches gente teeters 23  4 1  Security Objectives for the TOE EE 23  4 2  Security Objectives for the Operational Environment 25  4 3  Security Objectives Rationale ies eves cces esas ectbesebaseaesenevetes ster eteesiesescsabatesscadecasecndesesesedaetevstereeerebaees 27  E AR E EA EE EE 27  43 2  Sufficiency of ASSUMPLIONS 3  2050  4  ieee bests  i i a a raa aa a e e a era eae 28  4 3 3  Surticiency of Rude 28  4 3 4  Sufficiency of Organizational Security Dolcles  32  5  Extended Co
141. ion of a  personal user box and the user box file in a personal user box is restricted only to the user  who is the owner by O PRIVATE BOX  so that the possibility of the threat is reduced  When  the external user information management server is used  the possibility of the threat is  reduced because the user identification and authentication is operated through  O AUTH CAPABILITY supporting the operation for the user authentication function by the  user information management server of Active Directory and through OE SERVER setting to  use the user management by Active Directory by the administrator   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  E FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication  and OE SESSION also requires the log out  operation after the operation ends  so that O REGISTERED USER and O PRIVATE BOX are  supported sufficiently   Accordingly  this threat is countered sufficiently        T ACCESS PUBLIC BOX  Unauthorized access to public user box using user function    This threat assumes the possibility that an unauthorized operation is done by using the user  function for the public user box which each user shares to store the image file    O REGISTERED USER assumes that only the user to whom TOE succeed identification and  authentication is permitte
142. ions utilizing the user password of the user are locked out   Login by the user is denied   Change operation of the user password is denied     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function    The lock of the authentication function is released by performing the lock release function   to the concerned account of FADMIN   Changed when the user password newly set satisfies the following qualities    gt  Itis composed of the characters and by the number of digits  shown in the user password of   the Table 13    gt  It shall not be composed of one kind of character    gt  This password is not matched to the currently setup password     As described above  FIA_AFL 1 4   FIA_SOS 1 1   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1 2    FMT_SMF 1  and FMT_SMR 1 3  are realized     7 5  F BOX  User Box Function     F BOX permits a user who was identified and authenticated as a permitted user to operate and  manage his her personal user box  When the account authentication is used  F BOX permits the  user to operate and manage the group user box associated with the account to which the user  belongs  F BOX is a series of security function such as the access control function allowing that  the user is permitted to use the public user box when he she tries to access that public user box    and permitting various operations of the public user box and the user box files after the  authentication succeeds      lt Registr
143. k the illegal uses and operations   motivation of an attacker is expected to decrease  TOE security environment that corresponds to  the organizations and users that desire to manage MFP with this function is assumed   Obtaining logs related to security are two  One is obtaining the log of all authentication  functions  In order to use the functions of MFP except the confirmation of stopped state of user  and account  it is necessary to succeed in authentication  and so the illegal actions  operations  after permission time  of MFP user could be reduced  Another thing is obtaining the log of  operations  jobs  related to the user box files  the secure print files  and the ID  amp  print files  which are the assets registered in MFP  The illegal operations could be reduced by auditing the  access of user to the assets    The security policies applied in the organization that uses TOE are identified and described as  follows     P COMMUNICATION DATA  Secure communication of image file   Highly confidential image files  secure print files  user box files  and ID  amp  print files  which  transmitted or received between IT equipment must be communicated via a trusted path to the  correct destination  or encrypted when the organization or the user expects to be protected     PREJECT LINE  Access prohibition from public line   An access to internal network from public line via the Fax public line portal must be  prohibited     PAUDIT LOGGING  Acquisition and management of Audit log
144. l  Operational List    A task to act for a user   SMTP Server Group Object   Settings    DNS Server Group Object   Restore      MFP Address Group Object       PC FAX reception setting Object    Transmission Address Data Object       FDP_ACC 1 4  Subset access control    FDP_ACC 1 1 4   The TSF shall enforce the  assignment access control SFP on  assignment  List of subjects  objects  and  operations among subjects and objects covered by SFP   lassignment  Jet of subjects  objects  and operations among subjects and objects covered by SFP    Listed in  Table7 ID  amp  print file Access Control operational list    assignment  access control SFP    ID  amp  print file access control  Hierarchical to   No other components  Dependencies   FDP_ACF 1  FDP_ACF 1 4                        Table 7 ID  amp  Print file Access Control  Operational List    Subject Object Operational list    A task to act forauser   ID  amp  print File       FDP_ACF 1 1  Security attribute based access control    FDP_ACF 1 1 1   The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes         l assignment  list of subjects and objects controlled under the indicated SFP  and for each  the  SFP relevant security attributes  or named groups of SFP relevant security attributes      lt Subject gt   
145. l server authentication setting   selection  change default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration   assignment  the authorized identified roles                                                          Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MTD 1 12  Management of TSF data          FMT_MTD 1 1 12   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles            Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   59 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          lassignment  list of TSF datal    Belonging Account of a user oneself   selection  change default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration   assignment  the authorized identified roles    Administrator  the user who is permitted to use of the account      Hierarchical to   No other components    Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 6                     FMT_MTD 1 13  Management of TSF data   
146. list of the public user box which is set the  public as the user attribute  The operation specification of each public user box is as follows     As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized      7 5 2 1  Authentication Function in Access to Public User Box    For the access request for each public user box  after the above mentioned verification function  is operated  the user who accesses is authenticated that it is a user permitted the use of a user  box concerned respectively      Provides the user box authentication mechanism that is authenticated by the user box  password that consists of the character shown in Table 13       After the user box is authenticated to the access from the network  it provides the user box  authentication mechanism using the session information besides the user box password     gt  According to protocol  it utilizes the 10    session information or more  or generated and  uses the 10    session information or more      Return     for each character as feedback for the entered user box password      Resets the number of authentication failure when succeeding in the authentication     gt  Incase of the access from the panel  when it fails in the authentication  an input from the  panel is not accepted for five seconds      When the authentication failure that becomes the 1 3 times in total is detected for the  public user box concerned  the authentication function to the public user box concerned is  lock
147. ll restrict the ability to  selection  determine the behaviour of  disable  enable  modify the  behaviour off the functions  assignment  Jist of functions  to  assignment  the authorized identified  roles         lassignment  Jist of functions       Account Authentication Function  For user    selection  determine the behavior of  disable  enable  modify the behaviour oft  modify the behavior of   assignment  the authorized identified roles   User who is permitted to use that account  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 6                     Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   53 115       bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       FMT_MSA 1 1  Management of security attributes    FMT_MSA 1 1 1     The TSF shall enforce the  assignment  access control SFP s   information flow control SFP s  to  restrict the ability to  selection  change_default  query  modify  delete   assignment  other operations     the security attributes  assignment  Let of security attributes  to assignment  the authorized identified  roles         assignment  list of security attributes     User attributes of the user box that is set user s own  user ID     selection  change_default  query  modify  delete   assignment  ot
148. lock status is released when the lock release function to the MIB object of F  ADMIN is  performed   As described above  FIA_AFL 1 3    FLA_UAU 2 2  and FIA_UID 2 2  are realized     7 2 2  Management Function using SNMP    When it is identified and authenticated that the user is an administrator by the SNMP  password  the access to the MIB object is permitted  and then the operation of the setting data  shown below is permitted to be done      1  Network Setup  Setup operation of the following setting data is performed    gt  Setting data that relates to SMTP server  IP address  port number  etc     gt  Setting data that relates to DNS server  IP address  port number  etc     gt  Aseries of setting data that relates to MFP address  IP address  NetBIOS name  AppleTalk  printer name  etc    As described above  FDP_ACC 1 3  and FDP_ACF 1 3  are realized     2  Change of SNMP password   The SNMP password  Privacy password and Authentication password  is changed  Verify that   the SNMP password newly set satisfies the following qualities     gt  It is composed of the characters and by the number of digits shown in the SNMP password   of the Table 18     gt  This password is not composed of one character only     gt  This password is not matched to the currently setup password    As described above  FIA_SOS 1 2   FMT_MTD 1 3    FMT_SMF1 and FMT_SMR 1 2  are  realized      3  Setup of SNMP password authentication function  The authentication method in the SNMP password authenticati
149. lt Subject attributes gt    A task to act for a user  gt   UserAttribute  User ID     Account Name  Account ID     User Box Attribute  User Box ID       Administrator Attribute   lt Object gt   lt Object attributes gt     User Box  gt    User Attribute  User ID or Public or Account ID     User Box File  gt    User Box Attribute  User Box ID            assignment  access control SFP            8 The MFP address group object is a series of data concerning the address of the main body of MFP such as IP  address and the Appletalk printer name        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   38   115       bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          User Box access control  FDP_ACF 1 2 1   The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment  rules governing access among controlled subjects and    __ controlled objects using controlled operations on controlled objects     assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects    lt Operation control to Personal user box gt   A task to act for a user is permitted to do the list display operation to the user box with the user  attribute of an object
150. m  assignment  cryptographic key generation algorithm  and specified cryptographic key sizes   assignment  cryptographic key sizes  that meet the following   assignment  Jist of standards            lassignment  list of standards     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes   lassignment  cryptographic key generation algorithm     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes   lassignment  cryptographic key sizes     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes   Hierarchical to   No other components  Dependencies   FCS _CKM 2 or FCS_COP 1  FCS_COP 1   FCS_CKM 4  N A                       Table 2 Cryptographic Key Generation  Relation of Standards Algorithm Key sizes       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   35 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo              364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  List of Standards Cryptographic Key Generation Algorithm Cryptographic Key sizes  FIPS 186 2 Pseudorandom number Generation Algorithm   128 bits    192 bits    168 bits    256 bits  Konica Minolta Konica Minolta HDD Encryption Key Generation   128 bits  Encryption Algorithm  specification standard          FCS _COP 1 Cryptographic operations    FCS_COP 1 
151. me information that are necessary for the  audit information  this is supported by FIA_UID 2 1   FIA_UID 2 2   FIA_UID 2 3    FIA_UID 2 4   FIA_UID 2 5   FIA_UID 2 6  and FPT_STM 1  This security objective is satisfied by this functional requirement        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   80 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        gt  set admin  Set of necessary requirement to keep administrator secure    lt Identification and Authentication of an administrator gt   FIA_UID 2  2  and FIA_UAU 2  2  identifies and authenticates that the accessing user is an  administrator   FIA_UAU 7 returns     for each character entered as feedback protected in the panel  and  supports the authentication   FIA_AFL 1  8  refuses  in case of the failure authentication tried from the panel  all the input  receipts from the panel for five seconds in every failure  When the failure authentication  reaches 1 3 times  FIA_AFL 1  2  logoffs if it s under authentication  and locks all the  authentication functions that use the administrator password from then on  The release  function is executed by starting TOE with turning OFF and ON the power supply  so that the  lock is released after the release time of operation prohibition for administrator  authentication passe
152. med  log out from the authentication status of the user  and lock the  authentication function for the user     Otherwise  lock the authentication function for using the user password    lt Operation for recovering the normal condition gt     Perform the delete function of authentication failure frequency offered within the administrator                      mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 1 1         FIA_AFL 1 5  Authentication failure handling    FIA_AFL 1 1 5     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment  Jet of authentication events    lassignment  Let of authentication events      Authentication for accessing the secure print file   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values       assignment  range of acceptable values    an administrator configurable positive integer within 1 3   FIA_AFL 1 2 5    When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jist of actions     selection  met  surpassed    Met   assignment  list of actions      lt Action when it is detected gt    Deny the access to the secure print file and lock the authentication function for th
153. mmunication method between MFP and client PC  needs to be provided when transmitting the secure print file or the user box file   O TRUSTED PATH provides Trusted Channel to a correct destination in the transmission  and reception of an image between MFP and client PCs for user box files  secure print files   and ID  amp  print files that save confidential images  so that the organizational security policies  is achieved   Also  the security objective provides the transmission function to a correct destination by  encrypting the user box file transmitted by e mail from MFP to client PC by  O CRYPTO MAIL  so that the organizational security policies is achieved   Furthermore  O CONFIG restricts the Trusted Channel function setting data  the  management of the user box files  encryption by e mail and the transmission address data to  the administrator  And  OE FEED BACK uses the application regulating that the protected  feedback is returned for the entered password in the administrator s authentication  and  OE SESSION is also regulated to log out after the operations of the administrator mode ends   that O CONFIG is supported  Also  OE  SETTING SECURITY performs the setting along  with the description of guidance including the enhanced security function  and the operation  related to the maintenance   Accordingly  this organizational security policy is sufficiently to achieve     e PREJECT LINE  Access prohibition from public line        Copyright c  2011 2012 KONICA MINOLTA B
154. mponents Definition          cccccccsscseseeeeeeeeeeeeeeeeneeeeeeeeeeseeeeeeeeeeeeeeeeseeeeeneeeeeeeees 33  5 1  Extended EUACKOMGOMpONENL tuo chat es A oa Bede tet 33  Sr PAT CAP el EE 34  6  TE Security Fe quire nie rays ees ee ege Eege 35  6 1  TOE Security EeoIrereteeseeeesegeguegerueeCsbreugEe edu 35  6 1 1  TOE Security Functional Heouirements 35  6 1 2  TOE Security Assurance Requirements         cecccceceeeteteneeceneeteneeeeaeeteneeceaeeseaeeseaeeseaeeseaeeseaeeseaeeseaeeteeeseeeteaeess 67  6 2  IT Security Requirements Mationale  acncnd nnn nn denen en ann nd na nae ne ne dae es 67  6 2 1  Rationale for IT Security Functional Requirements         ccccecceceeeeeeeeneeeeeeteeeteaeeteneeseaeeteaeeteaeeteaeeseaeeseaeeteanens 67  6 2 2  Rationale for IT Security Assurance Heouirements   87  7  TOE Summary Specification euusesdeeieueekreueskseeekeeeeeekkRuuSeee EREECHEN 88  7 1  FADMIN  Administrator Function    0        c cceccceeeeeeceeeeeecaeeeeeeeaeeeeeeceaeeeeeeaaeeeesecaeeeeseeeeeeeneeeeeeseaas 88  7 1 1  Administrator Identification Authentication Fumchon  88  7 1 2  Auto Logout Function of Administrator Mode AA 89  7 1 3  Function Supported in Administrator Mode    89  7 2  FADMIN SNMP  SNMP Administrator Function        ssesssessseesrneseneesrerreserenernstennrenertrnnrtnntennrnnneenne 99       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   3 115    bizhub C554   bizhub C454   bizhub C364 bizhub C284  bizhub C224   bizhub
155. n   109  re D Print FUNCUON EE 110  Fi O 20 1 amp   Print  FUN CUO EE 111  7 7  F CRYPT  Encryption Key Generation Functor    c c cccetesededtcetedeencpeastencecpheestecsteepeatpesteestetsentazees 111  7 8  F RESET  Authentication Failure Frequency Reset Function             ceceeseseeeeeeeeeeeeeeeeeeeeeeeeeaes 111  7 9  F TRUSTED PATH  Trust Channel Function               ccccccccescceeeeeeeeeeeeseaeeeeeeeeeeeeeseaeesseeeessneeessneees 112  7 10  F S MIME  S MIME Encryption Processing Function             c ccecceeeceeeeeeeneeeeeeeeeeeeeeeeneeeeeeteneeeaes 112  7 11  F FAX CONTROL  FAX Unit Control Function   112  7 12  F SUPPORT AUTH  External Server Authentication Operation Support Function                    113  7 13  F SUPPORT CRYPTO  ASIC Support FUNCtION               ccesceeeseeseeeeseeseeeeseeeeeeceneeseeneeesneensantens 113  7 14  F OVERWRITE  HDD Data Overwrite Deletion FUNCTION                ccccceeeceeeeeeeeeeeeeeeeeeeeeteeeennees 113  7 15  FAUDIT LOGGED  Audit log fUNCtION   Ascens 114       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   4 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo     364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          List of Figures Jensen  Figure 1 An example of MFP   s use emironments  A 8  Figure 2 Hardware composition relevant to TOE           cecceeseeeeeeeeeeeeeeee
156. nected to  from a port of  Fax public line through Fax unit     TOE makes effective use of the security function  HDD encryption function  of ASIC  which is  an external entity  The following explains typical functions related to the external entity     e Utilization of ASIC  ASIC  an external entity  activates a function to encrypt the data in HDD as a function to  protect unauthorized bring out of data and so on when an encryption passphrase is set up     1 4 8 8  Enhanced Security Function    Various setting functions related to the behavior of the security function for the Administrator  function and the Service engineer function can be set collectively to the secure values by the  operation settings of the  Enhanced Security Function   Alert screen is displayed if each value  set is changed to the vulnerable one individually  Also  the use of the update function of TOE  through the network  the initializing function of the network setting  and the setting change by  remote diagnostic function is prohibited  or alert screen is displayed when it is used    The following explains the series of the setting condition of being the enhanced security  function active  In order to activate the enhanced security function  the prerequisite is required    that an administrator password and a CE password should be set along with the password    policy      User authentication function   Valid  Both authentication by the main body  and the external server are usable      User   access
157. neo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target           assignment  other property    Corresponds with the value of the user box attributes of the user box  that selected as a target to store the user box file concerned    assignment  access control SFP  information flow control SFP    User box access control  FMT_MSA 3 2 3     The TSF shall allow the  assignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                    None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  N A    FMT_SMR 1  N A           FMT_MSA 3 4  Static attribute initialization  FMT_MSA 3 1 4     The TSF shall enforce the  assignment  access control SFP information flow control SEH to provide   selection  choose one of  restrictive  permissive   assignment  other property  default values for the  security attributes  User attributes of ID  amp  print file  that are used to enforce the SFP    selection  choose one of  restrictive  permissive   assignment  other property      assignment  other property   Shall be equal to the values of the user attributes of the user who  stores that ID  amp  print file    assignment  access control SFP  information flow control SFP    ID  amp  print file access control  FMT_MSA 3 2 4     The TSF shall allow the  assignment  the authorised identified roles  to specify alternative
158. nging out HDD  which stores image data in MFP   TOE can encrypt all the data written in HDD including image data using ASIC  Application  Specific Integrated Circuit   Besides  TOE has the function that deletes image data in HDD  completely by deletion method compliant with various overwrite deletion standards at the time  of abandonment or the lease returns and the function that controls the access from the public  line against the danger using Fax function as a steppingstone to access internal network  So it  contributes to the prevention of information leakage of the organization that uses MFP  Also   TOE includes the audit log function and contributes to the detection of MFP illegal use     1 4  TOE Description  1 4 1  Roles of TOE Users  The roles of the personnel related to the use of MFP with TOE are defined as follows       User  An MFP user who is registered into MFP   In general  the employee in the office is assumed        Administrator  An MFP user who manages the operations of MFP  Manages MFP   s mechanical operations  and users   In general  it is assumed that the person elected from the employees in the office  plays this role         Service engineer  A user who manages the maintenance of MFP  Performs the repair and adjustment of MFP   In  general  the person in charge of the sales companies that performs the maintenance service of  MFP in cooperation with Konica Minolta Business Technologies  Inc  is assumed        Responsible person of the organization tha
159. nt  access control SFP      Setting management access control  FDP_ACF 1 2 3     The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment  rules governing access among controlled subjects and  controlled objects using controlled operations on controlled objects     assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects     A task act for a user who has a administrator attribute is permitted to set the SMTP server group  object  the DNS server group object  the MFP address group object  the PC FAX reception setting    object  and the transmission address data object and to operate the restoration   FDP_ACF 1 3 3                                Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   40 115       bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects       assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects   None      FDP_ACF 1 4 3    The TSF sh
160. nt  range of acceptable values  unsuccessful                Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   43 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target          authentication attempts occur related to  assignment  Jet of authentication events     assignment  Let of authentication events     Authentication for accessing the administrator mode    Re authentication for changing the administrator password   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 2   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions     selection  met  surpassed   Met   assignment  et of actions    lt Action when it is detected gt     Log out from the authentication status of the administrator mode if it is  and lock the authentication  function which uses the administrator password       If it s not under the authentication status  lock the authentication function which uses the  administrator password      lt Operation for recovering the normal condition gt     Perform the boot process o
161. nt environment control  a configuration management for the TOE and a  secure distribution procedure  And therefore the selection of EAL38  which provides an adequate  assurance level  is reasonable    The secure requirement dependency analysis is assumed to be appropriate because the  package EAL has been selected  therefore details are not discussed        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   87 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       7  TOE Summary Specification    The list of the TOE security function led from the TOE security function requirement is shown  in Table 11 below  The detailed specification is explained in the paragraphs described below     Table 12 Names and Identifiers of TOE Security Function                      TOE Security Function  F ADMIN Administrator function  F ADMIN SNMP SNMP administrator function  F SERVICE Service mode function  F USER User function  F BOX User box function  F PRINT Secure print function  ID  amp  print function  F CRYPTO Encryption key generation function  F RESET Authentication Failure Frequency Reset function  F TRUSTED PATH Trusted Channel function  F S MIME S MIME encryption processing function  F FAX CONTROL Fax unit control function  F SUPPORT AUTH External Server authentication operation suppor
162. ntra office LAN exists as a network in the office    e MFP is connected to the client PCs via the intra office LAN  and has mutual data  communications      When a SMTP  FTP  or WebDAV server is connected to the intra office LAN  MFP can carry  out data communications with these servers  too   The DNS service will be necessary when  setting a domain name of the SMTP   FTP   WebDAV server        It is also assumed to unify management of user IDs   passwords in a server  In this case  TOE  can control access to the MFP by using the user registration information in the user  information management server      When the intra office LAN connects to an external network  measures such as connecting via  a firewall are taken  and an appropriate setup to block access requests to the MFP from the  external network is applied    e The intra office LAN provides a network environment that cannot be intercepted by office  operations including using switching hubs and installing wiretapping detectors      The public line connected with MFP is used for communications by Fax and the remote    diagnostic function        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   8 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       1 4 2 2  Operation Environment    MFP Controller    NVRAM       S
163. o  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       7 1 3 1  Change of Administrator Password    When a user is re authenticated as an administrator and the new password satisfies the  quality  the password is changed       Provides the administrator authentication mechanism that is authenticated by the  administrator password which consists of the character shown in Table 13      Resets the number of authentication failure when succeeding in the re authentication    e Return     for each character as feedback for the entered administrator password in the  re authentication      When the authentication failure that becomes 1 3 times at total in each authentication  function by using the administrator password is detected  it logouts the administrator mode  accessing  and locks all the authentication functions to use the administrator password   The  access to the administrator mode is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function    e FRESET works  so that the lock of the authentication function is released       Verify the new administrator password if the following qualities are satisfied    gt  Itis composed of the characters and by the number of digits shown in the administrator   password of Table 13    gt  It shall not be composed of one kind of character    gt  It doesn t match with the current value   As described above  FIA_AFL 1 2   FIA_SOS 1 1  
164. o authenticate user at MFP by registering a user ID and a user password into  HDD on the MFP controller     2  External server authentication  A method to authenticate user at MFP by using the user ID and the user password that are  registered on the user information management server which is connected with the  intra office LAN without managing the user ID and user password on the MFP side   Though multiple methods called Active Directory   NTLM     and NDS are supported  the  method of the external server authentication assumed in this ST is applied only to the case  of using Active Directory     1 4 3 4  Account Authentication Function      TOE can manage the MFP users by grouping them into Account unit  The methods of Account  Authentication are as follows      1  Method synchronized with User Authentication       2 When user is set    Pause    by administrator function  authentication function for the user does not work   3 A method of directory service that Windows Server 2000  or later  supports to uniformly manage user  information in the network environment of Windows platform   4 An abbreviation of NT LAN Manager  An authentication method used in directory service that Windows NT  supports to uniformly manage user information in network environment of Windows platform    When account is set    Pause    by administrator function  authentication function for the account does not work        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights
165. o be successfully identified before allowing any other  TSF mediated actions on behalf of that user  User     Hierarchical to   FIA _UID 1   Dependencies   No dependencies                   FIA_UID 2 4  User identification before any action    FIA_UID 2 1 4     The TSF shall require each user  User who is permitted to use secure print file  to be successfully  identified before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use secure print file     Hierarchical to   FIA_UID 1    Dependencies   No dependencies                         FIA_UID 2 5  User identification before any action  FIA_UID 2 1 5     The TSF shall require each user  User who is permitted to use the public user box  to be successfully  identified before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use the public user box     Hierarchical to   FIA_UID 1    Dependencies   No dependencies                      FIA_UID 2 6  User identification before any action    FIA_UID 2 1 6     The TSF shall require each user  User who is permitted to use the account  to be successfully identified    before allowing any other TSF mediated actions on behalf of that user  User who is permitted to use  the account      Hierarchical to   FIA_UID 1  Dependencies   No dependencies                FIA_UID 2 7  User identification before any action    FIA_UID 2 1 7     The TSF shall require each user  External Server  to be successfully identified 
166. on after the operation ends  so that  O REGISTERED USER and O GROUP BOX are supported sufficiently   Accordingly  this threat is countered sufficiently     e T ACCESS SECURE PRINT  Unauthorized access to a secure print file or an ID  amp  print file  using the user function   This threat assumes the possibility that an unauthorized operation is done to the secure print  and ID  amp  print using user function   O REGISTERED USER assumes that TOE permits only the user who succeeded the  identification and authentication to use MFP installing TOE  furthermore  the operations of  the secure print and ID  amp  print are limited only to the authorized user by O SECURE PRINT   so that the possibility of the threat is reduced  When the external user information  management server is used  the possibility of the threat is reduced because the user  identification and authentication is operated through O AUTH CAPABILITY supporting the  operation for the user authentication function by the user information management server of  Active Directory and through OE SERVER setting to use the user management by Active  Directory by the administrator   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   30 115    bizhub COS    brtzbub C454  bizhub C364  bizhub C284  bizhub C224   biz
167. on function is set to the   Authentication password only  or the  Privacy password and the Authentication password    As described above  FMT MOF 1 2    FMT _SMF1 and FMT_SMR 1 2  are realized     7 3  FSERVICE  Service Mode Function    F SERVICE is a series of security function that the service engineer operates  such as the  service engineer identification authentication function in service mode accessing from a panel   and a security management function that includes a change in the CE password and the  administrator password     7 3 1  Service Engineer Identification Authentication Function    It is identified and authenticated the accessing user as the service engineer in response to the  access request to the service mode from the panel        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   100 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target         Provides the CE authentication mechanism that is authenticated by the CE password that   consists of the character shown in Table 18     gt  The CE authentication mechanism by the separate session information is not required  because the service mode can only be accessed from the panel    Return         for each character as feedback for the entered CE password    Resets the number of the authentication failure when succe
168. oose from 90 or more characters    Rule  OI Do not compose by only one and the same character   Cl Do not set the same password as the current setting after change              Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 1 3  Verification of secrets  FIA_SOS 1 1 3           The TSF shall provide a mechanism to verify that secrets  Encryption passphrase  meet  assignment  a  defined quality metricl         assignment  a defined quality metric       Number of digits  20  digits    Character type  possible to choose from 83 or more characters    Rule   1  Do not compose by only one and the same character   Cl Do not set the same passphrase as the current setting after change   Hierarchical to   No other components                Dependencies   No dependencies       FIA_SOS 1 4  Verification of secrets    FIA_SOS 1 1 4   The TSF shall provide a mechanism to verify that secrets  Session Information  meet lassignment  a  defined quality metricl               assignment  a defined quality metric                     10 19 and above  Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 2 Verification of secrets  FIA_SOS 2 1       The TSF shall provide a mechanism to generate secrets  Session information  that meet lassignment  a  defined quality metric          assignment  a defined quality metric      10 Vand above  FIA_SOS 2 2  The TSF shall be able to enforce the use of TSF generated secrets for  assignment  Jet of TSF  f
169. oose one of     ignore audited events        prevent audited events  except those taken by the    authorised user with special rights        overwrite the oldest stored audit records       ignore audited events                   Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   65 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target           assignment  other actions to be taken in case of audit storage failure    Stop accepting jobs       Hierarchical to   No other components          Dependencies   FAU_STG 1    FAU_STG 4 2  Prevention of audit data loss    FAU_STG 4 1 2           The TSF shall  selection  choose one of     ignore audited events        prevent audited events  except those  taken by the authorised user with special rights        overwrite the oldest stored audit records     and   assignment  other actions to be taken in case of audit storage failure  if the audit trail is full Gf the audit    trail is full  in the state where operation when the audit trail was full was set as  overwrite permission          29 66     selection  choose one of     ignore audited events        prevent audited events  except those taken by the  authorised user with special rights        overwrite the oldest stored audit records      overwrite the oldest stored audit records     as
170. oose one of  restrictive  permissive   assignment  other property  default values for  security attributes  User attributes of the user box  that are used to enforce the SFP            selection  choose one of  restrictive  permissive   assignment  other property      assignment  other property     Responded the registered situation of the user box classitied into the following cases       Public   when an user box is registered by the operation of user or administrator   2   User ID  of the user who performed the relevant job  when a personal user box is registered  automatically according to the operation of stored job specitying unregistered user box         assignment  access control SFP  information flow control SFP    User box access control       FMT_MSA 3 2 1        The TSF shall allow the lassignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created         assignment  the authorized identified roles        Case  1  identified in  assignment  other property  of FMT_MSA 3 1   User  administrator  Case  2  identified in  assignment  other property  of FMT_MSA 8 1   None   Hierarchical to   No other components   Dependencies   FMT_MSA 1  FMT_MSA 1 1   FMT_MSA 1 2     FMT_SMR 1  FMT_SMR 1 2         FMT_SMR 1 3      FMT_MSA 3 2  Static attribute initialization    FMT_MSA 3 1 2   The TSF shall enforce the  assignment  access control SFP information flow control SEH to provide   s
171. operations that cause controlled information to flow to and from controlled subjects  covered by the SEH                 Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   41 115       bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target           assignment  ist of subjects  information  and operations that cause controlled information to flow to and  from controlled subjects covered by the SFP      lt Subject gt      Reception from Fax unit    lt Information gt      Received data from public line    lt Operation gt      Send to internal network   assignment  information flow control SFP     Fax information flow control             Hierarchical to   No other components  Dependencies   FDP_IFF1 FDP_IFF1   FDP_IFF 1 Simple security attributes  FDP_IFF 1 1       The TSF shall enforce the  assignment  information flow control SEH based on the following types of  subject and information security attributes   assignment   ist of subjects and information controlled under  the indicated SFP and for each  the security attributed   lassignment  information flow control SFP    Fax information flow control   assignment  Jet of subjects and information controlled under the indicated SFE and for each  the  security attributes      lt Subject gt     Reception from Fax unit   lt Information gt     Rec
172. ox file transmission gt    gt  Setting related to the SMTP server   gt  Setting related to the DNS server   e Malicious person or user changes the network settings which set in MFP to identify MFP   itself where TOE installed  by setting to the value of the entity such as another unauthorized   MFP from the value of MFP  NetBIOS name  AppleTalk printer name  IP address etc  that   TOE is originally installed  so that secure print files or ID  amp  print files are exposed    e Malicious person or user changes the TSI receiving settings  A user box file is stored to the   entity which a user does not intend to  so that a user box file is exposed        e Malicious person or user changes the PC FAX reception settings  By changing the setting of  the storing for the public user box to store to common area for all users  a user box file is  stored to the entity which a user does not intend to  so that a user box file is exposed      This threat exists only in the case that the setting of PC FAX reception is meant to work as  the operation setting for box storing     T ACCESS SETTING  An unauthorized change of a function setting condition related to  security   The possibility of leaking user box files  secure print files  or ID  amp  print files rises because  those malicious including users change the settings related to the enhanced security function        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   21 115    bizhub C554  bizhub C454
173. p  print file  if the user is authenticated as a registered user  ID  amp   print file is stored     The user ID of the user who tries to store the file is set as a user attribute of that ID  amp  print  file   As described above  FIA_MSA 3  4  is realized     7 6 2 2  ID  amp  Print File Access Control Function    When the user is authenticated  the ID  amp  print file access control operates      The task substituting for the identified and authenticated user has a user ID as a user  attribute        This task is allowed to list and print ID  amp  print files with the user attribute which is equal  to this user attribute   As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 4   and FDP_ACF 1 4  are realized     7 7  F CRYPT  Encryption Key Generation Function     F CRYPT generates an encryption key to encrypt all data written in HDD by using the Konica  Minolta HDD encryption key generation algorithm that is regulated by the Konica Minolta  encryption specification standard    When the encryption passphrase is decided in the HDD encryption functional operation  setting to which the access is restricted in FADMIN  an encryption key 128 bits long is  generated from the encryption passphrase by applying the Konica Minolta HDD encryption key  generation algorithm    As described above  FCS_CKM 1 is realized     7 8  FRESET  Authentication Failure Frequency Reset Function     F RESET is a function that releases the lock by resetting the authentication failure frequency  when the
174. peration of the user function of the user box file in  the public user box only to the user who permitted the utilization of that public user box  And    it needs the various requirements regarding access control      lt User box access control  a public user box  gt    After the user has been identified and authenticated  the user ID is associated with the task  of acting a use by FIA_ATD 1 and FIA_USB 1  FDP_ACC 1  1  and FDP_ACF1  1  permits  the list display operation to the user box where public is set on the user attributes to the task  of acting the user who has user ID    It is required to be a user who is permitted the use of the user box to operate the user box file  in the public user box  FIA_UID 2  5  and FIA_UAU 2  4  identifies and authenticates that it  is a user who is permitted the use of the user box    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1  8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1  6  locks the authentication function for that user from then on   This lock status is released by the administrator s release operation    FMT_MTD 1  3  permits only to the administrator the setup of the threshold of the  unauthorized access detection value that is the trial frequency of the failure authentication in  the authentic
175. perations to an  external memory    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized     7 5 2 3  User attribute change of Public User Box    The user attribute of the user box can be changed     Specify the registered user  and change to a personal user box for the registered user     Specify the account ID  and then it becomes a group user box that can be accessed by a user  who is permitted the use of the concerned account   As described above  FMT_MSA 1 2   FMT_SMF 1 and FMT_SMR 1 4  are realized     7 5 2 4  Change of Public User Box Password    The user box password of the public user box is changed  This is performed when it is  re authenticated that the user has a permission to use the public user box and the user box  password newly set satisfies the following quality      Provides the user box authentication mechanism which authenticates the user by user box  password consisting of the characters shown in Table 13      Resets the number of authentication failure when succeeding in the re authentication      Return         for each character as feedback for the entered user box password  in the case of  access from the panel at the re authentication      When the authentication failure that becomes 1 3 times at total for the concerned public  user box is detected by each authentication function utilizing the user password  all the  authentication functions utilizing the user box password of the public user box are locked  out   Den
176. posed of one kind of character      It shall not be matched with the current value   As described above  FIA_SOS 1 1   FMT _MTD 1 6   FMT_SMF1 and FMT_SMR 1 1  are  realized     7 8 2 8  Setup of the release time of operation prohibition for CE Authentication    Set the release time of operation prohibition for CE Authentication between 5   60 minutes   As described above  FMT_MTD 1 9   FMT_SMF 1 and FMT_SMR 11 1  are realized     7 8 2 4  Function Related to Enhanced Security Function    The functions that influence the setting of the Enhanced Security function that the service  engineer operates are as follows   e HDD logical format function  Function to write the initial value of management data using the file system of HDD  The  setting of the Enhanced Security function is invalidated along with the execution of this  logical format   e HDD physical format function  Function to rewrite the entire disk in HDD with a regulated pattern including the signal rows  such as the track and sector information  The setting of the Enhanced Security function is  invalidated along with the execution of this physical format      Initialization function  Function to reset every setting value written in NVRAM and SSD to the factory default  The  setup of the Enhanced Security function is invalidated by executing this initialization  function   As described above  FMT MOF  1 1   FMT _SMF 1 and FMT_SMR 1 1  are realized     7 4  FUSER  User Function     F USER identifies and authenticates t
177. ption setting  is  permitted only to the administrator by FDP_ACC 1  3  and FDP_ACF 1  8       lt Operational Limit of deletion method of HDD data overwrite deletion function gt   The deletion method of HDD data overwrite deletion function is limited the operation only  to the administrator by FMT_MOF 1 2       lt Operational Limit of All area overwrite deletion function gt   The start up of all area overwrite deletion function is permitted only to the administrator by  FMT_MOF 114       lt Operational Limit of Audit Log gt   The inquiry and deletion operation of audit log is permitted only to the administrator by  FMT_MTD 1 14       lt Operational Limit of Operation setup of the Audit log when it is full gt   The operational setting of the audit log when it is full is permitted only to the administrator  by FMT_MOF 1 2       lt Operational Limit of Date time information gt   The modification of Date time information is permitted only to the administrator by    FMT_MTD 1 15       lt Necessary requirements to keep the administrator secure gt        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   78 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        gt  refer to set admin     lt Necessary requirements to keep the service engineer secure gt    gt  refer to set service    
178. quirements to Security Objectives    Security Objectives    SIANOO O  EINEN       n  bau  ee  Di  Qa  2         XOd SLVAlYd O    Prorat El Reale tele earen    UINTIRIUUIIE ze    HERHHIIUIUIUE aoso    HLYd GALSNYL O  TIVIN OLdAY9S O  TOYLNOO XVsA O    dapo0 T LIGNV O    Security    ALIMEAVdVO HLNV O    O  ES  m  9   Wei  4  m  D  m  J  C  n  m  D    Functional    ALITIGVdV0 OLdAY   O    Requirements  Sekai EEN  xX   x  X  X  E           FDP_RIP 1  a  ae Eee A  FIA_AFL 1 3  X         m  i                   XK    lt  X lt     gt  lt     gt X lt     lt     PITT TPE ETT TT PET ETT TT TTT TTT 8  TE PII EE ET Ey Tae ele  E e               a Fee e  E RTE  ES     x  X  E  x  RS  Lee  Sp     ES          z    X  X  PEE  EE ee E NA    EB  PLETE TTT TTR EE  TTT CTT CTT TO CTT aroso    Ele Ps ae                         Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   68 115          bizhub C554  bizhub C454   bizhub C364  bizhub C284 bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo                                            364   ineo  284   ineo  224 Control Software A2XKO0Y0 0100 G00 56 Security Target  oe A ojojojojojojojojolojlolololOjal a  Security Objectives E 3 2 D   ololo m O 2 2 Qalrloalea        skola Slml  Zz el 2 e S 2 S  818    s ec ala  CM e MEESCH EECH EK  HECKER ECH AECH ECH KEE e CH Ee AECH KE  mImlei  el T 5ST Plz  E E  ee  AE  I w    O U g Ka  z om  0 A O  DRAA E ERNES E SENES  i zZ H P      gt  E  Cc 4 I So
179. r components  Dependencies   FIA_UID 1  FIA_UID 2 3               Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   62 115    bizhub COS    brtzbub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828  bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       FMT_SMR 1 4  Security roles    FMT_SMR 1 1 4   The TSF shall maintain the roles  assignment  the authorised identified roled    assignment  the authorised identified roles     User who is permitted to use that public user box  FMT_SMR 1 2 4   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2 5      FMT_SMR 1 5  Security roles    FMT_SMR 1 1 5   The TSF shall maintain the roles  assignment  the authorised identified roles   lassignment  the authorised identified roles   External server  FMT_SMR 1 2 5   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2 7      FMT_SMR 1 6  Security roles    FMT_SMR 1 1 6   The TSF shall maintain the roles  assignment  the authorised identified roles   lassignment  the authorised identified roles   The user who is permitted to use of the account  FMT_SMR 1 2 6   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2I 6                            
180. ration mode of the function detecting unsuccessful authentication in each  authentication function is also synchronous with the above mode    gt  The above mentioned operational modes are selected      Setup of the network setting modification function by SNMPv1 and v2    gt  Itis selected whether to enable or disable the function to change MIB by SNMPv1 and v2      Operational Setup of Authentication Function when writing using SNMPv3   gt  The security levels of authentication or skipping authentication is selected    gt  For the security levels  either  only authentication password  or  authentication password    privacy password  is available      Setup of the HDD encryption function   gt  Whether to activate or stop the function is selected    gt  An encryption passphrase is registered or changed when the function is activated      Setup of the user box collective management function   gt  It is selected whether to enable or disable this function      Setup of the print capture function   gt  A function to verify the print data received by MFP when the print function is faulty    gt  It is selected whether to enable or disable this function      Setup of the network setting management reset function   gt  This function resets a series of items to factory default values   gt  It is selected whether to enable or disable this function      Setup of the trusted channel  SSL TLS encryption communications  function   gt  SSL TLS server certificates are generated or imported   
181. rationell                          Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   56 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo                    364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  modify   lassignment  the authorized identified roles       User    Administrator  Hierarchical to   No other components  Dependencies   EMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 3    FMT_MTD 1 3  Management of TSF data  FMT_MTD 1 1 3        The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  Let of TSF data  to  assignment  the authorized identified roles    l assignment  list of TSF datal      User ID    Account ID    Account password    Secure print password    System auto reset time    Threshold Number of authentication failure    External server authentication setting data    S MIME certificate     Belonging Account of User    Release time of operation prohibition for Administrator authentication    Encryption passphrase    SNMP password    TSI receiving setting data   selection  change_default  query  modify  delete  clear   assignment  other operationell   Modify   assignment  the authorized identified roles     Administrator  Hierarchical to   No other components  Dependencies FMT_SMF 1  FMT_SMF 1    FMT
182. rations     1 4 3  Logical Scope of TOE    Users use a variety of functions of TOE from the panel and a client PC via the network   Hereafter  this section explains typical functions such as the basic function  the user box function  to manage the image files stored  the user identification and authentication function  the  administrator function manipulated by administrators  the service engineer function  manipulated by service engineers  and the function operated in the background without user s    awareness   1 4 3 1  Basic Function    In MFP  a series of functions for the office work concerning the image such as copy  print  scan   and FAX exists as basic functions  and TOE performs the core control in the operation of these  functions  It converts the raw data acquired from the external device of the MFP controller into  image files  and stores them in RAM and HDD   For print image files from client PCs  multiple  types of conversion are applied   These image files are converted into data to be printed or sent   and transmitted to the device outside of the MFP controller concerned    Operations of copy  print  scan  and FAX are managed by the unit of job  so that operation  priority can be changed  finishing of print jobs can be changed  and such operations can be  aborted  by giving directions from the panel     The following is the functions related to the security in the basic function       Secure Print Function  When a Secure Print password is received together wit
183. rd     User password     Account password      Secure print password     User Box password     lt Type B  Object to which restoration should be limited gt    A series of data that relates to SMTP server setting   A series of data that relates to DNS server setting   A series of data that relates to MFP address setting   Operation setting data of SNMP password authentication function  Setting data of Enhanced Security function   Setting data of operation method of user authentication function  Operation setting data of account authentication function  Authentication failure frequency threshold of authentication operation prohibition function  System auto reset time   User ID   User attribute of user box   Account ID   S MIME certificate   Transmission address data   Encryption strength setting data in S MIME function   SSL certificate   Belonging Account of user   Release time of operation prohibition for Administrator authentication  PC FAX reception setting   TSI receiving setting data    External server authentication setting data     lt Type C  Object to which back up should be limited gt     Secure print file     User box file   e ID  amp  print file    As described above  FDP_ACC 1 1   FDP_ACC 1 2   FDP_ACC 1 3   FDP_ACC 1 4    FDP_ACF 1 1   FDP_ACF 1 2    FDP_ACF 1 8   FDP_ACF 1 4   FMT_MOF 1 1    FMT_MOF 1 2     FMT_MOF1 3   FMT_MSA 1 1    FMT_MSA 1 2    FMT_MSA 1 3   FMT_MTD 1 2     FMT_MTD 1 3    FMT_MTD 1 4    FMT_MTD 1 7   FMT_SMF1 and FMT_SMR 1 2  are  realized   
184. re A2XKOY0 0100 G00 56 Security Target       the subset of FMT_MOF 1 3  and the settings do not compete      lt Necessary requirement to keep the administrator secure gt    gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt    gt  refer to set service     lt Role and controlling function for each management gt    As the role of doing these managements  FMT_SMR 1  2  maintains an administrator and  FMT_SMR 1  6  maintains a user permitted the use of the group user box  FMT_SMF 1  specifies these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O SECURE PRINT  Access control of secure print file and ID  amp  print file   These security objectives explain the policy for the secure print file   First  for secure print file  this security objective limits the print of the secure print file only  for the user  who is permitted the use of the secure print file  and requires various    requirements that relate to the access control      lt Secure print file access control gt    After the user has been identified and authenticated  the user ID is associated with the task  of acting a use by FIA_ATD 1 and FIA_USB 1  FDP_ACC 1  2  and FDP_ACF 1  2  permits  the list display operation of every secure print file to the task of acting the user who has user  ID    As it must be a user who is permitted the use of the secure print file to print it  FLA_UID 2  4   and FIA_U
185. red as user box files  e Image file that will be stored as secure print files  e Image files that will be stored as ID  amp  print files    O CRYPTO MAIL  The use of encrypted mail   TOE provides the function that encrypts and transmits the user box file transmitted from MFP  to the correct destination with e mail     O FAX CONTROL  Fax unit control   TOE provides the control function that prohibits an access to internal network which the MFP    connects with  from public line via the Fax public line portal     O AUTH CAPABILITY  The support operation to utilize user authentication function   TOE supports the necessary operation to utilize the user authentication function by user    information management server using Active Directory     O CRYPTO CAPABILITY  The support operation to utilize HDD encryption function   TOE supports necessary mechanical operations to utilize the HDD encryption function by  ASIC    O AUDIT LOGGED  Acquisition and management of Audit log   TOE maintains the generation of the audit log related to all authentication functions and jobs        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   24 115    bizhub COS    brtzbub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       necessary to be audited  And  it provides the function to protect the audit log from a person who  do
186. red sufficiently        T ACCESS GROUP BOX  Unauthorized access to a group user box using user function   This threat assumes the possibility that an unauthorized operation is performed by using the  user function for the group user box that is a storage area of image file used by user who is  permitted the use of the account  or the user box file in it   O REGISTERED USER assumes that TOE permits only the user who succeeded the  identification and authentication to use MFP installed TOE  furthermore  the operation of  the group user box and user box file in the group user box is restricted only to the permitted  user by O GROUP BOX  so that the possibility of the threat is removed  When the external  user information management server is used  the possibility of the threat is reduced because  the user identification and authentication is operated through O AUTH CAPABILITY  supporting the operation for the user authentication function by the user information  management server of Active Directory and through OE SERVER setting to use the user  management by Active Directory by the administrator   OE  SETTING SECURITY performs the setting along with the description of guidance  including the enhanced security function  and the operation related to the maintenance  and  OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and account s authentication  and  OE SESSION also requires the log off operati
187. rint file or an ID  amp  print file and the transmission of a user box file   making in the preparation for the threat thought when unauthorized MFP or mail server is  connected by any chance  or when operational setup of PC FAX is changed even if without  unauthorized MFP  the setting of MFP  IP address  transmission address data etc   and  operation setting of PC FAX require not to be modified illegally  Therefore  the setting of MFP   IP address  transmission address data etc   and operation setting of PC FAX are considered as  subsidiary protected assets     On the other hand  when the stored data have physically gone away from the jurisdiction of a  user  such as the use of MFP ended by the lease return or discard  or the case of a theft of HDD   the user has concerns about leak possibility of every remaining data  Therefore  in this case  the  following data files become protected assets     e Secure Print File  e ID  amp  print File  e User Box File  e Stored Image File   gt  Stored image files other than secure print file  user box file  or ID  amp  print file  e HDD remaining Image File   gt  The file which remains in the HDD data area that is not deleted only by general  deletion operation  deletion of a file maintenance area   e  Image related File       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   19 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  4
188. rresponding to the key  management is explained by using not the security  requirement that is showed in the dependencies  but other security requirement  so that it s no  problem even if this dependency is not satisfied      lt The reason not apply FCS_CKM 4 gt   The encryption key temporarily exists in the volatile  memory area  but there is no necessity of the  encryption key cancellation since it is automatically  destroyed without the necessity of access from the  outside     FDP_ACC 1 1  FDP_ACF1 FDP_ACF1 1   FDP_ACC 1 2  FDP_ACF1 FDP_ACF 1 2   Cop wright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   83 115          bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Functional  Requirements  Component for    this ST  FDP_ACC 1 3   FDP_ACC 1 4   FMT_MSA 3 FMT_MSA 3 1   FMT_MSA 3 3   FMT_MSA 3 FMT_MSA 3 2   FDP_ACC 1  FDP_ACC 1 3   FMT_MSA 3  FDP_ACF 11 3   lt The reason not to apply FMT_MSA 3 gt   There is no necessity for applying this requirement  because the object attribute doesn t exist   FDP_ACC 1  FDP_ACC 1 4   FMT_MSA 3 FMT_MSA 3 4   FDP_IFC 1 FDP_IFF1 FDP_IFF1    FDP_IFC 1  FDP_IFC 1  FMT_MSA 3    Dependencies on CC Part 2 Dependencies Relation in this ST    FDP_ACF 1 1    FDP_ACF 1 2    FDP_ACF 1 4        FDP IFF 1  lt The reason not to apply FMT_MSA 3 gt    There is no n
189. rver  that administrator sets     As described above  FMT_MTD 1 15   FMT_SMF 1  FMT_SMR 1 2   and FPT_STMl1are  realized     7 1 3 23  All Area Overwrite Deletion Function    All Area Overwrite Deletion Function executes the overwrite deletion in the data area of HDD   and initializes the settings such as passwords on NVRAM and SSD as well  The object for the  deletion or the initialization is as follows      lt Object for the deletion   HDD gt   Secure print file   User box file   ID  amp  print file   Stored image file   HDD remaining image file  Image related file  Transmission address data file  User ID   User password    User box password      Secure print password     Account ID      Account password     S MIME certificate      SSL certificate     lt Object for the initialization  NVRAM  SSD gt      Administrator Password     SNMP password     Encryption passphrase     Encryption Passphrase is deleted  and the  operational setting of HDD encryption function is  turned OFF        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   98 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    The deletion methods such as the data overwritten in HDD and the writing frequency is  executed according to the deletion method of the overall area overwrite deletion function set by  F ADMI
190. se multiple functional    requirements     e O CONFIG  Access limitation to an management function   This security objective limits the setting related to the SMTP server  the setting related to the  DNS server  the setting related to the Enhanced Security function  the backup function  and  the restorations function to the administrator  and needs various requirements to limit the    access to a series of setting function and the management function      lt Management of network setting gt    When the administrator attribute is associated with the task of substituting the use   FDP_ACC 1 3  and FDP_ACF 1 3  permits the task of substituting the user to operate the  setting of SMTP server group object  DNS server group object  MFP address group object   PC FAX reception setting object  and transmission address data object      lt Operation limitation of Backup and restoration function gt   When the administrator attribute is associated with the task of acting the use by FIA_ATD 1  and FIA_USB 1  the task of acting the user is permitted the back up operation of        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   76 115    bizhub COS    brtzbub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target      the user box files be FDP_ACC 1  1  and FDP_ACF 1  1       the secure print files by FDP_ACC 1  2  and F
191. ser attribute with this  account ID    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized     7 5 3 2  Access Control Function to User Box File in Group User Box    When the user box to operate is selected   User Box ID  of the user box is associated with the  task as a user box attribute in addition to the user attribute  This task is permitted  to the user  box file with the user box attribute corresponding to the user box attribute of subject attribute   the printing  the E mail transmission  include the S MIME transmission   the FTP transmission   the FAX transmission  the SMB transmission  WebDAV transmission  download  the removing  to other user boxes  the copy operations to other user boxes  and the copy operations to an  external memory    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1  1  and FDP_ACF 1 1  are realized     7 5 3 3  User Attribute Change of Group User Box    The user attributes can be changed      If another account ID is specified  it becomes a group user box that the user of another  Account Name can access      If public is specified  it becomes a public user box  It is necessary to register the user box  password  In this case  it is verified that the user box password satisfies the following  requirements    gt  It is composed of the characters and by the number of digits shown in the user box  password of the Table 13    gt  It shall not be composed of one kind of character     Specify a registered user  an
192. signment  necessary capability list for the operation of security service    assignment  security service provided by IT environment entity      HDD encryption function achieved by ASIC   assignment  necessary capability list for the operation of security service      Support function of the image file processing by HDD encryption function                      Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   66 115             bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo              364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  Hierarchical to   No other components  Dependencies   No dependencies             6 1 2  TOE Security Assurance Requirements    The TOE is a commercial office product that is used in a general office environment  and  therefore a TOE security assurance requirement that is required for EAL3 conformance  which  is a sufficient level as an assurance for commercial office products  is applied  The following table    summarizes the applied TOE security assurance requirements     Table 9 TOE Security Assurance Requirements    TOE Security Assurance Requirements Component          Security architecture description ADV_ARC 1  ADV  Development Functional specification with complete summary   ADV_FSP 3  Architectural design ADV_TDS 2    Operational user guidance AGD_OPE 1  Preparative procedures AGD_PRE 1 
193. signment  other actions to be taken in case of audit storage failurel              none  Hierarchical to   No other components  Dependencies   FAU_STG 1          FPT_STM 1 Reliable time stamps                FPT_STM 1   The TSF shall be able to provide reliable time stamps   Hierarchical to   No other components  Dependencies   No dependencies       6 1 1 8  Extension  Capability of Using IT Environment Entity    FIT_CAP 1 1  Capability of using security service of IT environment entity    FIT_CAP 1 1 1   TSF shall provide the necessary capability to use the service for  assignment security service provided  by IT environment entity      assignment  necessary capability list for the operation of security service    assignment  security service provided by IT environment entity     User authentication function of user information management server using Active Directory   assignment  necessary capability list for the operation of security service       Inquiry function of authentication information for the identification and authentication target user    Acquirement function of authentication information for the identification and authentication target                   user  Hierarchical to   No other components  Dependencies   No dependencies  FIT_CAP 1 2  Capability of using security service of IT environment entity  FIT_CAP 1 1 2        TSF shall provide the necessary capability to use the service for  assignment  security service provided  by IT environment entity      as
194. sion and reception such  as a user box file  a secure print file  and an ID  amp  print file  and the requirement that relates  with the Trusted Channel is necessary  FTP_ITC 1 generates the Trusted Channel according  to the requirement from the other Trusted IT product  and it is applied to the transmission  and reception  such as the user box file  the secure print file  and the ID  amp  print file   This security objective is satisfied by this functional requirement     e O CRYPTO MAIL  Usage of Encryption mail    This security objective regulates the encryption of a user box file when transmitting the user  box file by e mail  and various requirements related to the encryption are necessary   FCS_CKM 1 generates the encryption key  128  168  192 or 256 bits  by using Pseudorandom  number Generation Algorithm according to FIPS 186 2    FCS_COP 1 encrypts the user box file by using AES  encryption key  128  192 or 256 bits  of  FIPS PUB 197  it becomes a transmission data of S MIME   Also  the same requirement  encrypts the user box file by using 3 Key Triple DES  encryption key  168 bits  of SP800 67        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   79 115    bizhub COS    brtzbub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        By the same token  it becomes a transmission data of S MI
195. ss request to each secure print file      Provides the secure print authentication mechanism that is authenticated by the secure  print password that consists of the character shown in Table 13      The secure print authentication mechanism by the separate session information is not  needed because it becomes only an access from the panel in the case of the secure print         for each character as feedback for the entered secure print password     Return  Resets the number of authentication failure when succeeding in the authentication     The access from the panel is not accepted for 5 seconds when the authentication is failed     When the authentication failure that becomes the 1 3 times in total for the secure print file  concerned is detected  the authentication function to the secure print file is locked    gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function    The lock is released by the lock release function to the secure print file of FADMIN  executed    As described above  FIA_AFL 1 5   FIA_AFL 1 8   FIA_UAU 2 3   FIA_UAU 7 and   FIA_UID 2 4  are realized     7 6 1 2  Access Control Function to Secure Print File    The secure print file access control operates when it is authenticated     The task to act for the user who is identified and authenticated has the authenticated  secure print internal control ID as the file attribute     This task is permitted the printing to the secure print f
196. t  other audit relevant information    Listed in    Table 8 Auditable events list     Hierarchical to   No other components  Dependencies   FPT_STM 1                                  Table 8 Auditable events list    Auditable events Relevant functional Audit Level Additional Information  requirement  Start and end of job FDP_ACE1 not specified Type of job    necessary to be audited     Success or failure of all FIA_UAU 2  authentication functions             Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   64 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo        364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  en    FAU_GEN 2 User identity association      FAU_GNE 2 1       For audit events resulting from actions of identified users  the TSF shall be able to associate each  auditable event with the identity of the user that caused the event   Hierarchical to   No other components  Dependencies   FAU_GEN 1  FIA_UID 1  FIA_UID 2 1   FIA_UID 2 2   FIA_UID 2 3   FIA_UID 2 4    FIA_UID 2 5   FIA_UID 2 6      FAU_SAR 1 Audit review    FAU_SAR 1 1  The TSF shall provide  assignment  authorised users  with the capability to read  assignment  Jet of  audit information  from the audit records    assignment  authorised users                     Administrator        assignment  list of audit information    Audit log listed in    T
197. t  the authorized identified roles    lassignment  list of TSF datal     Date and time information              selection  change_default  query  modify  delete  clear   assignment  other operationell                 modify  lassignment  the authorized identified roles    Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2                0 A user who isn t related with an account name  and who was informed of the account password for the account  ID from the administrator off line        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   60 115    bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo     364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       amp             ana   xeer             a anaee erRaQEecaEraanNnnanaDnan tran      an     l_    n aa seaaeanqn na n nnannnzzzxRaEq T   V       Vua       E E E    _   _         __   _j     yI1  Bi MEI ification of M ment Function       EMT_SME 1 4       The TSF shall be capable of performing the following management functions   assignment  er of  management functions to be provided by the TSF    assignment  list of management functions to be provided by the TSF       Stop Function of Enhanced security function by administrator     Operation setup function of ID  amp  print function by administrator     Operation Method 
198. t function  F SUPPORT CRYPTO   ASIC support function  F OVERWRITE HDD data overwrite deletion function  F AUDIT LOGGED Audit log function       7 1  F ADMIN  Administrator Function     F ADMIN is a series of security function that administrator operates  such as an administrator  identification authentication function in an administrator mode accessing from a panel or  through a network  and a security management function that includes a change of an  administrator password and a lock cancellation of a locked user box   Nevertheless  all functions  are not feasible functions through both a panel and a network      7 1 1  Administrator Identification Authentication Function    It identifies and authenticates the accessing user as the administrator in response to the    access request to the administrator mode       Provides the administrator authentication mechanism authenticating by the administrator  password that consists of the character shown in Table 138    gt  Provides the administrator authentication mechanism using the session information  besides the administrator password  after the administrator is authenticated to the access  from the network    gt  According to protocol  use the session information of more than 101    or generate and use  the session information more than 101     e Return     for each character as feedback for the entered administrator password     Resets the number of authentication failure when succeeding in the authentication        Copyright 
199. t uses MFP  A responsible person of the organization that manages the office where the MFP is installed   Assigns an administrator who manages the operation of MFP       Responsible person of the organization that manages the maintenance of MFP  A responsible person of the organization that manages the maintenance of MFP  Assigns    service engineers who manage the maintenance of MFP     Besides this  though not a user of TOE  those who go in and out the office are assumed as  accessible persons to TOE        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   7 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       1 4 2  Physical Scope of TOE  1 4 2 1  Use Environment    Figure 1 shows a general environment in which the usage of MFP equipped with TOE is  expected  Moreover  the matters expected to occur in the use environment are listed below                  Office  MFP        SMTP Server DNS Server FTP Server                                                                                                                                                     Public line  External Network                                                 User Information  Management    S Server  Client PC WebDAV Server                      Figure 1 An example of MFP   s use environments    An i
200. ted channel for  assignment   st of functions for which  a trusted channel is required                     assignment   et of functions for which a trusted channel is required    Download of the user box file     Upload of the image file that will be stored as a user box file     Upload of the image file that will be the secure print file       Upload of the image file that will be the ID  amp  Print file   Hierarchical to   No other components  Dependencies   No dependencies                   6 1 1 7  Security Audit    FAU_GEN 1 Audit data generation    FAU_GEN 1 1  The TSF shall be able to generate an audit record of the following auditable events   a  Start up and shutdown of the audit functions   b  All auditable events for the  selection  choose one of  minimum  basic  detailed  not specified  level of  audit  and  c  lassignment  other specifically defined auditable events     selection  choose one of  minimum  basic  detailed  not specified   not specified   assignment  other specifically defined auditable events   Listed in    Table 8 Auditable events list     FAU_GEN 1 2  The TSF shall record within each audit record at least the following information   a  Date and time of the event  type of event  subject identity  if applicable   and the outcome  success or  failure  of the event  and  b  For each audit event type  based on the auditable event definitions of the functional components  included in the PP ST   assignment other audit relevant information     assignmen
201. the audit log from a person who does not have the authority of disclosure or change   and a person who has the authority could access the audit log   O AUDIT LOGGED regulates that it maintains the generation of the audit log related to all  authentication functions and jobs  necessary to be audited  and it provides the function to  protects the audit log from a person who does not have the authority of disclosure or change   Also  the administrator is regulated the followings  OE AUDIT_STORAGE PROTECTED  protects the audit log from access  deletion and change by a person who does not have the  operation authority of the exporting log to reliable IT products   OE AUDIT_ACESS AUTHORIZED manages that only a person who has the operation  authority of the exporting log to reliable IT products can access  And OE AUDIT REVIEWED  carries out the examination of the audit log at appropriate intervals to detect the compromise  and abnormal condition  so that O AUDIT LOGGED is supported   Accordingly  this organizational security policy is achieved     5  Extended Components Definition  5 1  Extended Function Component    In this ST  three extended function components are defined  The necessity of each security  function requirement and the reason of the labeling definition are described     e FIT_CAP 1  This is the security function requirement for regulating the necessary ability for TOE to use  effectively the security function of the external entity  IT environment    gt  Necessity o
202. to which access is locked  the lock is released     Reset  clear all  the number of times of authentication failure of each account    gt   Ifthere is a user account to which access is locked  the lock is released     Reset  clear all  the number of times of authentication failure of SNMP password    gt  Ifthe access to a MIB object is locked  the lock is released     As described above  FIA_AFL 1  3   FIA_AFL 1 4   FIA_AFL 1 5   FIA_AFL 11 6   and  FIA_AFL 1 7  are realized     7 1 8 5  Setup of User Authentication Function    Set the following authentication method in a user authentication function   e Machine authentication  Authentication method which utilizes a user password managed on  MFP sides      External server authentication   Authentication method which utilizes a user password  managed with a user information management server connected through a network  Only  Active Directory method is object    gt  When external server authentication is used  the external server authentication setting  data  Contain the multiple authentication server information  such as domain name to  which external server belongs  needs to be set   Set the following authentication method in the account authentication function used with a    user authentication function        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   92 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454 
203. total in each authentication  function by using the CE password is detected  it logouts the service mode accessing from the  panel  and locks all the authentication functions to use the CE password   The access to the  service mode is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function    e The F  RESET function unlocks the authentication function       It verifies that the CE password newly set satisfies the following qualities    gt  It is composed of the characters and by the number of digits  shown in the CE password of   the Table 13    gt  It shall not be composed of one kind of character    gt  It shall not be matched with the current value   As described above  FIA_AFL 1 1   FIA_SOS 1 1   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1 9    FMT_SMF 1 and FMT_SMR 1 1  are realized        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   101 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       7 3 2 2  Change of Administrator Password    Change the administrator password  Verify that the administrator password newly set  satisfies the following qualities     It is composed of the characters and by the number of digits  shown in the administrator  password of the Table 13     It shall not be com
204. trator function       S MIME certificate automatic registration function  It is the function to register the certificate for S MIME  conforms to ITU T X 509  with each  transmission address automatically  When a certificate is attached in received e mail  MFP  recognizes user ID according to the information of e mail header  and registers the  certificate as certificate of the same user ID       HDD data overwrite deletion function  The overwrite deletion is executed to the data area of image unnecessary in HDD  The  deletion pattern is set in the administrator function        Audit log function  It is the function to generate the log  which is audit log  and store them in HDD  when the  event for audit occurred  The operation of the log is limited only to the administrator and  the export and the deletion of log can be performed     The standard is that MFP is not installed Fax unit and does not have a port of Fax public line   so there is not the access to the internal network through MFP  TOE provides the following  function  provided that Fax unit is installed in MFP        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   16 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target        J Fax unit control function  TOE prohibits access to the internal network  where MFP was con
205. trolled objects using controlled operations on controlled objects     assignment  rules governing access used for controlled operations to controlled objects among controlled  subjects and controlled objects     A task to act for a user is permitted to list and print the ID  amp  print file whose user attributes of the  object attributes are equal to those of the subject attributes  user ID    FDP_ACF 1 3 4   The TSF shall explicitly authorise access of subjects to objects based on the following supplemental rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects     assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects   A task to act for a user with the administrator attributes is permitted to back up ID  amp  print files   FDP_ACF 1 4 4   The TSF shall explicitly deny access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly deny access of subjects to object    assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                                      None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 4     FMT_MSA 3  FMT_MSA 3I 4    FDP_IFC 1 Subset information flow control  FDP_IFC 1 1       The TSF shall enforce the  assignment  information flow control SFP on lassignment  List of subjects     information  and 
206. tup of Auto Logout Function    The system auto reset time which is the setting data of the auto logout function should be set  within the following time range       System auto reset time   1 9 minutes  As described above  FMT_MTD 1  3   FMT SMF 1 and FMT_SMR 1 2  are realized     7 1 3 8  Network Setup    A setup operation of the following setting data is performed      A series of setup data that relates to SMTP server  IP address  Port Number  etc       A series of setup data that relates to DNS server  IP address  Port Number  etc      A series of setup data that relates to MFP address  IP address  NetBIOS Name  AppleTalk  Printer Name  etc    As described above  FDP_ACC 1 3  and FDP_ACF 1 3  are realized     7 1 3 9  Execution of Back up and Restoration Function    All the setting data stored in NVRAM  SSD and HDD are backed up and re stored except the  administrator password  the CE password  and encryption passphrase  As the object related to  security  due to the relation of confidentiality and completeness  the one shown by the following    classifications is targeted        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   93 115    bizhub COS    brtzbub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target     lt Type A  Object to which back up and restoration should be limited gt     SNMP passwo
207. uded       SNMP Password Selectable from 90 or more characters in total      Privacy Password  Alphabet  numeric  and symbols  Some are not included        Authentication Password       Encryption passphrase Selectable from 83 or more characters in total   Alphabet  numeric  and symbols  Some are not included      7 1 2  Auto Logout Function of Administrator Mode    While accessing an administrator mode from a panel  if not accepting any operation during the  panel automatic logout time  it logs out the administrator mode automatically   As described above  FIA_SSL 3 is realized     7 1 8  Function Supported in Administrator Mode    When a user is identified and authenticated as an administrator by the administrator  identification authentication function at the accessing request to the administrator mode  the  administrator attribute is associated with the task substituting the user  And the following  operations and the use of the functions are permitted    As described above  FIA_ATD 1 and FIA_USB 1 are realized           Table 12 shows the minimum password space as the security specification  Therefore  although some excluded  characters are shown depending on the password type  the excluded characters are permitted to use if possible        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   89 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ine
208. uery  modify  delete  clear   assignment  other operationell   query   assignment  the authorized identified roles     Administrator  Hierarchical to   No other components  Dependencies FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MTD 1 8  Management of TSF data    FMT_MTD 1 1 8    The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  list of TSF data  to  assignment the authorized identified roles    lassignment  list of TSF datal     Secure print password   selection  change_default  query  modify  delete  clear   assignment  other operationell     assignment  other operations    Registration    assignment  the authorized identified roles      User                                                 Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   58 115          bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo                       364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  Hierarchical to   No other components  Dependencies S FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 3    FMT_MTD 1 9  Management of TSF data  FMT_MTD 1 1 9        The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authoriz
209. unction       Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   23 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    e The setting function of Trusted Channel function setting data  e The setting functions of certificates  transmission address data  etc used for the S MIME  function    e The setting function of TSI receiving   e The setting function of PC FAX reception   e Counter management function   e Al area overwrite deletion function  TOE permits the operation of the following functions only to the administrator and the service  engineer    e The function related to the setting of Enhanced Security function    O OVERWRITE  Overwrite deletion   TOE overwrites image data regions of HDD in MFP with deletion data  and makes all image  data unable to restore     O CRYPT KEY  Encryption key generation   TOE generates an encryption key to encrypt and store all the data written in the HDD in the  MFP including image files     O TRUSTED PATH  The use of Trusted Channel   TOE provides the function that communicates via Trusted Channel the following image file   which is transmitted and received between MFP and client PC    lt  Image file transmitted from MFP to client PC  gt   e User box file   lt  Image file transmitted from client PC to MFP  gt   e Image file that will be sto
210. unction corresponds to the modification function of TSF data     Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   61 115      Setting function of authentication failure frequency threshold by administrator in the authentication             bizhub C554   bizhub C454   bizhub C364   bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target            Overwrite function for the default value of the user attribute of the user box by the user      Operation method setting function of user   s own account authentication function when method of  account authentication is set for each user by user     Modification function of user password when method of user authentication is machine  authentication by user     Registration function of user box password by user     Modification function of user attribute of user box by user     Registration function of Belonging Account of user oneself by user who is permitted the use of the  account     User box registration function by user     Automatic Personal user box registration function by user box stored job that specifies unregistered  box by user     Machine non registered users    user ID automatic registration function with external server when  user authentication method is external server authentication     Registration function of secure print password according to secure print file r
211. unctions    lassignment  list of TSF functions       Administrator authentication  Access through the network     User authentication  Access through the network     User box authentication  Access through the network   Hierarchical to   No other components                         Dependencies   No dependencies          Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   48 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo        364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target  oC      FIA_UAU 1 1  Timing of authentication      FIA_UAU 1 1 1        The TSF shall allow  assignment  list of TSF mediated actions  on behalf of the user to be performed  before the user is authenticated    assignment  list of TSF mediated actions   Confirm the stopped state of user   s use  Method of user authentication  Machine authentication  only   FIA_UAU 1 2 1   The TSF shall require each user  User  to be successfully authenticated before allowing any other  TSF mediated actions on behalf of that user  User    Hierarchical to   No other components  Dependencies   FIA_UID 1 FIA_UID 2 3      FIA_UAU 1 2  Timing of authentication    FIA_UAU 1 1 2   The TSF shall allow  assignment  list of TSF mediated actions  on behalf of the user to be performed  before the user is authenticated   lassignment  List of TSF mediated actions    Confirm the stopp
212. ut time   it logs out from a user  identification and authentication domain automatically        Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   104 115    bizhub C554  bizhub C454  bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       As described above  FTA_SSL 3 is realized   7 4 4  Modification Function of User Password    When the identification and authentication are succeeded  and the access to the user  identification and authentication domain is permitted  the user is permitted to change its own  password  When the external server authentication is effective  this function cannot be applied    The user password is changed when it is re authenticated that the user is a user and the newly  setup password satisfies the quality      Provides user authentication mechanism that is authenticated the user by the user   password that consists of the characters shown in Table 13      Resets the number of authentication failure when succeeding in the re authentication      Return         for each character as feedback for the entered user password  in the case of access   from the panel at the re authentication      When the authentication failure that becomes 1 3 times at total for the concerned account is  detected by each authentication function utilizing the user password  all the authentication  funct
213. y the login of the public user box  Deny the change operation of the user box  password of the public user box      gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function        The lock of the authentication function is released by the lock release function to the public  user box of FADMIN executed      Changed when the user box password newly set satisfies the following qualities     gt  Itis composed of the characters and by the number of digits  shown in the user password of   the Table 13     gt  It shall not be composed of one kind of character     gt  This password is not matched to the currently setup password    As described above  FIA_AFL 1 6   FIA_SOS 1 1   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1I 4         Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   108 115    bizhub C554  bizhub C454 bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target       FMT_SMF 1  and FMT_SMR 1 4  are realized   7 5 3  Group User Box Function  7 5 3 1  Access Control Function for Group User Box    The task to act for the identified and authenticated user has the    Account ID  as the Account  Name that is associated with the identified and authenticated user  This task is permitted the  display of the list of the group user box which has a corresponding u
214. zed access to public user box which used a user function   Exposure of the user box file when a person or a user with malicious intent accesses the public  user box which is not permitted to use  and operates the user box file  such as copies  moves     downloads  prints transmits  and so on     T ACCESS GROUP BOX  Unauthorized access to the group user box which used a user  function   Exposure of the user box file when a person or a user with malicious intent accesses the group  user box which the account where a user does not belong to owns  and operates the user box  file  such as copies  moves  downloads  prints transmits  and so on     T ACCESS SECURE PRINT  Unauthorized access to the secure print file or ID  amp  print file by   utilizing the user function    e Secure print files are exposed by those malicious including users when he she operates   prints ete   ones to which access is not allowed    e ID  amp  print files are exposed by those malicious including users when he she operates  prints  etc   ones which were stored by other users     T UNEXPECTED TRANSMISSION  Transmission to unintended address    e Malicious person or user changes the network settings that are related to the transmission  of a user box file  Even an address is set precisely  a user box file is transmitted  the E mail  transmission or the FTP transmission  to the entity which a user does not intend to  so that  a user box file is exposed     lt The network settings which are related to user b
215. zed identified roles    lassignment  list of functions     Enhanced Security Setting   selection  determine the behavior of  disable  enable  modify the behavior oft  disable   assignment  the authorized identified roles     Administrator    Service Engineer  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 1   FMT_SMR 1 2      FMT_MOF 1 2  Management of security functions behaviour    FMT_MOF 1 1 2   The TSF shall restrict the ability to  selection  determine the behavior of disable  enable  modify the  behaviour o   the functions  assignment  Jet of functions  to  assignment  the authorized identified  roles                            assignment  Jist of functions       User Authentication Function                Copyright c  2011 2012 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   52 115    bizhub C554   bizhub C454   bizhub C364  bizhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target            S MIME function    SNMP password authentication function    ID  amp  print function    HDD data overwrite deletion function    Audit log function   selection  determine the behavior of  disable  enable  modify the behavior o    modify the behavior of   assignment  the authorized identified roles   Administrator  Hierarchical to   No other components    Dependencies   FMT_SMF 1 FMT_SMF 1    FMT_SMR 1  F
216. zhub C284  bizhub C224   bizhub C7828   bizhub C7822   ineo  554   ineo  454   ineo   364   ineo  284   ineo  224 Control Software A2XKOY0 0100 G00 56 Security Target    Functional  Requirements  Component for   this ST    Dependencies on CC Part 2 Dependencies Relation in this ST     lt The reason not to apply FMT_MSA 1 gt    It is the concept of ID  amp  print that the object is a print  object to which only the person who stored it can  access  so it is not assumed that the object is  transferred to any other user  Consequently  it is not  necessary to change the value of the attribute when  the user performs operations other than store  so that  the management requirement is unnecessary    lt FMT_SMR 1 gt    The assignment of FMT_MSA 3 2 4  is not applicable   FMT_SMR 1 is the dependency that is set relating to    FMT_MTD 1 12     H ja lg ugi lag ig lg lg ig SS ii       MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1  MT_SMF 1   MT_SMR 1    ia    Bs       Ka  Pr    FMT_SMF 1   FMT_MTD 1113    FMT SMR 1   FMT_SMF 1   FMT_MTD 1 14  FMT SMR 1               the following and so there  plication   MT Ob  MT_SMR 1  MT Ob    2      hy  g          MT_SMF 1    MT_SMR 1 2    MT_SMF 1    MT_SMR 1 2   FMT_SMR 1 4   MT_SMF 1    MT_SMR  1 2   FMT_SMR 1 3   MT_SMF 1    MT_SMR 1 1   FMT_SMR 1 2   MT_SMF 1    
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
NO APARECIMENTO DE LESÕES POR ESFORÇOS REPETITIVOS    VHE IgM ELISA - MP Biomedicals    2III - 35mm    Copyright © All rights reserved. 
   Failed to retrieve file