Home
        Security Target - Common Criteria
         Contents
1.                                                                                                                     External Network                                     User Information  Management      Server  Client PC WebDAV Server                         Figure 1 An example of MFP   s use environments      An intra office LAN exists as a network in the office    e MFP is connected to the client PCs via the intra office LAN  and has mutual data  communications      When a SMTP  FTP  or WebDAV server is connected to the intra office LAN  MFP can carry  out data communications with these servers  too   The DNS service will be necessary when  setting a domain name of the SMTP FTP WebDAV server        It is also assumed to unify management of user IDs passwords in a server  In this case  TOE  can control access to the MFP by using the user registration information in the user  information management server      When the intra office LAN connects to an external network  measures such as connecting via  a firewall are taken  and an appropriate setup to block access requests to the MFP from the  external network is applied    e The intra office LAN provides a network environment that cannot be intercepted by office  operations including using switching hubs and installing wiretapping detectors      The public line connected with MFP is used for communications by Fax and the remote  diagnostic function        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights
2.                   None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 3     FMT_MSA 3  N A        FDP_ACF 1 4  Security attribute based access control    FDP_ACF 1 1 4     The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of the subjects and objects controlled under the indicated SFP  and for each  SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  Let of the subjects and objects controlled under the indicated SFP  and for each   SFP relevant security attributes  or named groups of SFP relevant security attributes    lt Subject gt   lt Subject attributes gt     Task substituting for a user  gt    User attributes  user ID      Administrator attributes   lt Object gt   lt Object attributes gt     ID  amp  print file  gt    User attributes  user ID               assignment  access control SFP    ID  amp  print file access control  FDP_ACF 1 2 4   The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment rules governing access among controlled subjects and  controlled objects using controlled operations on controlled objects     assignment  rules governing access used for controlled operations to controlled objects among controlled  subjects and controlled objects     A task substituting for a user is permitted to list and print the ID  amp  print file w
3.        assignment  the authorised identified roles   User  FMT_SMR 1 2 3   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2 3       FMT_SMR 1 4  Security roles    FMT_SMR 1 1 4   The TSF shall maintain the roles  assignment  the authorised identified roles                                  assignment  the authorised identified roles     User who is authorized to use that public user box  FMT_SMR 1 2 4   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2 5      FMT_SMR 1 5  Security roles    FMT_SMR 1 1 5   The TSF shall maintain the roles  assignment  the authorised identified roles                                  assignment  the authorised identified roles   External server  FMT_SMR 1 2 5   The TSF shall be able to associate users with roles                       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   62 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c          Control Software AOEDOYO0 0100 GMOo 12 Security Target  Hierarchical to   No other components  Dependencies   FIA_UID 1  FIA_UID 2I7               FMT_SMR 1 6  Security roles    FMT_SMR 1 1 6   The TSF shall maintain the roles  assignment  the authorised identified roles     assignment  the authorised identified roles   The user who 
4.       assignment  Jet of standards     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes         assignment  cryptographic key generation algorithm     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes         assignment  cryptographic key sizes     Listed in  Table  Cryptographic key generation  Relation of Standards Algorithm Key sizes        Hierarchical to   No other components  Dependencies  gt   FCS_CKM 2 or FCS_COP 1  FCS_COP 1  FCS_CKM 4  N A                 Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   36 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AOEDOY0 0100 GMOo 12    Security Target       Table 2 Cryptographic Key Generation     List of Standards    FIPS 186 2    Relation of Standards Algorithm Key sizes    Cryptographic Key Generation Algorithm Cryptographic Key sizes    Pseudorandom number Generation Algorithm   128 bits      192 bits    168 bits    256 bits       Konica Minolta  Encryption    specification standard    Algorithm          Konica Minolta HDD Encryption Key Generation   128 bits       FCS _COP 1 Cryptographic operations    FCS _COP 1 1       The TSF shall perform  assignment  List of Cryptographic operations  in accordance with a specified  cryptographic algorithm  assignment  cryptographic algorithm  and cryptographic key
5.      Stop Function of Enhanced security function by administrator     Operation setup function of ID  amp  print function by administrator     Operation Method Setting Function of User Authentication Function by administrator     Operation Method Setting Function of Account Authentication Function by administrator     Operation Setting Function of SNMP password authentication function by administrator     Setting function of authentication failure frequency threshold by administrator in the authentication                   A user who isn t related with an account name  and who was informed of the account password for the account  ID from the administrator off line        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   60   111             bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          operation prohibition function     Backup Function by administrator 1       Restoration Function by administrator 1     Registration function of account ID by administrator     Modification function of account ID by administrator     Registration function of account password by administrator     Modification function of account password by administrator     Panel Auto Log otf Time Setting Function by administrator     Modification function of administrator password by administrator     Modification function of SNMP
6.     assignment  the authorized identified roles   Administrator   Hierarchical to   No other components    Dependencies   FMT SMF1  FMT _SMF1    FMT_SMR 1  FMT_SMR 1 2      FMT_MOF 1 3  Management of security functions behavior    FMT_MOF 1 1 3     The TSF shall restrict the ability to  selection  determine the behaviour of  disable  enable  modify the  behaviour off the functions  assignment  Jet of functions  to  assignment  the authorized identified  roles                         assignment  List of functions       Account Authentication Function    Trusted Channel Function    selection  determine the behavior of disable  enable  modify the behaviour oft  disable  modify the behavior of    assignment  the authorized identified roles                       Administrator  Hierarchical to   No other components  Dependencies     FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2         FMT_MSA 1 1  Management of security attributes    FMT_MSA 1 1 1     The TSF shall enforce the  assignment  access control SFP  information flow control SFP to restrict the  ability to  selection  change_default  query  modify  delete   assignment  other operationell the security  attributes  assignment  er of security attributes  to  assignment  the authorized identified roles     assignment  list of security attributes     User attributes of the user box that is set user s own  user ID    selection  change default  query  modify  delete   assignment  other operations     Modify  modify to other user
7.     gt   nm             FIA_UAU 2 1   FIA_UAU 2 2        FIA_UAU 2  FIA_UAU 2   FIA_UAU 2     FIA_UAU 2   FIA_UAU 2 I6    FIA_UAU 2 1   FIA_UAU 2 2   FIA _UAU 2I3    FIA_UAU 2 4   FIA_UAU 2 5   FIA_UAU 2I6        U  FIA_UID 2 2   FIA_UID 2 3     FIA_UAU 2 1   FIA_UAU 2 2   FIA _UAU 2I 3    FIA_UAU 2 4   FIA_UAU 2 5   FIA_UAU 2I6                    Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     81 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Functional  Requirements  Component for   this ST  FIA_UID 2 4  None    FIA_UID 2 5   N  FIA_     Dependencies on CC Part 2 Dependencies Relation in this ST    FIA UID 216   FIA_UID 2 7   FIA_USB 1 TA_ATD 1 TA_ATD 1    FIA_ATD     FMT_SMF 1  FMT_SMF 1    SE FMT_SMR 1 FMT_SMR 1 1   FMT_SMR  1 2    FMT_MOF 1 2  FMT_SMF 1  FMT_SMF 1   FMT _SMR 1 FMT_SMR 1 2    FMT_MOF 1 3  FMT_SMF 1  FMT_SMF 1   FMT _SMR 1 FMT_SMR 1 2     FMT_MSA 1 1  DP_ACC 1 or FDP_IFC 1   MT_SMF 1    MT_SMR 1   DP_ACC 1 or FDP_IFC 1  DP_ACC 1 1    MT_SMF 1  MT_SMF 1     F  F  F   FMT_MSA 1 2  F   F A   FMT_SMR 1 MT_SMR 1 2   FMT_SMR 1 4    F   F   F   F   F    DP_ACC 1 or FDP_IFC 1  DP_ACC 1 1    MT_SMF 1  MT_SMF 1   MT_SMR 1 MT_SMR 1 2   FMT_SMR 1I 6     MT_MSA 1  MT_MSA 1 1   FMT _MSA 1 2    FMT_MSA 3 1  MT_SMR 1 MT_SMR 1 3     Neither is applicable     FMT_MSA 1 3                  lt
8.    For all data written in HDD  an encryption key generated by F CRYPTO is set in ASIC  and  encryption is performed by the ASIC  On the other hand  for the encrypted data read out of the  HDD  the encryption key generated by F CRYPTO is set in ASIC in the same manner as above   and decryption is performed by the ASIC    As described above  FCS_CAP 1 2  is realized     7 15  RADMIN WebDAV  Administrator Function  Counter Management Function      F ADMIN WebDAV is the security function that identifies and authenticates administrator  when accessed via a network from a client PC using WebDAV  and permits only the  administrator who was identified and authenticated successfully to operate the counter  management function   The counter management function includes TSF data  This is described  in detail below      7 15 1  Identification and Authentication Function by WebDAV Server Password    It is identified and authenticated by the WebDAV server password that a user accessing via a  network using WebDAV is an administrator      The WebDAV authentication mechanism which authenticates the user by the WebDAV  server password consisting of the characters shown in Table 12 shall be usable     gt  For WebDAV  no separate mechanism to authenticate the administrator based on the  session information  but a WebDAV server password is used for each session      When re authentication has succeeded  the authentication failure frequency is reset      When authentication failure which results
9.    Registration  lassignment  the authorized identified roles                           User    Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 3         FMT_MTD 1 6  Management of TSF data    FMT_MTD 1 1 6   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  List of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF data     Administrator password   selection  change_default  query  modify  delete  clear   assignment  other operationell   modify   assignment  the authorized identified roles       Administrator    Service Engineer  Hierarchical to   No other components                               Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   58   111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target            Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR  1 1   FMT_SMR 1 2        FMT_MTD 1 7  Management of TSF data    FMT_MTD 1 1 7    The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF data     
10.    Remote diagnostic function  MFP   s equipment information such as operating state and the number of printed sheets is  managed by making use of the connection by aport of FAX public line  by a modem through  RS 232C or by E mail or WebDAV to communicate with the support center of MFP produced  by Konica Minolta Business Technologies  Inc  In addition  if necessary  appropriate services   shipment of additional toner packages  account claim  dispatch of service engineers due to  the failure diagnosis  etc   are provided       Updating function of TOE  TOE facilitated with the function to update itself  As for the update means  there are a  method that exists as one of items of remote diagnostic function  a method that downloads  from FTP server through Ethernet  TOE update function via Internet   and a method that  performs the connection of the memory medium such as USB memory       Encryption communication function  TOE can encrypt the data transmitted from client PC to MFP  and the data received by  download from MFP by using SSL TLS   The operational setup of this function is performed by the administrator function       S MIME certificate automatic registration function  It is the function to register the certificate for S MIME  conforms to ITU T X 509  with each  transmission address automatically  When a certificate is attached in received e mail  MFP  recognizes user ID according to the information of e mail header  and registers the  certificate as certificate of t
11.    SNMP password     User password     Account password     User box password     Secure print password     WebDAV server password                 selection  change_default  query  modify  delete  clear   assignment  other operationell   query   assignment  the authorized identified roles     Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MTD 1 8  Management of TSF data    FMT_MTD 1 1 8   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  List of TSF data  to  assignment  the authorized identified roles     assignment  List of TSF datal    Secure print password   selection  change_default  query  modify  delete  clear   assignment  other operationell   lassignment  other operations    Registration   assignment  the authorized identified roles                                              User  Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 3         FMT_MTD 1 9  Management of TSF data    FMT_MTD 1 1 9   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  Let of TSF data  to  assignment  the authorized identified roles     assignment  List of TSF datal      CE password    CE authentication lock time   selection  change_default  query  modify  delete  clear   assign
12.    assignment  list of TSF data       Account ID    Account password    S MIME certificate      Encryption passphrase   selection  change_default  query  modify  delete  clear   assignment other operationell    assignment  other operations    Registration   assignment  the authorized identified roles                   Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2         FMT_MTD 1 12  Management of TSF data    FMT_MTD 1 1 12    The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF data      Belonging Account of a user oneself   selection  change default  query  modify  delete  clear   assignment  other operationell     assignment  other operations    Registration   l assignment  the authorized identified roles     Administrator  the user who is permitted to use of the account                             Hierarchical to   No other components   Dependencies   FMT_SMF1  FMT_SMEF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 6    EMT_SMF 1 Specification of Management Functions   EMT_SMF 1 1       The TSF shall be capable of performing the following security management functions   assignment  List of  security management functions to be provided by the TSH    assignment  list of security management functions to be provided by the TSF   
13.    e The responsible person in the organization managing the maintenance of MFP educates a  service engineer in order to faithfully carry out the given role for the installation of the TOE   the setup of TOE and the maintenance of the MFP with TOE    e The administrator observes the maintenance work of MFP with TOE by a service engineer     OE NETWORK  Network Environment in which the MFP is connected    e The responsible person in the organization who uses MFP carries out the tapping prevention  measures by setting the cipher communications equipment and the tapping detection  equipment to the LAN of the office where MFP with TOE is installed    e The responsible person in the organization who uses MFP carries out the measures for the  unauthorized access from the outside by setting up the equipment such as the firewall to  intercept the access from an external network to MFP with TOE        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   25 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       OE FAX UNIT  Utilization of Fax unit   The service engineer installs Fax unit which is the oprional part on MFP and sets to utilize the    function of Fax unit     OE SECRET  Appropriate management of confidential information   The administrator has the user implement the following operation   e Keep the use
14.   FIA_UAU 2 1   FIA_LUAU 2 2   FIA_UAU 2 3   FIA_UAU 2 4    FIA_UAU 2 5    FIA_UAU 2 6      FIA_AFL 1 9  Authentication failure handling    FIA_AFL 1 1 9     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Let of authentication events       Authentication when accessing by WebDAV    Re authentication when changing the WebDAV server password   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of permissible values    Positive integer values of 1 to 3 that the administrator  can set  FIA_AFL 1 2 9    When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions     selection  met  surpassed    Met   assignment  List of actions      lt Action when it is detected gt    Deny access by WebDAV  and lock the authentication function which uses the WebDAV server   password    lt Operation for recovering the normal condition gt    Execute the erasure function of the number of times of authentication failure provided in the                                              administrator mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_
15.   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          The TSF shall allow the  assignment  the authorised identified roles  to specify alternative initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                 None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  N A    FMT_SMR 1  N A        FMT_MTD 1 1  Management of TSF data    FMT_MTD 1 1 1    When the  machine authentication  is selected as the User authentication method  The TSF shall  restrict the ability to  selection  change_default  query  modify  delete  clear  assignment  other  operations   the  assignment   ist of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF data     User password    selection  change_default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration    assignment  the authorized identified roles                         Administrator  Hierarchical to   No other components  Dependencies S FMT_SMEF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR  1 2         FMT_MTD 1 2  Management of TSF data    FMT_MTD 1 1 2     When the  machine authentication  is selected as the User authentication method  The TSF shall  restrict the ability to  selection  change_default  query  modify  delete  clear   assignment  other  operationell the  assignment  List of TSF data  to assignment  the authorized id
16.   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       use of functions such as F  BOX and F PRINT   7 4 1  User Identification and Authentication Function     lt Account Authentication  User identification and authentication in the synchronized method gt   When the access request for the user box and the request for the registration of the secure  print file  it is identified and authenticated to be a user  Account Name  account ID  is associated  with the concerned user ID that is set up beforehand besides the user ID for the identified and  authenticated user  and the use of FBOX and F PRINT is permitted to the identified and  authenticated user   e Return     for each character as feedback for the entered user password     Resets the number of authentication failure when succeeding in the authentication     Not accept the access from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total for the concerned user is  detected  it locks all the authentication functions to the user    gt  The administrator specifies the failure frequency threshold by the unauthorized  access detection threshold setting function     To release the lock of the authentication function is to perform the lock release function to the  user authentication of FADMIN   As described above  FIA_AFL 1 4   FIA_AFL 1 8   FIA_UAU 2 3   FIA UAU 7 and  FIA_UID 2 3  are realized      lt Account Authentication   Acco
17.   amp  print file when print data are registered by the ID  amp  print  function   e User Box file  An image file stored in the personal user box  public user box and group user box     As for a image file of a job kept as a wait state by activities of plural jobs  and a image file of a  job kept that prints the remainder of copies becoming as a wait state for confirmation of the  finish  and other than the image file dealt with the above mentioned is not intended to be  protected in the general use of MFP  so that it is not treated as the protected assets    In the print of a secure print file or an ID  amp  print file and the transmission of a user box file   making in the preparation for the threat thought when unauthorized MFP or mail server is  connected by any chance  or when operational setup of PC FAX is changed even if without  unauthorized MFP  the setting of MFP  IP address etc   and operation setting of PC FAX require  not to be modified illegally  Therefore  the setting of MFP  IP address etc   and operation setting  of PC FAX are considered as subsidiary protected assets     On the other hand  when the stored data have physically gone away from the jurisdiction of a  user  such as the use of MFP ended by the lease return or being disposed  or the case of a theft of  HDD  the user has concerns about leak possibility of every remaining data  Therefore  in this  case  the following data files become protected assets     e Secure Print File  e ID  amp  print File  e
18.   processing of TOE        ASIC  An integrated circuit for specific applications which implements an encryption function for  enciphering the data written in HDD     e HDD  A hard disk drive of 250GB in capacity  This is used not only for storing image data as files  but also as an area to save image data and destination data temporarily during extension    conversion and so on     e Main sub power supply  Power switches for activating MFP        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   9 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target    Panel  An exclusive control device for the operation of MFP  equipped with a touch panel of a liquid  crystal monitor  ten key  start key  stop key  screen switch key  etc     Scan unit automatic document feeder  A device that scans images and photos from paper and converts them into digital data     Printer unit  A device to actually print the image data which were converted for printing when receives a  print request from the MFP controller     Ethernet  Supports 1OBASE T  100BASE TX  and Gigabit Ethernet     USB   Copying image file to a USB memory  copying or printing image file from a USB memory   update of TOE  and so on can be performed through this interface  This is also usable as an  interface of the USB keyboard  option   to complement key entry f
19.   the entered password by the administrator s authentication and OE SESSION requires to  logoff after the operation ends  so that O CONFIG is supported sufficiently    Accordingly  this threat is countered sufficiently     e T ACCESS SETTING  Unauthorized change of function setting condition related to security   This threat assumes the possibility of developing consequentially into the leakage of the user  box files  secure print files  or ID  amp  print files by having been changed the specific function  setting which relates to security    O CONFIG regulates that only the administrator is permitted to perform the setup of the  enhanced security function that controls all setting function related to a series of security  and  so the possibility of the threat is removed    OE FEED BACK uses the application regulating that the feedback protected is returned for  the entered various passwords by the administrator s authentication  and OE SESSION is  also requested to logoff respectively after the operations of the administrator mode ends  so  that O CONFIG is supported sufficiently    Accordingly  this threat is countered sufficiently     e T BACKUP RESTORE  Unauthorized use of back up function and restoration function    This threat assumes a possibility that user box files  secure print files  or ID  amp  print files may  leak when the back up function or the restoration function is illegally used  Moreover  this  assumes that confidential data such as passwords might leak o
20.  0100 GMOo 12 Security Target    A series of data that relates to SMTP server setting   A series of data that relates to DNS server setting   A series of data that relates to MFP address setting   Operation setting data of SNMP password authentication function  Setting data of Enhanced Security function   Setting data of operation method of user authentication function  Operation setting data of account authentication function  Authentication failure frequency threshold of authentication operation prohibition function  Panel auto logoff time   User ID   User attribute of user box   User box ID   S MIME certificate   Transmission address data   Encryption strength setting data in S MIME function   Trusted Channel function setting data   Belonging Account of user   Administrator authentication lock time   PC FAX operation setting   TSI receiving setting data    External server authentication setting data     lt Type C   Object to which back up should be limited gt      Secure print file     User box file   e ID  amp  print file    As described above  FDP ACC UU FDP _ACC 1 2   FDP_ACC 1 3   FDP_ACC 1 4    FDP_ACF 1 1   FDP_ACF 1 2    FDP_ACF 1 8   FDP_ACF 1 4   FMT_MOF 1 1    FMT_MOF 1 2     FMT_MOF 113   FMT_MSA 1 1    FMT_MSA 1 2    FMT_MSA 1 3   FMT_MTD 1 2     FMT_MTD 1 3    FMT_MTD 114    FMT_MTD 1 7   FMT_SMF1 and FMT_SMR 1 2  are  realized         m     7 1 3 10  Operation Setup of Encryption Function     lt Operation Setting ON gt   When turning it ON from OFF  it verifi
21.  3 2 5  Function Related to Enhanced Security Function    The functions that influence the setting of the Enhanced Security function that the service  engineer operates are as follows   e HDD logical format function  Function to write the value of management data using the file system of HDD  The setting of  the Enhanced Security function is invalidated along with the execution of this logical format     HDD physical format function  A function to rewrite the entire disk in HDD with a regulated pattern including the signal  rows such as the track and sector information  The setting of the Enhanced Security function  is invalidated along with the execution of this physical format      Initialization function  Function to reset every setting value written in NVRAM to the factory default  The setup of  the Enhanced Security function is invalidated by executing this initialization function   As described above  FMT MOF 1 1   FMT _SMF1 and FMT_SMR 1 1  are realized     7 4  FUSER  User Function   FUSER identifies and authenticates the user for the use of MFP various function  To the    identified and authenticated user  it provides the management function of the user password  that is managed in the MFP at the time of machine authentication  besides the permission of the       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   98   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c 
22.  Able to select permission or prohibition      Setup of a TOE update function via Internet   gt  Able to select permission or prohibition     Setup of maintenance function   gt  Able to select permission or prohibition   e The format function of HDD   gt  A logical format and a physical format are executable   e Installation setting of HDD   gt  An explicit installation setting is necessary to use HDD as a data storage area   e Initialization function   gt  The various settings that the user or the administrator has set and the data that the user  has stored are deleted     1 4 3 7  Other Functions    TOE provides the functions that run background without awareness of the user and the  updating function of TOE  The following explains the major functions       Encryption key generation function  Performs encryption decryption by ASIC when writing data in HDD or reading data from  HDD   TOE does not process the encryption and description itself    The operational setup of this function is performed by the administrator function  When  activated  TOE generates the encryption key by the encryption passphrase that was entered       5 An abbreviation of Customer Service engineer       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   15 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       on the panel    
23.  Control Software AODEDOYO0 0100 GMOo 12 Security Target       4 3 2  Sufficiency of Assumptions  The security objectives for the assumptions are described as follows       A ADMIN  Personnel Conditions to be an Administrator   This condition assumes that administrators are not malicious   With OE ADMIN  the organization that uses the MFP assigns personnel who are reliable in  the organization that uses the MFP  so the reliability of the administrator is realized     e A SERVICE  Personnel Conditions to be a Service Engineer   This condition assumes the service engineer are not malicious   With OE SERVICE  the organization that manages the maintenance of the MFP educates the  service engineer  Also the administrator needs to observe the maintenance of the MFP  so that  the reliability of service engineers is assured     e A NETWORK  Network Connection Conditions for the MFP   This condition assumes that there are no wiretapping activities for the intra office LAN and  no access by an unspecified person from an external network   OE NETWORK regulates the wiretapping prevention by the installation of devices such as a  wiretapping detection device and device to perform the encryption communication on the  intra office LAN  It also regulates the unauthorized access prevention from external by the  installation of devices such as firewall in order to block access to the MFP from the external  networks  so that this condition is realized     e A SECRET  Operating condition concern
24.  Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   111 111    
25.  FMT_MTD 1 8  permits only to the user the registration of the secure print password used  for the authentication  FIA_SOS 1 1  verifies the quality of the secure print password     Next  for ID  amp  print file  this security objective limits the print of the ID  amp  print file only for  the user who registered that file  so that various requirements regarding access control are    necessary      lt ID  amp  print file access control gt   FDP_ACC 1 4  and FDP_ACF 1 4  permit the task substituting for a user with a user ID to  list and print the ID  amp  print file with the user attribute consistent with the user ID        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   73 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       For the user attribute set in the ID  amp  print file  the user ID of the user who registers the file  when the file is registered is set by FMT_MSA 3 4       lt Operation management of the ID  amp  print function gt   Management of this operation mode is limited only to the administrator by FAT_MOF 112       lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing th
26.  Image file that will be stored as Secure Print file  upload from client PC to MFP       Image file that will be stored as an ID  amp  print file  upload from client PC to MFP   As described above  FTP_ITC 1 is realized     7 11  KF S MIME  S MIME Encryption Processing Function     F S MIME is a function to encrypt the User box file when transmitting the User box file as  S MIME      lt User box file Encryption Key generation gt   The Encryption key is generated to encrypt the user box file by the pseudorandom number  Generation Algorithm which FIPS 186 2 provides   Encryption key length is 128  168  192 or 256  bits     As described above  FCS_CKM 1 is realized      lt Encryption of User box file  gt   It is encrypted by AES which FIPS PUB 197 provides by using encryption key  128  168 and 256  bits  to encrypt the user box file   It is encrypted by the 3 Key Triple DES which SP800 67 provides by using the encryption key  168  bits  to encrypt the user box file    As described above  FCS_COP 1 is realized      lt Encryption of User box file Encryption key gt   The encryption key to encrypt the user box file is encrypted by RSA which FIPS 186 2 provides   The key length of the encryption key used in this case is 1024  2048  3072 or 4096 bits    As described above  FCS_COP 1 is realized     7 12  FFAX CONTROL  FAX Unit Control Function     F FAX CONTROL is the function that prohibits an access to internal network connected to  MFP by TOE control    TOE controls the function th
27.  NT LAN Manager  An authentication method used in directory service that Windows NT  supports to uniformly manage user information in network environment of Windows platform        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   12 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       password set for each account ID   1 4 3 5  Administrator Function    TOE provides the functions such as the management of user boxes  management of user  information at the time of MFP authentication and management of various settings of the  network  image quality  etc in the administrator mode that only authenticated administrator can  manipulate     The following shows the functions related to the security       User registration management   gt  Registration or change of user IDs passwords  and deletion of users   gt  Change of the association between users and account IDs    Account registration management   gt  Registration or change of account IDs passwords     Management of user box settings   gt  Registration or change of user box passwords  and management of user attributes     Operational setup of automatic system reset   gt  Setup of the function that logs out automatically when the setting time passed   e Management of network settings   gt  Connection setting of the intra office LAN  setting of DNS serve
28.  Reserved   8 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       1 4 2 2  Operation Environment                                                                               MFP Controller  RS 232C  CPU RAM ASIC  Ethernet  NVRAM Flash Memory  USB  TOE HDD   USB keyboard   Message data   USB Memory et    etc   S   Uni Y  d  Scanner Unit     FAX unit pea  Panel  Automatic Printer  Power Document Feeder Unit                                        A i d A          y y y   Y    Public line Operator Operator Paper Paper    Figure 2 Hardware composition relevant to TOE    Figure 2 shows the structure of the hardware environment in MFP that TOE needs for the  operation  The MFP controller is installed in the main body of MFP  and TOE exists in the flash  memory on the MFP controller  loaded into the main memory    The following explains about the unique hardware on the MFP controller  the hardware having  interfaces to the MFP controller  and the connection using interfaces  shown in Figure 2       Flash memory  A storage medium that stores the object code of the  MFP Control Software   which is the  TOE  Additionally  stores the message data expressed in each country s language to display  the response to access through the panel and network        NVRAM  A nonvolatile memory  This memory medium stores various settings that MFP needs for
29.  T DISCARD MFP  Lease return and disposal of MFP   This threat assumes the possibility of leaking information from MFP collected from the user   O OVERWRITE ALL is that TOE provides the function to overwrite data for the deletion of  all area of HDD and initializes the information of NVRAM  so that the possibility of the  threat is removed by executing this function before MFP is collected   Accordingly  this threat is countered sufficiently     e T BRING OUT STORAGE  Unauthorized bring out of HDD   This threat assumes the possibility that the image data in HDD leaks by being stolen from  the operational environment under MFP used or by installing the unauthorized HDD and  taking away with the data accumulated in it   For the above  the possibility of the threat is reduced because O CRYPTO KEY assumes that  TOE generates an encryption key to encrypt the data written in the HDD  and a mechanical  operation to use the encryption function by ASIC is supported by O CRYPTO CAPABILITY   Accordingly  this threat is countered sufficiently     e T ACCESS PRIVATE BOX  Unauthorized access to personal user box using user function   This threat assumes the possibility that an unauthorized operation is done by using the user  function for the personal user box which each user uses to store the image file   O REGISTERED USER is assumed that only the user to whom TOE was registered is  permitted to use MFP installed TOE  furthermore  the operation of a personal user box and  the user box fil
30.  TECHNOLOGIES  INC   All Rights Reserved   26 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    4 3  Security Objectives Rationale  4 3 1  Necessity  The correspondence between the assumptions  threats and security objectives are shown in the  following table  It shows that the security objectives correspond to at least one assumption or    threat     Table 1 Conformity of security objectives to assumptions  threats  and organization security policies    Vv  Vv  aL  WL    Organization security  policies   Assumptions   Threats    NINGV   ASIAYAS     EIERE  ONILLAS V  dAW ddvOS   ADVYOLS LNO ONIYEL  XO  ALVAlYd SSADOV L  xog 9NaNd SSJ99  xog dNOH9 SSJJ9V L  LNIWd SYNDAS SSAOOV L  NOISSINSNVYL GaL04dxXANN L  ONILLAS SSA90OV L  AYOLSSAY dNMOVE L  VLVG NOILVOINNNWOO d  ANI1 LOSrad d    Security objectives policy    OE FEED BACK  OE SERVER  OE SESSION   OE ADMIN   OE SERVICE  OE NETWORK  OE FAX UNIT  OE SECRET  OE SETTING SECURITY                                                 ll  a    LH TT ANNI  TTT Pt TT NNNNNNNNNNANN  Dsl bal  a OME Males Ie I DIE      Pelt fe el ee eset Ee el  a e R RE ESHR EE  e a REE  GK       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   27 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c 
31.  Table 12 Characters and Number of Digits for Password R    of digits  CE Password Selectable from 93 or more characters in total  Administrator Password  Alphabet  numeric  and symbols  Some are not included    Account Password  User Box Password  Secure Print Password  WebDAV Server Password    Encryption passphrase Selectable from 83 or more characters in total     Alphabet  numeric  and symbols  Some are not included      User Password 8or more   Selectable from 188 or more characters in total   Alphabet  numeric  symbols  Some are not included    and  special characters  Some are not included     SNMP Password 8or more   Selectable from 90 or more characters in total     Privacy Password  Alphabet  numeric  and symbols  Some are not included       Authentication Password    7 1 2  Auto Logoff Function of Administrator Mode       While accessing an administrator mode from a panel  if not accepting any operation during the  panel automatic logoff time  it logs off the administrator mode automatically   As described above  FIA_SSL 3 is realized     7 1 3  Function Supported in Administrator Mode    When a user is identified and authenticated as an administrator by the administrator  identification authentication function at the accessing request to the administrator mode  the  administrator authority is associated with the task substituting the user  And the following  operations and the use of the functions are permitted        13 Table 12 shows the minimum password space 
32.  The reason not to apply FMT_MSA 1 gt   This is the internal control ID that is identified    uniquely  and this does not require the management  FMT_MSA 3 2  such as change or deletion  after this is assigned once    lt FMT_SMR 1 gt   The assignment of FMT_MSA 3 2 2  is not applicable   FMT_SMR 1 is the dependency that is set relating to  the following and so there is no necessity of  application   FMT_MSA 1  Neither is applicable   FMT_SMR 1   lt The reason not to apply FMT_MSA 1 gt   The user box attribute of a user box file always needs  to correspond with the user box  Therefore  the value  only has to be given at the time of storage   It is not necessary to change the value of this attribute  FMT_MSA 3 3  at the time of other operational timing   Accordingly  the management requirement is  unnecessary    lt FMT_SMR 1 gt   The assignment of FMT_MSA 3 2 3  is not applicable   FMT_SMR 1 is the dependency that is set relating to  the following and so there is no necessity of  application     FMT_MSA 1  Neither is applicable     Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   82 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Functional  Requirements  Component for   this ST    Dependencies on CC Part 2 Dependencies Relation in this ST     lt The reason not to apply FMT_MSA 1 gt    It is the
33.  User Box File  e On memory Image File   gt  Image file of job in the wait state  e Stored Image File   gt  Stored image files other than secure print file  user box file  or ID  amp  print file  e HDD remaining Image File   gt  The file which remains in the HDD data area that is not deleted only by general  deletion operation  deletion of a file maintenance area   e Image related File   gt  Temporary data file generated in print image file processing  e Transmission Address Data File   gt  File including E mail address and telephone numbers that become the destination to    transmit an image   3 2  Assumptions    The present section identifies and describes the assumptions for the environment for using the  TOE     A ADMIN  Personnel conditions to be an administrator        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   19 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Administrators  in the role given to them  will not carry out a malicious act during the series of    permitted operations given to them     A SERVICE  Personnel conditions to be a service engineer   Service engineers  in the role given to them  will not carry out a malicious act during series of    permitted operations given to them     A NETWORK  Network connection conditions for MFP    e The intra office LAN where the MFP wi
34.  a part of the phenomenon    or FDP_ITC 2  FCS_CKM 4   The satisfied events  The encryption key for   enciphering the attached file by the S MIME   communication is generated     lt The reason not to satisfy a part of the FCS_CKM 1 or   FDP_ITC 1 or FDP_ITC 2 gt      It seems proper to use FDP_ITC 1 because the  public key to encrypt the encryption key for the  data encryption of S MIME is imported outside of  TSF control area  but S MIME certificate is  registered by the administrator s operation  In that  case  it is unnecessary to consider whether it  passes thorough the untrusted channel or not   There is not inevitability to apply the security  requirement  The use under the condition that  A NETWORK is realized     Also  the attribute information of imported  encryption key doesn t apply to the security  attribute used for the access control  etc   is not    FCS_COP 1    related to the initialization  etc   so there is no  necessity to apply      In FMT_MTD 1 11   it is expressed as registration  of TSF data  and the object of import operation is  assigned to an appropriate role      As a result  the event corresponding to the key  management is explained by using not the security  requirement that is showed in the dependencies  but other security requirement  so that it s no  problem even if this dependencies is not satisfied      lt The reason not apply FCS_CKM 4 gt   The Encryption Key is stored constantly for the  stored data  The arbitrary access to the storing med
35.  all communication  At least one secure communication method between MFP and client PC  needs to be provided when transmitting the secure print file or the user box file   O TRUSTED PASS provides Trusted Channel to a correct destination in the transmission  and reception of an image between MFP and client PCs for user box files  secure print files   and ID  amp  print files that save confidential images  so that the organizational security policies  is achieved   Also  the security objective provides the transmission function to a correct destination by  encrypting the user box file transmitted by e mail from MFP to client PC by  O CRYPTO MAIL  so that the organizational security policies is achieved   Furthermore  O CONFIG restricts the Trusted Channel function setting data  the  management of the user box files  encryption by e mail and the transmission address data to  the administrator  And  OE FEED BACK uses the application regulating that the protected  feedback is returned for the entered password in the administrator s authentication  and  OE SESSION is also regulated to log off after the operations of the administrator mode ends   so that O CONFIG is supported   Accordingly  this organizational security policy is sufficiently to achieve     e P REJECT LINE  Access prohibition from public line   This organizational security policy prohibits being accessed to a stored data in a client PC  and a server existing in internal network or a general data flowing on internal n
36.  be changed  and such operations can be  aborted  by giving directions from the panel     The following is the functions related to the security in the basic function       Secure Print Function  When a Secure Print password is received together with printing data  the image file is  stored as standby status  Then  printing is performed by a print direction and password entry  from the panel   When printing is requested by a client PC  this function eliminates the possibility that other  users stole a glance at the printing of highly confidential data  or such data is slipped into the  other printings       ID  amp  Print Function  When this function is set up  usual print data are saved in the print waiting state  and  printed by the user authentication processing from the panel  Even when this function is not  set up  if it is specified on the print data to activate this function  the system will operate in    the same manner as this function is set up by a user   1 4 3 2  User Box Function    A directory called a  user box  can be created as an area to store image files in HDD  Three  types of user box are usable  the first is the personal user box which a user possesses  the second  is the public user box which is shared by registered users who made a certain number of groups   and the third is the group box which is shared by the users belonging to same account  As for the  personal user box  the operation is limited only for the user who owns it  the public user box  pe
37.  box with the Account  Name  account ID  of an object attribute corresponding to the Account Name  account ID  of the  subject attribute      lt Operation control to Public user box gt   A task to act for the user who is related to the user attribute  user ID  is permitted to do the list  display operation to the user box where  Public  is set to the user attributes of the object attribute      lt Operational control to User box file gt   A task to act for a user is permitted to print  transmit  E mail transmission  FTP transmission  SMB  transmission  FAX transmission and WebDAV transmission   download  move to other user boxes   copy to the other user boxes and copy to USB memory  to the user box file that have the matched the  user box attribute  user box ID  of the object attribute with the user box attribute  user box ID  of the  subject attribute        FDP_ACF 1 3 1   The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects     assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects       A task to act for the user that has a administrator attribute is permitted to operate displaying of user  box List     A task to act for the user that has a administrator attribute is permitted to operate the back up the  user box file   FDP_ACF 1 4 1   The TSF shall explicitly deny 
38.  concept of ID  amp  print that the object is a print  object to which only the person who registered it can  access  so it is not assumed that the object is  transferred to any other user  Consequently  it is not  necessary to change the value of the attribute when  the user performs operations other than registration   so that the management requirement is unnecessary    lt FMT_SMR 1 gt    The assignment of FMT_MSA 3 2I4  is not applicable   FMT_SMR 1 is the dependency that is set relating to  the following and so there is no necessity of  pplication     a  MT_SMR 1 FMT_SMR 1 2    MT_SMR 1 FMT_SMR 1 2    FMT_SMR 1 3    MT_SMR 1 FMT_SMR 1 2    MT_SMF 1  FMT_SMF 1    MT_SMR 1 FMT_SMR 1 2   FMT_SMR  1 4        MT_SMR 1 FMT_SMR 1 2   FMT_SMR 1 3   MT_SMR 1 FMT_SMR 1 1   FMT_SMR 1 2   MT_SMR 1 FMT_SMR 1 2   FMT_SMF 1   FMT_SMR 1     3   MT_SMF 1  FMT_SMF1  MT_SMF1 FMT_SMF 1  MT_SMF1 FMT_SMF 1  MT_SMR 1 FMT_SMR 1 2   FMT_SMF1    FMT_SMR 1 2   FMT_SMR 1I 6     FMT_SMF 1 N A   FMT_SMR 1 1    FMT_SMR 1 2  FIA_UID 2 2    FMT_SMR 1 3    FMT_SMR 1 4   l      FMT_MTD 1 1     F  F    FMT_MTD 1 2     yy    FMT_MTD 1 3     yy    FMT_MTD 1 4     yy    FMT_MTD 1 5       i r  i    EMT MID IIe    yy         FMT_MTD 1 7     yy                    FMT_MTD 1 8        Aye    FMT_MTD 1 9     FMT_MTD 1 10     yy    FMT_MTD 1 11     yy          FMT_MTD 1 12     yy          GE  GC  FTA SSL    FIT_CAP 1 1  None N A  FIT_CAP 1 2  None N A          Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  I
39.  disabled by turning off the operational setup  The setup of the Enhanced Security function    becomes invalid in the execution of this function   Refer to the description for the operational    setup of the Enhanced Security function in FADMIN      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     107 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target    As described above  FAD_RIP 1 is realized     Table 13 Types and Methods of Overwrite Deletion of Overall Area    Method Overwritten data type and their order  Random numbers  gt  Random numbers  gt  0x00    0x00  gt  OxFF  gt  Random numbers  gt  Verification    Random numbers  gt  0x00  gt  OxFF    7 8  FCRYPT  Encryption Key Generation Function           F CRYPT generates an encryption key to encrypt all data written in HDD by using the Konica  Minolta HDD encryption key generation algorithm that is regulated by the Konica Minolta  encryption specification standard    When the encryption passphrase is decided in the encryption functional operation setting to  which the access is restricted in F ADMIN  an encryption key 128 bits long is generated from the  encryption passphrase by applying the Konica Minolta HDD encryption key generation  algorithm    As described above  FCS_CKM 1 is realized     7 9  FRESET  Authentication Failure Frequency Res
40.  external server registered by FIA_UID 2I 7   This management  behavior is maintained as the role of the external server by FMT_SMR 1  5   In addition  the  registration function of user ID is specified for the administration function by FMT_SMF 1   The setting change operation of an external server is limited to only the administrator by  FMT_MTD 1 3      The quality of the user password is verified by FIA_SOS 1 3   When  machine authentication   is selected in the method of the user authentication  a change of the user password is limited to  the user itself and the administrator by FMT_MTD 1I 2   In addition  when a user changes  his her own user password  the user is re authenticated by FIA_UAU 6      lt Necessary requirement to keep the administrator secure gt      gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and management function for each management gt   The role to do these managements is maintained as a administrator by FMT_SMR 1 2  and a  user by FMT_SMR 1 3   Moreover  these management functions are specified by FMT_SMF 1     This security objective is satisfied by the completion of these multiple functional requirements     e O PRIVATE BOX  personal user box access control   This security objective limits access to the personal user box and the user box file in the  personal user box to only the user who owns that user box  and needs various requirements    that relate to the 
41.  in the second  fourth  and sixth time in total is  detected by each authentication function utilizing a WebDAV server password  all the  authentication functions utilizing the WebDAV server password is locked out   Access using  WebDAV is denied      gt  The maximum number of times of failure is specified by the administrator by the  unauthorized access detection threshold setup function       The lock out of the authentication function is released when the FADMIN   s unlock function  is performed to WebDAV authentication    As described above  FIA_AFL 1 9   FIA_UAU 2 2   and FIA_UID 2 2  are realized     7 15 2  Management Function Utilizing WebDAV    When it is identified and authenticated that the user is an administrator by the WebDAV  server password  access utilizing WebDAV is permitted  and it is permitted to set up the data       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   110 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       below     7 15 2 1  Obtention of User Password    User password is obtained for each registered user   As described above  FMT_MTD 1 7   FMT SMF 1  and FMT_SMR 1 2  are realized     7 15 2 2  Obtention of Account Password    Account password is obtained for each registered user   As described above  FMT_MTD 1 7   FMT_SMF 1  and FMT_SMR 1 2  are realized       
42.  management data using the file system of HDD  Along  with the execution of this logical format  the setup of the Enhanced Security function is  invalidated      All area overwrite deletion function  The setup data of enhanced security function are invalidated by executing the overwrite  deletion of all area   As described above  FMT MOF 1 1   FMT _SMF 1 and FMT_SMR 1 2  are realized     7 1 3 18  Function Related to Password Initialization Function    The function that relates to the initialization of the password that the administrator operates  is as follows     All area overwrite deletion function  The settings of the administrator password and the SNMP password are initialized to the  values at factory shipment by executing the overwrite deletion of all area  As described above  FMT_MTD 1 3    FMT_MTD 1 6   FMT SMF1 and FMT _SMR 1 2  are  realized     7 1 3 19  Change of WebDAV Server Password    The WebDAV server password is changed  This is performed when it is re authenticated that  the user is an administrator  and the newly setup WebDAV server password satisfies the quality     The WebDAV authentication mechanism which authenticates the user by the WebDAV   server password consisting of the characters shown in Table 12 shall be usable      When authentication has succeeded  the authentication failure frequency is reset      When authentication failure which results in the first  second  or third time is detected  by each authentication function utilizing a WebDAV se
43.  of each user boxes    gt   Ifthere is a user box to which access is locked  the lock is released      Reset  clear all  the number of times of authentication failure of each account    gt   Ifthere is a user account to which access is locked  the lock is released      Reset  clear all  the number of times of authentication failure of SNMP password    gt   Ifthere is a MIB object to which access is locked  the lock is released      Reset  clear all  the number of times of authentication failure caused by the WebDAV server   password     gt   Ifaccessing by WebDAV is locked up  the lock is released     As described above  FIA_AFL 1 3   FIA_AFL 1 4   FIA_AFL 1 5   FIA_AFL  116    FIA_AFL 1 7   and FIA_AFL 1 9  are realized     7 1 3 5  Setup of User Authentication Function    Set the following authentication method in a user authentication function    e Machine authentication  Authentication method which utilizes a user password managed on  MFP sides    e External server authentication   Authentication method which utilizes a user password  managed with a user information management server connected through a network  Only  Active Directory method is object    gt  When external server authentication is used  the external server authentication setting   data  Contain the multiple authentication server information  such as domain name to  which external server belongs  needs to be set   Set the following authentication method in the account authentication function used with a  us
44.  password by administrator     Registration function of user box password by administrator     Modification function of user box password by administrator     Modification function of WebDAV server password by administrator     Registration function of user box by administrator     Modification function of user attributes of the user box by the administrator  However  only when the  user attribute of previous setting is  user ID       Registration function of user ID by administrator     Registration function of user password when method of user authentication by administrator is  machine authentication     Modification function of user password when method of user authentication by administrator is  machine authentication     Registration function of S MIME certificate by administrator     Registration modification function of S MIME certificate by administrator     Operation setting function of S MIME function by administrator     Operation setting function of Trusted Channel function by administrator     Registration function of Belonging Account of user by administrator     Modification function of Belonging Account of user by administrator     Modification function of Administrator authentication lock time by administrator     Modification function of Encryption passphrase by administrator     Operation setting function of Function to use encryption function realized by ASIC by administrator     Modification function of TST receiving setting data by administrator     Mod
45.  reaches 1 3 times  FIA_AFL 1 2  logoffs if it s under authentication  and locks all the  authentication functions that use the administrator password from then on  The release  function is executed by starting TOE with turning OFF and ON the power supply  so that the  lock is released after the administrator authentication lock time passed   FMT_MTD 1 3  permits only to the administrator the setting of the threshold of the  authentication failure frequency which is the trial frequency of the failure authentication in  the administrator authentication      lt Management of session of identified and authenticated administrator gt    The duration of session of the administrator who is identified and authenticated contributes  to reduce the chance of attacking associated with unnecessary session connection by ending  the session after the panel automatic logoff time elapses by FTA_SSL 3  if it logs in from the  panel  The change in the panel auto logoff time is limited to the administrator by  FMT_MTD 1 3       lt Management of administrator s authentication information gt   FIA_SOS 1 1  verifies the quality of the administrator password  Moreover  FIA_SOS  5   verifies the quality of session information used to authenticate the administrator via the       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   78 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Co
46.  receipts from the panel for five seconds at each failure   and when the failure authentication reaches 1 3 times  FIA_AFL 1 1  logoffs it if it s under  authentication  and locks all the authentication functions to use the CE password  The CE  authentication lock release function is executed and the CE authentication lock time goes by   so that this lock status is released   FMT_MTD 1 3  permits only to the administrator the setting of the threshold of the  authentication failure frequency that is the trial frequency of the failure authentication in the  service engineer authentication  FMT_MTD 1 9  permits only to the service engineer the  setting of the CE authentication lock time      lt Management of service engineer s authentication information gt    FIA_SOS 1 1  verifies the quality of the CE password  FMT_MTD 1 9  restricts the change in  the CE password to the service engineer  Moreover  FIA_UAU 6 re authenticates it  In this  re authentication  when the failure authentication reaches 1 3 times  FIA_AFL 1 1  releases  the authentication status of the service engineer and locks all the authentication functions to  use the CE password  The secret lock release function is executed and the CE authentication  lock time goes by  so that this lock status is released      lt Role and management function for each management gt   FMT_SMR 1 1  maintains the role to do these management as a service engineer   FMT_SMEF 1 specifies these management functions     6 2 1 3  Dependenc
47.  s  User ID   laccount ID  or  public     assignment  the authorized identified roles       User    Administrator   assignment  access control SFP  information flow control SFP    User box access control  Hierarchical to   No other components  Dependencies   FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FMT_SMF 1  FMT_SMF 1     FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 3                                       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   54 111          bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMO0 12 Security Target       FMT_MSA 1 2  Management of security attributes    FMT_MSA 1 1 2     The TSF shall enforce the  assignment  access control SFP  information flow control SFP to restrict the  ability to  selection  change_default  query  modify  delete   assignment  other operationell the security  attributes  assignment  et of security attributes  to  assignment  the authorized identified roles     assignment  list of security attributes     User attributes of user box that is set the  public     selection  change default  query  modify  delete   assignment  other operations     modify  modify to  User ID  or  account IDJ    assignment  the authorized identified roles       User who is permitted to use that public user box    Administrator   assignment  access control SFP  information flow control SFP    User box acc
48.  s user attribute by user who is permitted the use of  the group box  Hierarchical to   No other components             10 A part of the backup function corresponds to the inquiry function of TSF data   A part of the restoration function corresponds to the modification function of TSF data        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   61 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target            Dependencies   No dependencies      FMT_SMR 1 1  Security roles    FMT_SMR 1 1 1   The TSF shall maintain the roles  assignment  the authorised identified roles                assignment  the authorised identified roles   Service Engineer  FMT_SMR 1 2 1   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA _UID 1  FIA_UID 2 1      FMT_SMR 1 2  Security roles    FMT_SMR 1 1 2   The TSF shall maintain the roles  assignment  the authorised identified roles                               assignment  the authorised identified roles   Administrator  FMT_SMR 1 2 2   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA UID 1  FIA_UID 2 2      FMT_SMR 1 3  Security roles    FMT_SMR 1 1 3   The TSF shall maintain the roles  assignment  the authorised identified roles                           
49.  security  attribute based relationship that must hold between subject and information security attributes     assignment  for each operation  the security attribute based relationship that must hold between subject  and information security attributes     Does not send data except image data received from FAX unit to internal network   FDP_IFF 1 3  The TSF shall enforce the  assignment  additional information flow control SFP rulez    assignment  additional information flow control SFP rules     None  FDP_IFF 1 4  The TSF shall explicitly authorise an information flow based on the following rules   assignment  rules   based on security attributes  that explicitly authorise information flows     assignment  rules  based on security attributes  that explicitly authorise information flows     None  FDP_IFF 1 5  The TSF shall explicitly deny an information flow based on the following rules   assignment  rules  based  on security attributes  that explicitly deny information flows     assignment  rules  based on security attributes  that explicitly deny information flows                                                       None  Hierarchical to   No other components  Dependencies   FDP_IFC 1 FDP_IFC 1    FMT_MSA 3  N A              Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   43 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO
50.  server password      When the user changes his her own user password      When a user permitted to use a public user box changes the box password of the public user box                          Hierarchical to   No other components   Dependencies   No dependencies   FIA_UAU 7 Protected authentication feedback   FIA_UAU 7 1  The TSF shall provide only  assignment  et of feedback  to the user while the authentication is in  progress         assignment  Let of feedback     Display     every character data input   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 1   FIA_UAU 2 2   FLA_UAU 2 3   FLA_UAU 2I 4    FIA_UAU 2 5   FIA_UAU 2 6      FIA_UID 2 1  User identification before any action    FIA_UID 2 1 1   The TSF shall require each user  Service Engineer  to identify itself before allowing any other  TSF mediated actions on behalf of that user  Service Engineer     Hierarchical to  gt  FIA_UID 1   Dependencies   No dependencies                                        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   51 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMO0 12 Security Target       FIA_UID 2 2  User identification before any action    FIA_UID 2 1 2     The TSF shall require each user  Administrator  to identify itself before allowing any other  TSF mediated actions on behalf of that use
51.  sizes   assignment  cryptographic key sizes  that meet the following   assignment  Jist of standards         lassignment  ist of standards     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation         assignment  cryptographic algorithm     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation        lassignment  cryptographic key sizes     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation         assignment  Jet of cryptographic operation     Listed in  Table3 Cryptographic operation  Relation of Algorithm Key sizes Cryptographic operation        Hierarchical to  Dependencies       No other components    FDP_ITC 1 or FDP_ITC 2 or FCS_CKM 1  FCS_CKM 1   only a part of events     FCS_CKM 4  N A           Table 3 Cryptographic Operation  Relation of Algorithm Keysizes Cryptographic Operation    List of  standards    FIPS PUB 197    Cryptographic    algorithm    Cryptographic  key sizes     128 bits     192 bits     256 bits    Contents of Cryptographic operation    Encryption of S MIME transmission data       SP800 67    3 Key Triple DES      168 bits    Encryption of S MIME transmission data       FIPS 186 2       RSA         1024 bits    2048 bits    3072 bits    4096 bits       Encryption of cryptographic key to encrypt  S MIME transmission data          Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserve
52.  the possibility  of the threat is reduced  When the external user information management server is used  the  possibility of the threat is reduced because the user identification and authentication function  is operated through O AUTH CAPABILITY supporting the operation for the user  identification and authentication function by the user information management server of  Active Directory and through OE SERVER setting to use the user management by the  administrator   OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and access authentication to the secure print   and OE SESSION requires the log off operation after the operation ends  so that  O REGISTERED USER and O SECURE PRINT are supported sufficiently   Accordingly  this threat is countered sufficiently     e TUNEXPECTED TRANSMISSION  Transmission to unintended address        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   30 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       This threat assumes the possibility of sending the user box file to the address that isn t  intended  when the network setting that relates to the transmission is illegally changed  This  is concerned about a possibility that the user box file is transmitted to the specified server  ille
53. 0   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       the FAX transmission  the SMB transmission  WebDAV transmission  download  the removing  to other user boxes  the copy operations to other user boxes  and the copy operations to USB  memory     As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized   7 5 3 8  User Attribute Change of Group User Box    The user attributes can be changed     If another account ID is specified  the user of another Account Name becomes an accessible  group user box      If public is specified  it becomes a public user box  It is necessary to register the user box  password  In this case  it is verified that the user box password satisfies the following  requirements    gt  Itis composed of the characters and by the number of digits shown in Table 12    gt  It shall not be composed of one kind of character     Specify a registered user  and change to a personal user box for the registered user   As described above  FIA_SOS 1 5   FMT_MSA 1 3   FMT_SMF1 and FMT_SMR 1I 6  are  realized     7 6  FPRINT  Secure Print Function  ID  amp  Print Function     F PRINT is a security function related to the secure print function and ID  amp  print function    It provides the access control function that allows the printing and displaying the list of the  secure print file after authenticating if a user is the authorized person to use the se
54. 0 0100 GMOo 12 Security Target       6 1 1 3  Identification and Authentication    FIA_AFL 1 1  Authentication failure handling    FIA_AFL 1 1 1     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Jet of authentication events     Authentication for accessing the service mode    Re authentication for changing the CE password    selection   assignment  positive integer number   an administrator configurable positive integer  within lassignment  range of acceptable values    assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 1   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions    selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt     Log otf from the authentication status of the service mode if it is  and lock the authentication  function which uses the CE password       If it   s not under the authentication status  lock the authentication function which uses the CE  password      lt Operation for recovering the normal condition gt   Perform the lock release function of CE authentication by specific operation    When CE authentication lock t
55. 009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   70 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       FIA_SOS 1 5  secures the quality verification of the session information used in the user box  authentication via the network  and FIA_SOS 2 secures the quality of the session information  which is generated and used      lt Management of a public user box gt    FMT_MSA 1 2  permits the user who is permitted the use of the user box to operate the  change of the user attribute of use box which  Public  is set  FMT_MTD 1 4  permits the  change in the user box password only to the administrator and the user who is permitted to  the use of the user box  FIA_SOS 1 1  verifies the quality of the user box password  If a user  permitted to use a public user box changes the user box password of the public user box   FIA_UAU 6 re authenticates the user    As for the user box registration  FMT_MSA 3 1  specifies the public to the user attribute of  the user box  and permits only the user and administrator to give the initial value to change  the user attribute  FMT_MTD 1 5  permits the registration of the user box password only to  the user or the administrator  For the user box attribute of the user box file  the user box  attribute value of the selected user box as storage is set by FMT_MSA 3 3       lt Necessary requ
56. 1  permits the  list display operation to the user box where public is set on the user attributes to the task of  acting the user who has user ID    It is required to be a user who is permitted the use of the user box to operate the user box file  in the public user box  FIA_UID 2 5  and FIA_UAU 2 5  identifies and authenticates that it is  a user who is permitted the use of the user box    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1  8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1  6  locks the authentication function for that user from then on   This lock status is released by the administrator s release operation    FMT_MTD 1 3  permits only to the administrator the setup of the threshold of the  unauthorized access detection value that is the trial frequency of the failure authentication in  the authentication of the user who is permitted the use of the user box    When FIA_ATD 1 and FIA_USB 1 relates a user box ID to the task of acting use   FDP_ACC 1 1  and FDP_ACF 1 1  permit the user box file that has a corresponding object  attribute to the user box ID of the subject attribute and is set public to the user attribute of    user box  the operation such as a print  a download  transmissions  a movement  and a copy        Copyright c  2
57. 2c   VarioLink 2222c             Control Software AOEDOYO0 0100 GMOo 12 Security Target    Dependencies   FIA_UID 1  FIA_UID 2 4      FIA_UAU 2 5  User authentication before any action  FIA_UAU 2 1 5        The TSF shall require each user  User who is permitted to use the public user box  to be  successfully authenticated before allowing any other TSF mediated actions on behalf of that user   User who is permitted to use the public user box                    Hierarchical to   FIA_UAU 1   Dependencies   FIA_UID 1  FIA_UID 2 5     FIA_UAU 2 6  User authentication before any action  FIA_UAU 2 1 6        The TSF shall require each user  User who is permitted to use the account  to be successfully  authenticated before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use the account                    Hierarchical to   FIA_UAU 1   Dependencies   FIA_UID 1  FIA_UID 2I 6    FIA_UAU 6 Re authenticating  FIA_UAU 6 1       The TSF shall re authenticate the use under the conditions  assignment  list of conditions under which  re authentication is required      assignment  list of conditions under which re authentication is required      When the service engineer modifies the CE password      When the administrator modifies the administrator password      When the administrator changes the Encryption function setting       When the administrator changes the SNMP password  except operations from SNMP       When the administrator changes the WebDAV
58. C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    e The setting function of Trusted Channel function setting data  e The setting function of certificates  transmission address data  etc used for the S MIME  function    e The setting function of TSI receiving   e The setting function of PC FAX operation   e Counter management function  TOE permits the operation of the following functions only to the administrator and the service  engineer    e The function related to the setting of Enhanced Security function    O OVERWRITE ALL  Complete overwrite deletion   TOE overwrites all the data regions of HDD in MFP with deletion data  and makes all image  data unable to restore  In addition  TOE provides a function to initialize settings such as the  highly confidential passwords on NVRAM  administrator passwords  encryption passwords   SNMP passwords  and WebDAV server passwords  set by a user or an administrator     O CRYPT KEY  Encryption key generation   TOE generates an encryption key to encrypt and store all the data written in the HDD in the  MFP including image files     O FAX CONTROL  Fax unit control   TOE provides the control function that prohibits an access to internal network which the MFP  concerned connects with  from public line via the port of Fax public line     O TRUSTED PASS  The use of Trusted Channel   TOE provides the function that communicates via Trusted Ch
59. ED BACK  Utilization of application to show secure password   The administrator and user utilize the application of a browser etc   used by client PC to access  MFP  that provides appropriate protected feedback to the user password  user box password   account password  administrator password  secure print password  SNMP password  and  WebDAV server password  which will be entered     OE SERVER  Utilization of user information management server   The administrator sets to utilize user management by Active Directory in case of using  external user information management server instead of MFP for the management of user    account     OE SESSION  Termination of session after operation   The administrator has the user implement the following operation   e After the operation of secure print files  ID  amp  print files  and the user box and user box files  ends  the logoff operation is performed   The administrator executes the following operation   e After the operation of the various function in administrator mode ends  the logoff operation  is performed  The service engineer executes the following operation   e After the operation of the various function in service mode ends  the logoff operation is  performed     OE ADMIN  A reliable administrator   The responsible person in the organization who uses MFP will assign a person who can  faithfully execute the given role during the operation of the MFP with TOE as an  administrator     OE SERVICE  The service engineer s guarantee 
60. I receiving setting data    WebDAV server password   selection  change_default  query  modify  delete  clear   assignment  other operationell   modify   assignment  the authorized identified roles     Administrator          Hierarchical to   No other components  Dependencies   FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2      FMT_MTD 1 4  Management of TSF data    FMT_MTD 1 1 4   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  List of TSF data  to  assignment  the authorized identified roles    l assignment  list of TSF datal    User box password of the relevant user box   selection  change_default  query  modify  delete  clear   assignment  other operations     modity   assignment  the authorized identified roles       User who is permitted to use that public user box                                          Administrator  Hierarchical to   No other components  Dependencies   FMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 4    FMT_MTD 1 5  Management of TSF data  FMT_MTD 1 1 5        The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF data     User box password   selection  change default  query  modify  delete  clear   assignment  other operationell    assignment  other operations 
61. ID 2 6       FIA_UID 2 7       FIA_USB 1     FMT_MOF 1 1        FMT_MOF 1 2      FMT_MOF 1 3       FMT_MSA1 1  E    FMT_MSA 1 2       FMT_MSA 1 3        FMT_MSA 3 1       FMT_MSA 3 2    im   FMT_MSA 3 3       FMT_MSA 3 4         FMT_MTDAN         FMT_MTD 1 2    e  EMT MIDI     EMT MIDI      FMT_MTD 1 5       FMT_MTD 1 6    La    FMT_MTD 1 7    EE    FMT_MTD 1 8         FMT_MTD 1 9         FMT_MTD 1 10    me   ENT MIDD   SS  LENT MIDD       FMT_SMF 1   FMT_SMR 1 1    G     FMT_SMR 1 2    FMT_SMR 1 3      FMT_SMR 1 4    FMT_SMR 1 5      FMT_SMR 1 6        FTASSL3      L  IF ICT     FAD_RIP 1    PFIT_CAP 1 1     LFIT_CAP 1 2       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   67 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       Note  set admin and set service indicates the set of the requirements  And the security    6 2 1 2     objectives assumed to have the correspondence and presented by  X  also correspond to a    series of requirement set associated by   set admin and   set service shown in column   Sufficiency  The IT security functional requirements for the security objectives are described as follows     O REGISTERED USER  Usage of a registered user   This security objective limits the utilization of MFP installing TOE to only the registered user     and needs various requirements regard
62. MIME function  As described above  FDP_ACC 1 3   FDP_ACF 1 3   FMT_MOF1 2   FMT_MTD 113l   FMT_MTD 1 11   FMT_SMF 1  and FMT_SMR 1 2  are realized     7 1 3 16  Setup of FAX    Set the setting data of FAX related settings as follows     PC FAX operation Setting       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   93   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target     gt  Setting either of two modes at PC FAX operation which are to store in each box and to  store in common area for all users according to the designated information at FAX  transmission   e TSI receiving Setting   gt  Setting the storing box at TSI receiving relating the transmitter   s telephone number with  the box as the identification information of transmitter   s terminal   As described above  FDP_ACC 1 3   FDP_ACP 1 3   FMT_MTD 1 3   FMT_SMF1 and  FMT_SMR 1 2  are realized     7 1 3 17  Function Related to Enhanced Security Function    The function that influences the setup of the Enhanced Security function that the  administrator operates is as follows     It has explained the influence of the backup and  restoration function in 7 1 3 9       Operational setup of Enhanced Security function  Function to set valid or invalid of Enhanced Security function    e HDD logical format function  Function to write the default value of
63. NC   All Rights Reserved   83   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       6 2 2  Rationale for IT Security Assurance Requirements    This TOE is installed and used in an environment where adequate security is maintained in  terms of the physical  personnel  and connectivity  Nonetheless  adequate effectiveness in the  environment where the TOE is used must be assured  As a general commercial office product   the execution of tests based on function specifications and high level design  and analysis of the  strength of function and a search for vulnerabilities are required  In addition  it is desirable that  it has a development environment control  a configuration management for the TOE and a  secure distribution procedure  And therefore the selection of EAL8  which provides an adequate  assurance level  is reasonable    The secure requirement dependency analysis is assumed to be appropriate because the  package EAL has been selected  therefore details are not discussed        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   84 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target       7  TOE Summary Specification    The list of the TOE security func
64. NOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   10 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       1 4 3  Logical Scope of TOE    Users use a variety of functions of TOE from the panel and a client PC via the network   Hereafter  this section explains typical functions such as the basic function  the user box function  to manage the image files stored  the user identification and authentication function  the  administrator function manipulated by administrators  the service engineer function  manipulated by service engineers  and the function operated in the background without user s    awareness   1 4 3 1  Basic Function    In MFP  a series of functions for the office work concerning the image such as copy  print  scan   and fax exists as basic functions  and TOE performs the core control in the operation of these  functions  It converts the raw data acquired from the external device of the MFP controller into  image files  and registers them in RAM and HDD   For print image files from client PCs   multiple types of conversion are applied   These image files are converted into data to be printed  or sent  and transmitted to the device outside of the MFP controller concerned    Operations of copy  print  scan  and FAX are managed by the unit of job  so that operation  priority can be changed  finishing of print jobs can
65. Object attributes gt     User Box  gt    User Attribute  User ID or Public or Account ID     User Box File  gt    User Box Attribute  User Box ID            assignment  access control SFP            7 The MFP address group object is a series of data concerning the address of the main body of MFP such as IP  address and the Appletalk printer name        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   39 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          User Box access control  FDP_ACF 1 2 1   The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment  rules governing access among controlled subjects and  controlled objects using controlled operations on controlled objects     assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects    lt Operation control to Personal user box gt   A task to act for a user is permitted to do the list display operation to the user box with the user  attribute  user ID  of an object attribute corresponding to the user attribute  user ID  of the subject  attribute            lt Operation control to Group user box gt   A task to act for a user is permitted to do the list display operation to the user
66. SA 1 2   FMT _SMF 1 and FMT_SMR 1 4  are realized     7 5 2 4  Change of Public User Box Password    The user box password of the public user box is changed  This is performed when it is  re authenticated that the user has a permission to use the public user box and the box password  newly set satisfies the following quality      The user box authentication mechanism which authenticates the user by user box password  consisting of the characters shown in Table 12 shall be usable     When re authentication has succeeded  the authentication failure frequency is reset            is returned to      When re authentication is performed  in the case of access from the panel   the entry of the user box password for each character as feedback      When authentication failure which results in the first  second  or third time in total is  detected by each authentication function utilizing a user box password to the public user  box  all the authentication functions utilizing the user box password of that public user box  is locked out   Access to the public user box is denied  Operations to change the user box  password of the public user box are denied      gt  The maximum number of times of failure frequency is specified by the administrator by  the unauthorized access detection threshold setup function      The lock out of the authentication function is released when the FADMIN   s unlock function  is performed to the public user box      Password is changed when the user box passwo
67. SMR 1  FMT_SMR 1 3    FMT_MSA 3 2  Static attribute initialization  FMT_MSA 3 1 2        The TSF shall enforce the  assignment  access control SFP information flow control SFP to provide   selection  choose one of  restrictive  permissive   assignment  other property  default values for  security attributes  Secure print internal control ID  that are used to enforce the SFP    selection  choose one of  restrictive  permissive  lassignment  other property      assignment  other property    Identified uniquely   assignment  access control SFP  information flow control SFP    Secure print file access control  FMT_MSA 3 2 2   The TSF shall allow the lassignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                                   None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  N A    FMT_SMR 1  N A   FMT_MSA 3 3  Static attribute initialization  FMT_MSA 3 1 3        The TSF shall enforce the  assignment  access control SFP information flow control SFP to provide   selection  choose one of  restrictive  permissive   assignment  other property  default values for  security attributes  User box attributes of user box file  that are used to enforce the SFP    selection  choose one of  restrictive  permissive   assignment  other property      assignment  other property    Corresponds with the value of the use
68. T_SMR 1 1  maintains a service engineer and  FMT_SMR 1 2  maintains an administrator  Moreover  FMT_SMEF1 specifies these    management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O OVERWRITE ALL  Complete overwrite deletion   This security objective regulates that it deletes all data areas of HDD and initializes the       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   76 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       concealed information of NVRAM that is set by the user  and requires various requirements  that relate to the deletion    FAD_RIP 1 guarantees that these objective information not to be able to use the content of  any previous information by the deletion operation    Therefore  this security objective is satisfied     e O CRYPT KEY  Encryption key generation   This security objective regulates that the encryption key necessary to encrypt all the data  written in HDD by ASIC is generated  and needs various requirements that relate to the  encryption key generation   Using Konica Minolta HDD encryption key generation algorism according to the Konica  Minolta encryption specification standard  FCS_CKM 1 generates an encryption key 128 bits  long   This security objective is satisfied by the completion of t
69. UAU 2 2    FIA_ATD 1 User attribute definition  FIA_ATD 1 1       The TSF shall maintain the following list of security attributes belonging to individual users    assignment  Jet of security attributes    assignment  Jet of security attributes      User attributes  User ID      User box attributes  User box ID      File attributes  Secure print internal control ID      Account name  Account ID      Administrator Attribute                      Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 1 1  Verification of secrets  FIA_SOS 1 1 1        The TSF shall provide a mechanism to verify that secrets  Administrator Password  CE Password   secure print password  user box password  account password  and WebDAV server password  meet   assignment  a defined quality metric     assignment  a defined quality metric        Number of digits  8  digits                   Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   48 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target            Character type  possible to choose from 93 or more characters    Rule  OI Do not compose by only the same type of characters   Cl Do not set the same password as the current setting after change                 Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 1 2  Verificatio
70. VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target       FIT_CAP 1 1 2        TSF shall provide the necessary capability to use the service for  assignment security service provided  by IT environment entity      assignment  necessary capability list for the operation of security servicel       lassignment  security service provided by IT environment entity     Encryption function achieved by ASIC        assignment  necessary capability list for the operation of security service     Support function of the image files processing by encryption function       Hierarchical to   No other components       Dependencies   No dependencies          6 1 2  TOE Security Assurance Requirements    The TOE is a commercial office product that is used in a general office environment  and  therefore a TOE security assurance requirement that is required for EAL3 conformance  which  is a sufficient level as an assurance for commercial office products  is applied  The following table    summarizes the applied TOE security assurance requirements     Table 8 TOE Security Assurance Requirements    TOE Security Assurance Requirements  Security architecture description ADV_ARC 1    Class ADV  Functional specification with complete   ADV_FSP 3  Class AGD   Guidance documents    Implementation representation CM   ALC_CMS 3  Class ALC  coverage    Life Cycle Support ALC_DELI    Identification of security measures ALC_DVS 1  Developer defined life cycle model ALC_LCD 1       Conform
71. WebDAV server   gt  Setup of the communications function of the WebDAV server  which can obtain user  settings      Setup of the FTP server function       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   14 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target        gt  Whether to activate or stop the function is selected      Setup of the S MIME function   gt  Whether permit or prohibit the S MIME certificate automatic registration function is  selected    gt  The encryption method used for data encryption is selected      Setup of the ID  amp  print function   gt  Whether to activate the ID  amp  print function or not in normal printing is selected     1 4 3 6  Service Engineer Function    TOE provides a management function of administrator and a maintenance function  such as  adjusting the device for Scan Print etc  within the service mode that only a service engineer can  operate  The following shows the functions related to security     e Modification function of administrator password    The following is a set of operation setting functions related especially to the behavior of the    security function       Authentication setup of the service engineer with the CE5 password    gt  Whether to activate or stop the function is selected      Setup of remote diagnostic function  later description    gt 
72. _UAU 2 1 1        The TSF shall require each user  Service Engineer  to be successfully authenticated before allowing  any other TSF mediated actions on behalf of that user  Service Engineer                     Hierarchical to   FIA_UAU 1   Dependencies   FIA _UID 1  FIA_UID 2 1     FIA_UAU 2 2  User authentication before any action  FIA_UAU 2 1 2        The TSF shall require each user  Administrator  to be successfully authenticated before allowing any  other TSF mediated actions on behalf of that user  Administrator     Hierarchical to  gt  FIA_UAU 1   Dependencies   FIA _UID 1  FIA_UID 2 2                     FIA_UAU 2 3  User authentication before any action    FIA_UAU 2 1 3     The TSF shall require each user  User  to be successfully authenticated before allowing any other  TSF mediated actions on behalf of that user  User                        Hierarchical to   FIA_UAU 1   Dependencies   FIA_UID 1  FIA_UID 2 3     FIA_UAU 2 4  User authentication before any action  FIA_UAU 2 1 4        The TSF shall require each user  User who is permitted to use secure print file  to be successfully  authenticated before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use secure print file    Hierarchical to   FIA_UAU 1                   Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   50 111          bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 282
73. access control      lt User box access control  a personal user box  gt    After the user has been identified and authorized  the user ID is associated with the task of  acting a use by FIA_ATD 1 and FIA_USB 1  By FDP_ACC 1 1  and FDP_ACF 1 1   the task of  acting the user has a user ID  and is permitted to display the list of the user box with a  corresponding user attribute  In addition  after the user box has been selected  when the user  box ID is associated with the task of acting a use by FIA_ATD 1 and FIA_USB 1  the  operation such as a print  a download  transmissions  a movement  and a copy is permitted to  the user box file that has a corresponding object attribute to user ID and user box ID of the  subject attribute      lt Management of a personal user box gt    FMT_MSA 1 1  permits to the user and the administrator the change operation of the user  attribute of the user box where the user ID is set    As for the registration of the user box  public is appointed to the user attribute of the user box  by FMT_MSA 3I 1   and it is permitted only to the user and administrator to give the initial  value to change the public attribute  In addition  when the job to store the non registered user       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   69 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Ta
74. access of subjects to objects based on the  assignment  rules  based on  security attributes that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                                None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 1     FMT_MSA 3  FMT_MSA 3 1   FMT_MSA 3 3    FDP_ACF 1 2  Security attribute based access control  FDP_ACF 1 1 2        The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  list of subjects and objects controlled under the indicated SFP  and for each  the SFP relevant  security attributes  or named groups of SFP relevant security attributes   lt Subject gt   lt Subject attributes gt     task substituted for a user  gt   File attributes  Secure print internal control ID     User attributes  User ID     Administrator attributes                Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   40 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target           lt Object gt   lt Object attributes gt      Secure print fil
75. alities    gt  Itis composed of the characters and by the number of digits  shown in Table 12    gt  It shall not be composed of one kind of character     e Change of account ID and account password  Account ID and account password is changed  It verifies whether the account password  newly set have been satisfied the following qualities    gt  It is composed of the characters and by the number of digits  shown in Table 12    gt  It shall not be composed of one kind of character    gt  It shall not be equal to the current setting        Account deletion  Account ID and account password are deleted    gt  When the Group box of the account ID exists  that group user box is automatically set to  the public user box of  user attributes  public    As described above  FIA_SOS 1 1   FMT_MSA 1 3   FMT_MTD 1 3   FMT_MTD 1 11    FMT _ SMF 1 and FMT_SMR 1 2  are realized     7 1 3 14  Setup of Trusted Channel Function    Set the setting data of Trusted Channel function by SSL TLS  e Communication Encryption Strength Setting  Modification of the communication encryption  method       Operation and Stop Setting of the Trusted Channel function  As described above  FMT MOF 1 3   FMT _SMF1 and FMT_SMR 1 2  are realized     7 1 3 15  Setup of S MIME Transmission Function    Set the setting data which are used when the user box file is S MIME transmitted   e Transmission address data  e mail address   e Registration and modification of S MIME certificate     Setup of Encryption Strength for S 
76. ame password or passphrase as the current setting after change   Hierarchical to   No other components  Dependencies   No dependencies                   FIA_SOS 1 5  Verification of secrets    FIA_SOS 1 1 5     The TSF shall provide a mechanism to verify that secrets  Session Information  meet  assignment  a  defined quality metricl                    Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   49 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AOEDOY0 0100 GMOo 12                   Security Target   assignment  a defined quality metric    107   and above  Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 2 Verification of secrets  FIA_SOS 2 1       The TSF shall provide a mechanism to generate secrets  Session information  that meet lassignment  a  defined quality metric          assignment  a defined quality metric      10 and above  FIA_SOS 2 2  The TSF shall be able to enforce the use of TSF generated secrets for  assignment  list of TSF  functions     assignment  Jet of TSF functions       Administrator authentication  Access through the network     User authentication  Access through the network     User box authentication  Access through the network                       Hierarchical to   No other components   Dependencies   No dependencies   FIA_UAU 2 1  User authentication before any action  FIA
77. ance claims ASE_CCL 1  Extended components definition ASE_ECD 1    ST introduction ASE_INT 1   Security objectives ASE_OBJ 2  Derived security requirements ASE_REQ 2  Security problem definition ASE_SPD 1    TOE summary specification ASE_TSS 1    Class ATE   Tests    Class AVA  Vulnerability analysis AVA_VLA 1  Vulnerability Assessment    Class ASE   Security Target Evaluation                      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   65 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    6 2  IT Security Requirements Rationale  6 2 1  Rationale for IT Security Functional Requirements  6 2 1 1  Necessity  The correspondence between the security objectives and the IT security functional  requirements are shown in the following table  It shows that the IT security functional    requirements correspond to at least one security objective     Table 9 Conformity of IT Security Functional Requirements to Security Objectives    Security Objectives    XOd ALVAlYd O  uupEIes      S  S      JI mees    SSYd Q3LSNYL O  MIWW OLdAYS O  TOYLNOO XVs O    ALIMEAVdVO HLNV O    Security    Y35SN dsaYsSLSI9O4y O  ALIMIEVdV9 OLdAYS O    Functional  Requirements    x lt     a R EEE EEE EE E    ER TIV ALIYMYSAO O   gt     AAM OLdAYD O    X  X    x  x     rn Smee  SE hee EE  SS KI ES AE E  SS S E EC el We    Sei s
78. and FDP_ACF 1 2  permits the  list display operation of every secure print user box to the task of acting the user who has  user ID    As it must be a user who is permitted the use of the secure print file to print it  FLA_UID 2 4   and FIA_UAU 2I 4  identifies and authenticates that it is a user who is permitted the use of  the secure print file    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    FIA_AFL 1  8  refuses all input acceptances from the panel for 5 seconds in every failure   When the authentication failure reaches 1 3 times  FIA_AFL 1  5  locks the authentication  function for to the concerned secure print file  This lock status is released by the  administrator s release operation    FMT_MTD 1 3  permits only to the administrator the setup of the threshold of the  authentication failure frequency that is the trial frequency of the failure authentication in  the authentication of the user who is permitted the use of the secure print file    When FIA_ATD 1 and FIA_USB 1 relate the secure print internal control ID to the task of  acting use  FDP_ACC 1 2  and FDP_ACF 1 2  permit the print operation to the secure print  file that has a corresponding object attribute to the secure print internal control ID of the  subject attribute    As for secure print internal control ID  FMT_MSA 3 2  gives the value uniquely identified  when the secure print file is registered      lt Secure print password gt  
79. annel the following image file   which is transmitted and received between MFP and client PC    lt  Image file transmitted from MFP to client PC  gt   e User box file   lt  Image file transmitted from client PC to MFP  gt   e Image file that will be stored as user box files  e Image file that will be stored as secure print files  e Image files that will be stored as ID  amp  print files    O CRYPTO MAIL  The use of encrypted mail   TOE provides the function that encrypts and transmits the user box file transmitted from MFP  to the correct destination with e mail     O AUTH CAPABILITY  The support operation to utilize user identification and authentication  function   TOE supports the necessary operation to utilize the user identification and authentication    function by user information management server using Active Directory     O CRYPTO CAPABILITY  The support operation to utilize encryption function   TOE supports necessary mechanical operations to utilize the encryption function by ASIC        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   24 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       4 2  Security Objectives for the Operational Environment    In this section  the security objectives for the environment  in the operation environment of the  usage of the TOE  is described     OE FE
80. as the security specification  Therefore  although some excluded  characters are shown depending on the password type  the excluded characters are permitted to use if possible        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   86   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       As described above  FIA_ATD 1 and FIA_USB 1 are realized   7 1 3 1  Change of Administrator Password    When a user is re authenticated as an administrator by the panel and the new password  satisfies the quality  the password is changed       Provides the administrator authentication mechanism that is authenticated by the  administrator password which consists of the character shown in Table 12      Resets the number of authentication failure when succeeding in the re authentication    e Return     for each character as feedback for the entered administrator password in the  re authentication by the access from the panel      When the authentication failure that becomes 1 3 times at total in each authentication  function by using the administrator password is detected  it logoffs the administrator mode  accessing from the panel  and locks all the authentication functions to use the administrator  password   The access to the administrator mode is refused     gt  The administrator specifies the failure frequency th
81. at does not have a setting function of  the operation individually  there is the reset function of the network setting and the update  function of TOE through the network  but the use of these functions is prohibited    The following explains the series of the setting condition of being the enhanced security  function active  In order to activate the enhanced security function  the prerequisite is required  that an administrator password and a CE password should be set along with the password  policy     e User identification and authentication function    Valid  Both authentication by the main body  and the external server are usable       Access of User   PUBLIC   Prohibited     Service engineer authentication function   Valid     Password policy function   Valid      Setup of secure print authentication method   Authentication operation prohibition function  effective method      Setup of Authentication Operation Prohibition function    The panel and account are locked out for 5  seconds when authentication has failed  failure  frequency threshold  1 3        User box collective management function   Prohibited      Network setting modification function with SNMPv1 and v2    Prohibited     Authentication Operation when writing using SNMPv3    Valid      Setup of encryption function   Valid     Print capture function   Prohibited     Maintenance function   Prohibited      Change of setting by remote diagnostic function    Prohibited     Network setting management reset func
82. at transfer the data received from public line to internal LAN   The prohibition of access  data forwarding except image data  from public line to internal  network is realized by TOE control    As described above  FDP_IFC 1 and FDP_IFF 1 are realized     7 13  FSUPPORT AUTH  External Server Authentication Operation Support Function     F SUPPORT AUTH is the function that realizes the user identification and authentication  function in cooperation with the user information management server of Active Directory   the  function that operates with FUSER     When the user information management server is used for user identification method  the    inquiry for the identification of the user is done for the user information management server       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   109   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    under the user s request of the identification and authentication process  After this inquiry  the  user identification and authentication process is realized by getting the user identification  information returned back from user information management server    As described above  FCS_CAP 1 1  is realized     7 14  FSUPPORT CRYPTO  ASIC Support Function     F SUPPORT CRYPTO is the function that operates the encryption function that utilizes ASIC  from TOE 
83. ata  Meaning of abbreviation  FAD  Functional requirement for All Data protection     e Class behavior  This class contains a family specifying the requirement related with the protection of the user  data and the TSF data with no distinction  One family exists here        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   33 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target         Remaining Information Protection of All Data  FAD_RIP        Family behavior  This family corresponds to the necessity never to access the deleted data or newly created  object and TSF data which should not set as accessible  This family requires the protection for  the information that was deleted or released logically but has a possibility to exist still in  TOE        Component leveling    FAD_RIP  Remaining Information Protection of All Data    FAD_RIP 1   Remaining Information Protection of All Data after the explicit deletion  operation  requires of TSF to assure that the subset of the defined object controlled by TSF  cannot utilize every remaining information of every resource under the allocation of resource    or the release of it        Audit   FAD_RIP 1  The use of the user identification information with the explicit deletion operation  Management   FAD_RIP 1                   No expected management activity    R
84. ation succeeds  TOE permits the  user the use of the basic function and the user box function  etc     Several types of user authentication like below are supported      1  Machine authentication  A method to authenticate user at MFP by registering a user ID and a user password into  HDD on the MFP controller     2  External server authentication  A method to authenticate user at MFP by using the user ID and the user password that are  registered on the user information management server which is connected with the  intra office LAN without managing the user ID and user password on the MFP side   Though multiple methods called Active Directory   NTLM  and NDS are supported  the  method of the external server authentication assumed in this ST is applied only to the case  of using Active Directory     1 4 3 4  Account Authentication Function    TOE can manage the MFP users by grouping them into Account unit  The methods of Account  Authentication are as follows      1  Method synchronized with User Authentication  Set an Account ID on a user beforehand  and associate the user with the account ID of the  user   s account when he she is authenticated     2  Method not synchronized with User Authentication  Associate a user with his her account ID when the user is authenticated by the account       2 A method of directory service that Windows Server 2000  or later  supports to uniformly manage user  information in the network environment of Windows platform    3 An abbreviation of
85. ations that cause controlled information to flow to and from controlled subjects  covered by the SFP    assignment  Jet of subjects  information  and operations that cause controlled information to flow to and  from controlled subjects covered by the SFP      lt Subject gt      Reception from Fax unit    lt Information gt      Received data from public line    lt Operation gt      Send to internal network   assignment  information flow control SFP     Fax information flow control                Hierarchical to   No other components  Dependencies   FDP_IFF 1 FDP_IFF 1   FDP_IFF 1 Simple security attributes  FDP_IFF 1 1       The TSF shall enforce the  assignment  information flow control SEH based on the following types of  subject and information security attributes   assignment  List of subjects and information controlled under  the indicated SFP  and for each  the security attributes    assignment  information flow control SFP     Fax information flow control   assignment  Let of subjects and information controlled under the indicated SFE and for each  the  security attributes       lt Subject gt      Reception from Fax unit    lt Information gt      Received data from public line    lt Security attribute gt      Image data attribute     Data attribute except image data   FDP_IFF 1 2    The TSF shall permit an information flow between a controlled subject and controlled information via a  controlled operation if the following rules hold   assignment  for each operation  the
86. bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target       KONICA MINOLTA    bizhub C360   bizhub C280   bizhub C220    ineo  360  ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Sottware  AOEDOY0 0100 GM0 12    Security Target    This document is a translation of the evaluated and certified security target  written in Japanese    Version   1 05  Issued on   November 10  2009    Created by  KONICA MINOLTA BUSINESS TECHNOLOGIES  INC     Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   1 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target        lt Revision History gt       Date   Ver    Division   Approved   Checked    Mar  16  2009 Development Div  12 Initial Version    Jul  10  2009 1 01   Office Software Hirota Nakajima   Yoshida   Deal with typos   Development Div  1   Aug  5  2009 1 02   Office Software Hirota Nakajima   Yoshida   Deal with typos   Development Div  1    Development Div  1 names and deal with typos   Sep  11  2009 1 04   Office Software Hirota Nakajima   Yoshida   Deal with typos   Development Div  1  Nov  10  2009 1 05   Office Software Hirota Nakajima   Yoshida   Deal with typos   Development Div  1             Cop
87. case  it is verified that the user box password meets the following  requirements    gt  It is composed of the characters and by the number of digits shown in Table 12    gt  It shall not be composed of one kind of character      Ifaccount ID is specified  it becomes a group user box that can be accessed by a user who is  permitted the use of the concerned account   As described above  FIA_SOS 1 1   FMT_MSA1  1   FMT_SMF 1 and FMT_SMR 1 3  are  realized     7 5 2  Public User Box Function    When the user is identified and authenticated as a registered user  the task to act for the user  who is identified and authenticated has  User ID  of the identified and authenticated user as the  user attribute  This task is permitted the display of the list of the public user box which is set the  public as the user attribute  The operation specification of each public user box is as follows        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   102 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target        As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized    7 5 2 1  Authentication Function in Access to Public User Box    For the access request for each public user box  after the above mentioned verification function  is operated  the user who accesses is authenticated that it 
88. chanism that authenticates the user that consists of the  characters shown in Table 12    gt  After the user is authenticated to the access from the network  the user authentication  mechanism using session information besides the user password is provided    gt  According to the protocol  it uses the session information more than 10   or it generates  and uses the session information more than 10      As described above  FLA_ATD 1  FIA_SOS 1 5   FIA_SOS 2 and FIA_USB 1 are realized      lt Automatic registration of the User ID gt    In the case of the    External server authentication    has been selected as the user authentic  method  the identified and authenticated user is registered as a user ID with the user name and  authentication server information that was used with identification and authentication    As described above  FIA_UID 2 7   FMT_MTD 1 10   FMT_SMF 1 and FMT_SMR 1I5  are  realized     Auto Logoff Function in User Identification and Authentication Domain    While the user who is identified and authenticated is accessing from a panel  if it does not  accept any operations for more than the  panel automatic logoff time   it logs off from a user  identification and authentication domain automatically    As described above  FTA_SSL 3 is realized     Modification Function of User Password    When the identification and authentication are succeeded  and the access to the user  identification and authentication domain is permitted  the user is permitted to change 
89. channel is required     Download of the user box file     Upload of the image file that will be stored as a user box file     Upload of the image file that will be the secure print file     Hierarchical to   No other components  Dependencies   No dependencies                   6 1 1 7  Extension  Remaining All Information Protection       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   63 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       FAD_RIP 1 Protection of all remaining information after explicit deletion operation    FAD_RIP 1 1  TSF shall guarantee not to be able to use the content of any information before having been assigned to  the resource on the explicit deleting operation to the following objects and the TSF data   assignment   list of object and list of TSF datal    assignment   List of object and list of TSF datal     lt Objects gt     User Box file    Secure print file    ID  amp  print file    On memory image file    Stored image file    HDD remaining image file    Image related file    Transmission address data file   lt TSF data gt     Encryption passphrase    Administrator password    SNMP password    WebDAV server password    User ID    User password    User Box password    Secure print password    Account ID    Account password    S MIME certificate    Trusted Channel set
90. cure print file  for the access to the secure print file from the panel to the identified and authenticated user    Moreover  for the user who was identified and authenticated as a registered user  when ID  amp   print files are accessed from the panel  F PRINT provides the access control function that allows  the printing and displaying the list of only the ones registered by the user     7 6 1  Secure Print Function  7 6 1 1  Authentication Function by Secure Print Password    When the user is identified and authenticated as the registered user  it authenticates that the  accessing user is a user to whom the use of the secure print file concerned is permitted  in  response to the access request to each secure print file      Provides the secure print password authentication mechanism that is authenticated by the  secure print password that consists of the character shown in Table 12      The secure print authentication mechanism by the separate session information is not  needed because it becomes only an access from the panel in the case of the secure print         for each character as feedback for the entered secure print password     Return  Resets the number of authentication failure when succeeding in the authentication     The access from the panel is not accepted for 5 seconds when the authentication is failed     When the authentication failure that becomes the 1 3 times in total for the secure print file  concerned is detected  the authentication function to the s
91. d     37 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       6 1 1 2  User Data Protection       FDP_ACC 1 1  Subset access control    FDP_AGC 1 1 1   The TSF shall enforce the  assignment  access control SFP on  assignment  List of subjects  objects  and  operations among subjects and objects covered by the SEH            assignment  list of subjects  objects  and operations among subjects and objects covered by the SFP    Listed in  Table4 User box access control operational list     assignment  access control SFP    User Box access control  Hierarchical to   No other components  Dependencies   FDP _ACF1  FDP_ACEF 1 1                     Table 4 User Box Access Control  Operational List    A task to act for a user  User Box File   Print    Transmission  E mail transmission  FTP transmission     SMB transmission  FAX transmission and WebDAV    transmission     Download    Move to other user boxes    Copy to other user boxes    Copy to USB memory    Backup          FDP_ACC 1 2  Subset access control    FDP_AGC 1 1 2   The TSF shall enforce the  assignment  access control SFA on l assignment  List of subjects  objects  and  operations among subjects and objects covered by the SFP            assignment  list of subjects  objects  and operations among subjects and objects covered by the SFP    Listed in  Tabel5 Secure print file acces
92. d the use of the user box is provided in  the user box identification and authentication domain of the user box     7 5 2 2  Access Control to User Box File in Public User Box    The task to act for the user is related the  User Box ID  of the user box as a user box attribute  in addition to the user attribute  This task is permitted the user box file  which have a  corresponding user box attribute to the user box attribute of the subject attribute  to do the  printing  the E mail transmission  include the S MIME transmission   the FTP transmission  the  fax transmission  the SMB transmission  WebDAV transmission  download  the movement to  other user boxes  the copy operations to other user boxes  and the copy operations to USB  memory     As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized   7 5 2 3  User attribute change of Public User Box  The user attribute of the user box can be changed        Specify the registered user  And change to a personal user box for the registered user      Specify the account ID  and then it becomes a group user box that can be accessed by a user       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   103 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       who is permitted the use of the concerned account   As described above  FMT_M
93. dencies   No dependencies                      FIA_UID 2 7  User identification before any action  FIA_UID 2 1 7     The TSF shall require each user  External Server  to be successfully identified before allowing any  other TSF mediated actions on behalf of that user  External Server      Hierarchical to   FIA_UID 1   Dependencies   No dependencies                         Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   52 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c       Control Software AOEDOY0 0100 GMOo 12 Security Target  FIA_USB 1 User subject binding  FIA_USB 1 1       The TSF shall associate the following user security attributes with subjects acting on the behalf of that  user   assignment  Jet of user security attributes        lassignment  Jet of user security attributes      User attributes  User ID     User box attributes  User box ID     File attributes  Secure print internal control ID     Account name  Account ID     Administrator Attribute       FIA_USB 1 2       The TSF shall enforce the following rules on the initial association of user security attributes with  subjects acting on the behalf of users   assignment  rules for the initial association of attributes          assignment  rules for the initial association of attributes     lt User box attribute gt   The user box ID of the concerned user box associates to the task acting 
94. e  gt   File attributes  Secure print internal control ID    assignment  access control SFP    Secure print file access control       FDP_ACF 1 2 2        The TSF shall enforce the following rules to determine if an operation among controlled subjects and    controlled objects is allowed   assignment  rules governing access among controlled subjects and controlled  objects using controlled operations on controlled objects          assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects     secure print files     ID  with the file attribute  secure print internal control ID        A task to act for a user who has a user attribute  user ID  is permitted to display of the list of all the      A task to act for a user who has the file attribute  the secure print internal control ID  is permitted the  print operation to the secure print file that has matched the file attribute  secure print internal control       FDP_ACF 1 3 2        The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects          assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects   A task to act for a user who has a administrator attribute is permitted to back up secure print file        FDP_ACF 1 4 2        attributes  that exp
95. e in a personal user box is restricted only to the user who is the owner by  O PRIVATE BOX  so that the possibility of the threat is reduced  When the user information  management server is used  the possibility of the threat is reduced because the user  identification and authentication function is operated through O AUTH CAPABILITY  supporting the operation for the user identification and authentication function by the user  information management server of Active Directory and through OE SERVER setting to use  the user management by the administrator    OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication  and OE SESSION also requires the log off  operation after the operation ends  so that O REGISTERED USER and O PRIVATE BOX are  supported sufficiently    Accordingly  this threat is countered sufficiently     e TACCESS PUBLIC BOX  Unauthorized access to public user box using user function    This threat assumes the possibility that an unauthorized operation is done by using the user  function for the public user box which each user shares to store the image file    O REGISTERED USER assumes that only the user to whom TOE was registered is  permitted to use MFP installing TOE  furthermore  the operation of the public user box and  the user box file in the public user box is restricted only to the user who is permitted by  O PUBLIC BOX  so that the possibility of the threat is reduced  When the 
96. eaeeeessaeeeeteaaes 39  Table 8 TOE Security Assurance Requirements         ssesssesesrirsesrieistiirteetintttitintntitunnttitnantnnnneetnn nea 65  Table 9 Conformity of IT Security Functional Requirements to Security Objectives            ee 66  Table 10 Dependencies of IT Security Functional Requirements Components A 80  Table 11 Names and Identifiers of TOE Security FUNCTION    ee eeeeeeee een eeeeeeneaeeeeeneaeeeeesaeees 85  Table 12 Characters and Number of Digits for Password A 86  Table 13 Types and Methods of Overwrite Deletion of Overall Area  108    Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   5 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    1  ST Introduction    1 1  ST Identification      ST Title      ST Version      Created on      Created by    1 2  TOE Identification      TOE Name      TOE Version    TOE Type    Created by    1 3  TOE Overview    bizhub C360   bizhub C280   bizhub C220   ineo  360   ineot 280   ineo   220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c   Control Software ADEDOY0 0100 GM0 12 Security Target   1 05   November 10  2009   KONICA MINOLTA BUSINESS TECHNOLOGIES  INC    Eiichi Yoshioda    Japanese Name    bizhub C360   bizhub C280   bizhub C220   ineo  360   ineo  280    ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Zentai Se
97. ecure print file is locked    gt  The administrator specifies the failure frequency threshold by the unauthorized access       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   105 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target    detection threshold setting function     The lock is released by the lock release function to the secure print file of FADMIN  executed   As described above  FIA_AFL 1 5   FIA_AFL 1 8   FIA_UAU 2 4   FIA_UAU 7 and  FIA_UID 2 4  are realized     7 6 1 2  Access Control Function to Secure Print File    The secure print file access control operates when it is authenticated     The task to act for the user who is identified and authenticated has the authenticated  secure print internal control ID as the file attribute     This task is permitted the printing to the secure print file with a corresponding file  attribute to the file attribute of this task   As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 2  and FDP_ACF 1 2  are realized     7 6 1 3  Registration Function of Secure Print File    When it is authenticated as a registered user in the registration request of the secure print file  from network  the user is permitted to register the secure print ID and password with the  concerned secure print file        Registration of the secure print password  The registered sec
98. eestenesenegs 99  7 4 2  Auto Logoff Function in User Identification and Authentication Domain    100  7 4 3  Modification Function of User Password    100  7 5  F BOX   User Box FUNCHION   Meteren e aee a SEeERESEAEEELAdEEEER EES aer 101  7 9 1  Personal User BOX  FUNCUON cise iee nanda e ends E e a a ea a a deet aeir Ee 102  7 9 2  Public User  Box  Ftmten ett uee eege EdE i aE aA Seated a RSE 102  7 5 3  Group User  BOX  FUNCUON erisin a a eee Aedes eee a 104  7 6  F PRINT  Secure Print Function  ID  amp  Print Function                c cccceeceeeeeeceeeeeeeeeeeeeeeeeneaeeeeeeeeeeees 105  7 6 1   Secure  Print  FUNCUON cies crore  Ba ee en ea Sas neni ee Ae A 105  7 6 2  1D e print FUNCHON cise beet kee dh eal Ao ee dei ea ees 106  7 7  F OVERWRITE ALL  All Area Overwrite Deletion Funcnon    107  7 8  F CRYPT  Encryption Key Generation Funcion   eee cee ceeeeeeeeneeeeeeenaeeeeeeaeeeeeesaaeeeeeneaeeeeees 108  7 9  F RESET  Authentication Failure Frequency Reset Functon   108  7 10  F  TRUSTED PASS  Trust Channel Function         0    cccccceeeceeceee cree eee ceee aes eeeeeeeeeeccceeeaeeeeeeeeeees 108  7 11  F S MIME  S MIME Encryption Processing Functont  109  7 12  F FAX CONTROL  FAX Unit Control Functton t  109  7 13  F SUPPORT AUTH  External Server Authentication Operation Support Function                    109  7 14  F SUPPORT CRYPTO  ASIC Support Functon   cece ceecceee cece cess ceeeeeeeeeeeeeeseeeeeeeaeeeeeeeees 110  7 15  FADMIN WebDAV  Administrator Function  Cou
99. emaining Information Protection of All Data after the explicit    FAD_RIP 1 deletion operation    FAD_RIP 1 1  TSF shall ensure that the content of the information allocated to source before shall not be available  after the explicit deletion operation against the object and TSF data    assignment  object list and TSF                   data list   Hierarchical to   No other components  Dependencies   No dependencies       5 1 2  FIT_CAP 1 Definition       Class name  FIT  Support for IT environment entity  Meaning of abbreviation  FIT  Functional requirement for IT environment support       Class behavior  This class contains a family specifying the requirement related with the use of the security  service provided by IT environment entity  One family exists here       Use of IT environment entity  FIT_CAP    e Family behavior    This family corresponds to the capability definition for TOE at the use of security function of    IT environment entity        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   34 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          Component leveling    FIT_CAP  Capability of using IT environment entity    Meaning of abbreviation  CAP  CAPability of using it environment     FIT_CAP 1   Capability of using security service of IT environment entity  corresponds to the  s
100. entication reaches 1 3 times  This lock is released by the lock release operation by the  administrator    FMT_MTD 1 3  restricts the threshold setting of the unauthorized access detection value  that is the trial frequency of the failure authentication in the administrator authentication  using the SNMP password only to the administrator   FMT_MTD 1 3  restricts the change in the SNMP password to the administrator   FIA_SOS 1 2  verifies the quality of the SNMP password  Besides  when the SNMP  password is changed by a method other than the operation by SNMP  the user is  re authenticated by FIA_UAU 6    FMT_MOF 1 2  restricts the method of the SNMP password authentication function only to       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   75 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       the administrator      lt Requirements for the counter management function  access by WebDAV  gt    FIA_UID 2 2  and FIA_UAU 2 2  identify and authenticate that the user accessing by  WebDAV is an administrator    FMT_MTD 1I7  permits the identified and authenticated administrator to perform inquiry  of user passwords and account passwords    FIA_AFL 1 9  locks the administrator authentication function which uses the WebDAV  server password when authentication has failed once  twice  or three times  Thi
101. entified roles    l assignment  list of TSF datal     User s own user password   selection  change_default  query  modify  delete  clear   assignment  other operationell                             modity   assignment  the authorized identified roles       User    Administrator  Hierarchical to   No other components  Dependencies   EMT_SMF1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 3         FMT_MTD 1 3  Management of TSF data    FMT_MTD 1 1 3    The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  List of TSF data  to  assignment  the authorized identified roles     assignment  list of TSF datal       User ID     Account ID     Account password     Secure print password     Panel auto log off time     Threshold Number of authentication failure     External server authentication setting data     S MIME certificate      Belonging Account of User                      8 Tt intends the operation of replacing a settable digital certificate for each user in stead of the modification of the  value itself        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   57 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target            Administrator authentication lock time    Encryption passphrase    SNMP password    TS
102. er Box Function  7 5 1 1  Access Control Function to Personal User Box    The task to act for the identified and authenticated user has  User ID  of the user who is  identified and authenticated for the user attribute  This task is permitted the display of the list  of the personal user box which has a corresponding user attribute with this user attribute    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized     7 5 1 2  Access Control Function to User Box File in Personal User Box    When the user box to operate is selected   User Box ID  of the user box is associated with the  task as a user box attribute in addition to the user attribute  This task is permitted  to the user  box file with the user box attribute corresponding to the user box attribute of itself  the printing   the E mail transmission  include the S MIME transmission   the FTP transmission  the FAX  transmission  the SMB transmission  WebDAV transmission  download  the removing to other  user boxes  the copy operations to other user boxes  and the copy operations to USB memory    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized     7 5 1 3  User Attribute Change of Personal User Box    The user attributes can be changed      If another registered user is specified  it becomes a personal user box that another user  manages      Jf public is specified  it becomes a public user box  It is necessary to register the user box  password  In this 
103. er ID as a user    attribute        This task is allowed to list and print ID  amp  print files with the user attribute which is equal    7 7  FOVERWRITE ALL  All Area Overwrite Deletion Function     to this user attribute     As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 4   and FDP_ACF 1 4  are realized     FOVERWRITE ALL executes the overwrite deletion in the data area of HDD  and initializes  the settings such as passwords on NVRAM as well  The object for the deletion or the    initialization is as follows      lt Object for the deletion   HDD gt      lt Object for the initialization   NVRAM gt        Operational setup of Encryption function  OFF     Secure print file   User box file   ID  amp  print file  On memory image file  Stored image file   HDD remaining image file  Image related file  Transmission address data file  User ID   User password   User box password   Secure print password  Account ID   Account password  S MIME certificate  Remaining TSF data    Administrator Password  SNMP password  WebDAV server password    Trusted Channel setting data        Encryption Passphrase is deleted       Trusted Channel setting data is deleted   because initialization has no default value     The deletion methods such as the data overwritten in HDD and the writing frequency is    executed according to the deletion method of the overall area overwrite deletion function set by    FADMIN  Table 13   For the encryption function  the encryption passphrase which was set is   
104. er authentication function      Account authentication function   synchronized method  The method which utilizes an account ID associated with user ID beforehand      Account authentication function   method not synchronized  The method to authenticate by the account ID and the account password at the time of access   without utilizing the account ID that associated with user ID beforehand       Account authentication function   not use       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   89 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Utilize only the authentication function by user ID  and not utilize the authentication by  account information     As described above  FMT _MOF1 2   FMT_MOF1 3   FMT_MTD 1 3   FMT_SMF1 and  FMT_SMR 1 2  are realized     7 1 3 6  Unauthorized Access Setup       Setup of unauthorized access detection threshold    The unauthorized access detection threshold in the authentication operation prohibition  function is set for 1 3 times        Setup of Administrator Authentication Lock Time  Set the Administrator Authentication Lock Time between 5 60 minutes   As described above  FMT_MTD 1 3   FMT SMF 1 and FMT_SMR 1 2  are realized     7 1 3 7  Setup of Auto Logoff Function    The panel auto logoff time which is the setting data of the auto logoff function should be 
105. ervice    E a Re    RENERT Ee e                   Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   66   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Security Objectives    SSVd d4alLSNyLl O  MWA OLdAYO O  JOYLNOO XVj O  ALIIEVdVO HLNV O  UIUPe Jas    OOIAIOS  OS      Security    Y35SN dsyYsALSID4y O  ALIMEVdVO OLdAYS O    Functional  Requirements    FIA_UAU 214   FIA_UAU 2 5   FIA_UAU 2 6     FIA_UAU 6 X X    FIA_UAU 7 x x  xT 7    FIA_UID 2 1  OT T T T   T      FIA_UID 2   2  j ee N ee Te ECH    FIA_UID 2 4    FIA_UID 2 5  Ox DEI EE   FIA_UID 2 6  IL x  III    FIA_UID 2 7  Seel EE  ee T T      xX      FIA_USB 1  FMT_MOF 1 1     FMT_MOF 1 2       Kl  EA    TU oras   JUNI mea  H ero  JH messe  J o  P amoo  P roso    FMT_MOF 1 3   FMT_MSA 1 1   FMT_MSA 1 2  RS  FMT_MSA 1 3  KH  FMT_MSA 3 1  Ea  FMT_MSA 3 2  W  ss  EMT MSA 22  FMT_MSA 3 4   FMT_MTD 1 1   FMT_MTD 1 2   FMT_MTD 1 3   FMT_MTD 1 4   FMT_MTD 1 5                    FMT_MTD 1 6  D el     ES        EA    X    EMT MIDI  FMT_MTD 1 8   FMT_MTD 1 9   FMT_MTD 1 10   FMT_MTD 1 11   FMT_MTD 1 12   FMT_SMF 1  FMT_SMR 1 1  O      FMT_SMR 1 2   FMT_SMR 1 3   FMT_SMR 1 4   FMT_SMR 1 5   FMT_SMR 1 6          iz  FTA_SSL 3       X    FTP_ITC 1  FAD_RIP 1  FIT_CAP 1 1   FIT_CAP 1 2                    FIA_UID 2 3    FIAUID 2 4     FIA_UID 2 5     FIA_U
106. es that the encryption passphrase newly set satisfies the  following qualities  and F CRYPT is performed     It is composed of the characters and by the number of digits shown in Table 12   e It shall not be composed of one kind of character   As described above  FIA_SOS 1 4   FMT_MTD 1 11   FMT _SMF1 and FMT _SMR 1I 2  are  realized      lt Encryption Passphrase Change gt   The encryption passphrase is changed  F   CRYPTO is performed when it is re authenticated by  the currently setup encryption passphrase that the user is an administrator  and the newly setup       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   91 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       encryption passphrase satisfies quality requirements     In case of re authentication  it provides the encryption passphrase verification mechanism  that verified the encryption passphrase that consists of the character shown in Table 12     e Return  in verification         for each character as feedback for the entered encryption  passphrase     Verify the encryption passphrase newly set if the following qualities are satisfied    gt  Itis composed of the characters and by the number of digits shown in Table 12    gt  It shall not be composed of one kind of character    gt  It shall not be matched with the current value   As desc
107. es to reduce  the chance of attacking associated with unnecessary session connection  by ending the session  after the panel automatic logoff time elapses with FTA_SSL 8  when it logs in from the panel   The change in the panel auto logoff time is limited to the administrator by FMT_MTD 1 3       lt Necessary requirement for managing the identification and authentication information of the  user gt    When  the machine authentication  is chosen in a method of the user authentication by  FMT_MTD 1 1   the initial registration of a user password in the user s registration is  permitted only by the administrator    When  the machine authentication  has been selected in the method of the user authentication   the registration of the user ID in the user registration is permitted to the administrator by  FMT_MTD 1 10   When the  external server authentication   has been selected in the user  authentication method  the user who is authenticated the identification is permitted from an       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   68   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       external server and registered automatically by this requirement   This corresponds to the  user ID registration of the  external server    At this registration  the external server  accessing TOE is identified the
108. ese managements  FMT_SMR 1 2  maintains an administrator and  FMT_SMR 1 3  maintains a user  Moreover  FMT_SMF 1 specifies these management    functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O CONFIG  Access limitation to an management function   This security objective limits the setting related to the SMTP server  the setting related to the  DNS server  the setting related to the Enhanced Security function  the backup function  and  the restorations function to the administrator  and needs various requirements to limit the    access to a series of setting function and the management function      lt Management of network setting gt    When the administrator attribute is associated with the task of substituting the use   FDP_ACC 1 3  and FDP_ACF 1 3  permits the task of substituting the user to operate the  SMTP server group object  DNS server group object  settings for the MFP address group  object  PC FAX operation setting object  and transmission address data object      lt Operation limitation of Backup and restoration function gt    When the administrator attribute is associated with the task of acting the use by FIA_ATD 1   and FIA_USB 1  the task of acting the user is permitted the back up operation of      the user box files by FDP_ACC 1 1  and FDP_ACF 1 1       the secure print files by FDP_ACC 1 2  and FDP_ACF 1 2       the ID  amp  print files by FDP_ACC 1 4  and FDP_ACF 1 4     In addition  t
109. ess control  Hierarchical to   No other components  Dependencies    FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FMT_SMF 1  FMT_SMF 1     FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 4      FMT_MSA 1 3  Management of security attributes    FMT_MSA 1 1 3     The TSF shall enforce the  assignment  access control SFP  information flow control SFP to restrict the  ability to  selection  change_default  query  modify  delete   assignment  other operationell the security  attributes  assignment  et of security attributes  to  assignment  the authorized identified roles     assignment  list of security attributes     User attributes of user box that is set the  Account ID     selection  change default  query  modify  delete   assignment  other operations     modify  modify to luser ID    public  or other  account ID    assignment  the authorized identified roles       User who is permitted to use that account    Administrator   assignment  access control SFP  information flow control SFP    User box access control  Hierarchical to   No other components  Dependencies   FDP_ACC 1 or FDP_IFC 1  FDP_ACC 1 1     FMT_SMF 1  FMT_SMF 1     FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 6      FMT_MSA 3 1  Static attribute initialization    FMT_MSA 3 1 1     The TSF shall enforce the  assignment  access control SFP  information flow control SFP to provide   selection  choose one of  restrictive  permissive   assignment  other property  default values for  security attributes  User attributes of the user box  that are 
110. et Function     F RESET is a function that releases the lock by resetting the authentication failure frequency  when the account locks in the administrator authentication and CE authentication      1  CE Authentication function lock release processing function  The function is executed by the specific operation  and the lock is released by clearing the  failure frequency of the CE authentication to 0 after CE authentication lock time   As described above  FIA_AFL 1 1  is realized      2  Administrator authentication function lock release processing function  The function is executed by OFF ON of the main power supply  and the lock is released by  clearing the failure frequency of the administrator authentication to 0 after the administrator    authentication lock time   As described above  FIA_AFL 1 2  is realized     7 10  RTRUSTED PASS  Trust Channel Function     F TRUSTED PASS is a function that generates and achieves the Trusted Channel by using  SSL or TSL protocol when transmitting and receiving the following image file between client PC       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   108   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    and MFP      User box file  download from MFP to client PC      Image file that will be stored as a user box file  upload from client PC to MFP     
111. etwork from  public line via the port of Fax public line on Fax unit installed to MFP   This means that communication  like remote diagnostic function or illegal operation  command  except image data which is sent from public line network and forwarded to  internal network via the port of Fax public line of MFP is not forwarded to internal network   even though Fax unit is installed on MFP at the request of the organization   O FAX CONTROL prohibits the access to the data existing in internal network including a  general data from public line via the port of Fax public line   Also  OE FAX UNIT is regulated to install Fax unit which is the oprional part on MFP by  service engineer  so that O FAX CONTROL is supported   Accordingly  this organizational security policy is achieved        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   32 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       5  Extended Components Definition  5 1  Extended Function Component    In this ST  three extended function components are defined  The necessity of each security  function requirement and the reason of the labeling definition are described       FAD RIP 1   This is the security function requirement for the protection of the remaining information of   user data and TSF data     gt  Necessity of extension  The regulat
112. f the characters and by the number of digits  shown in the Table 12    gt  It shall not be composed of one kind of character        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   97 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target     gt  It shall not be matched with the current value   As described above  FIA_AFL 1 1   FIA_SOS8 1 1   FIA _UAU 6  FIA_UAU 7  FMT_MTD 1 9    FMT _ SMF 1 and FMT_SMR 1 1  are realized     7 3 2 2  Change of Administrator Password    Change the administrator password  Verify that the administrator password newly set  satisfies the following qualities      It is composed of the characters and by the number of digits  shown in the Table 12     It shall not be composed of one kind of character     It shall not be matched with the current value    As described above  FIA_SOS 1 1   FMT_MTD 1 6   FMT SMF1 and FMT_SMR 1 1  are  realized     7 3 2 3  Release of Lock of Administrator Authentication Function    Reset  0 clear  the number of authentication failure for the administrator authentication      If access is locked  the lock is released   As described above  FIA_AFL 1 2  is realized     7 3 2 4  Setup of CE Authentication Lock Time    Set the CE Authentication Lock Time between 1   60 minutes   As described above  FMT_MTD 1 9   FMT SMF 1 and FMT_SMR 1 1  are realized     7
113. f user box   gt  Specify the user attribute of a personal user box to the other user or the account that  registered    gt  Specify the user attribute of group user box to the user or the other account that  registered     Vv    Specify the user attribute of public user box to the user or account that registered    gt  Specify the user attribute of a personal user box or group user box to public        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   88   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    e Ifa user box password is not registered at the same time  the password shall be  registered  and the same processing as the change of user box password mentioned  above is performed     As described above  FDP_ACC 1 1   FDP_ACF1 1   FIA_S08 1 1   FMT MSA 1 1     FMT_MSA 1 2    FMT MSA 1 3    FMT_MSA 3 1   FMT _MTD 1 4   FMT _MTD 1 5    FMT _SMF1 and FMT_SMR 1 2  are realized     7 1 3 4  Release of Lock      Reset  clear all  the number of times of authentication failure for each users    gt   Ifthere is a user to whom access is locked  the lock is released      Reset  clear all  the number of times of authentication failure for all secure prints    gt   I  fthere is a secure print to which access is locked  the lock is released      Reset  clear all  the number of times of authentication failure
114. gally without the change of the network environment constitution by the malicious person  by  for instance  illegally being changed the address of the SMTP server that relays E mail for  the E mail  or illegally being changed the address of the DNS server where the domain name  is inquired when the address of the SMTP server is used for a search of the domain name   For FTP transmission  by being likely to use the mechanism of the search of the domain name  is concerned about the similar possibility of the incident might be occurred by E mailing   Furthermore  when the network setting which is related to the address of MFP is modified  illegally  it assumes the possibility to use the print function to the unauthorized entity from  client PC by the user who believes as TOE  Especially  it becomes a problem if a secure print  file or an ID  amp  print file which is required to be concealed from other users in the office is  transmitted to the unauthorized entity    In addition to this  the setting of PC FAX operation and the setting of TSI reception assumes  the possibility of unintended box file storing at FAX reception    On the other hand  O CONFIG regulates that the role to operate the network setting relating  to the transmission of TOE  the setting of PC FAX operation and the setting of TSI reception  are limited to the administrator  and so the possibility of this threat is removed   OE FEED BACK uses the application regulating that the feedback protected is returned for
115. hange of user password  Only the user who uses with the machine authentication as User  authentication method         4 tt associates with the external server authentication setting data that is set in the case of the use of the  external server  only Active Directly method is applicable  as the method of the user authentication function   Because it deals when there are plural user information management servers  there is a case in which plural sets  of authentication server information are included in the external server information setting data        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   87 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       User password is changed  It verifies whether the user password newly set have been  satisfied the following qualities     gt  Itis composed of the characters and by the number of digits  shown in the Table 12     gt  It shall not be composed of one kind of character     gt  It shall not be equal to the value which is currently set     e User deletion  User ID and user password is deleted    gt  When a personal user box that a concerned user owns exists  that personal user box is    automatically set to the public user box of  user attributes  public      e Change of the belonging account  The belonging account that related to user is changed  A
116. he restoration operation is permitted for     SMTP server group object  DNS server group object  MFP address group object  PC FAX  operation setting object  and transmission address data object by FDP_ACC 1 3  and  FDP_ACF 1 3     Moreover  the restoration operation  modification operation  is permitted only to the   administrator for the following data      the enhanced security setting data by FMT_MOF 1 1      the operation setting data of user authentication function  encryption strength setting data       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   74 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    for S MIME function and setting data of SNMP password authentication function by   FMT_MOF 1 2       the Trusted Channel setting data  encryption passphrase and account authentication   function operation setting data by FMT_MOF 1 3       the user attribute of the user box by FMT_MSA 1 1   FMT_MSA 1 2  and FMT_MSA 1 3       the user password by FMT_MTD 1 2       the user ID  the SNMP password  the panel auto logoff time  the authentication failure  frequency  the secure print password  the external authentication setting data  the account  ID  the account password  the S MIME certificate  the belonging account of user   administrator authentication lock time  TSI receiving setting  and WebDAV 
117. he same user ID     The standard is that MFP is not installed Fax unit and does not have a port of Fax public line   so there is not the access to the internal network through MFP  TOE provides the following  function  provided that Fax unit is installed in MFP     kl Fax unit control function  TOE prohibits access to the internal network  where MFP was connected to  from a port of  Fax public line through Fax unit     TOE makes effective use of the security function  encryption function  of ASIC  which is an  external entity  The following explains typical functions related to the external entity      J Utilization of ASIC  ASIC  an external entity  activates a function to encrypt the data in HDD as a function to  protect unauthorized bring out of data and so on when an encryption passphrase is set up     1 4 3 8  Enhanced Security Function    Various setting functions related to the behavior of the security function for the Administrator  function and the Service engineer function can be set collectively to the secure values by the       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   16 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       operation settings of the  Enhanced Security Function   Each value set is prohibited changing  itself into the vulnerable one individually  As the function th
118. hen the FADMIN   s unlock  function to the user is performed      When the user password newly set satisfies the following qualities  it is changed     gt  It is composed of the characters and by the number of digits  shown in the Table 12     gt  It shall not be composed of one kind of character     gt  This password is not equal to the currently setup password   As described above  FIA_AFL 1 4   FIA_SOS 1 8   FIA_UAU 2 3   FIA_UAU 6  FIA_UAU 7    FMT_MTD 1 2   FMT_SMF 1  and FMT_SMR 1 3  are realized     7 5  FBOX  User Box Function     F BOX permits a user who was identified and authenticated as a registered user to operate  and manage his her personal user box  When the account authentication is used  F  BOX permits  the user to operate and manage the group box associated with the account to which the user  belongs  F BOX is a series of security function such as the access control function authenticating  that the user is permitted to use the public user box when he she tries to access that box and    permitting various operations of the public user box and the user box files after the  authentication succeeds      lt Registration of user box by user operation gt   To register a personal user box  a group user box or public user box by selecting the user  attribute to the non registration user box ID selected  When it s registered  it is possible to select   User ID  or  Account ID  in the user attribute of the user box which have been specified  Public   as a default val
119. his function requirement     e O TRUSTED PASS  Usage of Trusted Channel   This security objective generates the Trusted Channel in the transmission and reception such  as a user box file  a secure print file  and an ID  amp  print file  and the requirement that relates  with the Trusted Channel is necessary  FTP_ITC 1 generates the Trusted Channel according  to the requirement from the other Trusted IT product  and it is applied to the transmission  and reception  such as the user box file  the secure print file  and the ID  amp  print file   This security objective is satisfied by the completion of this function requirement     e O CRYPTO MAIL  Usage of Encryption mail   This security objective regulates the encryption of a user box file when transmitting the user  box file by e mail  and various requirements related to the encryption are necessary   FCS_CKM 1 generates the encryption key  128  168  192 or 256 bits  by using Pseudorandom  number Generation Algorithm according to FIPS 186 2   FCS_COP 1 encrypts the user box file by using AES  encryption key  128  192 or 256 bits  of  FIPS PUB 197  it becomes a transmission data of S MIME   Also  the same requirement  encrypts the user box file by using 3 Key Triple DES  encryption key  168 bits  of SP800 67    By the same token  it becomes a transmission data of S MIME    FCS COP 1 encrypts these encryption keys are encrypted by RSA of FIPS 186 2 that is a  public key of S MIME certificate of each destination   This security 
120. hose user attributes of  the object attributes are equal to those of the subject attributes  user ID    FDP_ACF 1 3 4   The TSF shall explicitly authorise access of subjects to objects based on the following supplemental rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects     assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects   A task substituting for a user with the administrator attributes is permitted to back up ID  amp  print files   FDP_ACF 1 4 4   The TSF shall explicitly deny access of subjects to objects based on the  assignment  rules  based on  security attributes  that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects                                            None  Hierarchical to   No other components  Dependencies   FDP_ACC 1  FDP_ACC 1 4     FMT_MSA 3  FMT_MSA 3 4    FDP_IFC 1 Subset information flow control  FDP_IFC 1 1          The TSF shall enforce the  assignment  information flow control SFP on lassignment  List of subjects              Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   42 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          information  and oper
121. ia       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   80   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AOEDOY0 0100 GMOo 12    Functional  Requirements  Component for   this S    FDP_ACF 1 3     FDP_IFC 1    FDP_IFF 1    Dependencies on CC Part 2    FDP_ACF 1  FDP_ACF 1  FDP_ACF 1  FDP_ACF 1  FDP_ACC 1   FMT_MSA 3  FDP_ACC 1   FMT_MSA 3  FDP_ACC 1   FMT_MSA 3    FDP_ACC 1   FMT_MSA 3  FDP_IFF 1  FDP_IFC 1   FMT_MSA 3    Security Target    Dependencies Relation in this ST    is difficult  so it is not necessary to cancel the  Encryption Key     FDP_ACF1 1          FDP_ACF 1 3   FDP_ACF 114   FDP_ACC 1 1    FMT_MSA 3 1   FMT_MSA 3 3   FDP_ACC 1 2   FMT_MSA 3 2   FDP_ACC 1 3    lt The reason not to apply FMT_MSA 3 gt   There is no necessity for applying this requirement  because the object attribute doesn t exist   FDP_ACC 1 4   FMT_MSA 3I 4   FDP_IFC 1     lt The reason not to apply FMT_MSA 3 gt   There is no necessity for applying this requirement    because the security attribute is initialized outside     FIA_UAU   FIA_UAU   FIA_UAU   FIA_UAU   FIA_UAU   FIA_UAU   FIA_UAU     FIA_AFL 1 8  FIA_UAU     FIA_UAU  None  None  None  None  None  None  None  FIA_UID 1  FIA_UID 1  FIA_UID 1  FIA_UID 1  FIA_UID 1  FIA_UID 1  None    FIA_UAU 7 FIA_UAU 1    FIA_UID 2 1  None  FIA_UID 2 2  None  FIA_UID 2 3  None    Bele e Jefe              
122. ic user box access control     TOE permits the registered user the reading operation of the public user box    TOE permits the user function of the public user box only to the user who is permitted the  use of this public user box    TOE permits the user function of the user box file in the public user box only to the user who  is permitted the use of this public user box     O GROUP BOX  Group user box access control     TOE permits the user function of the group user box that this account owns only to the user  who is permitted the use of this account   TOE permits the user function of the user box file in the group user box that this account    owns only to the user who is permitted the use of this account     O SECURE PRINT  Access control for secure print files and ID  amp  print files     TOE permits the print of a secure print file only to the user who was allowed to use the file   TOE permits the print of an ID  amp  print file only to the user who registered that file     O CONFIG  Access limitation to management function     TOE permits only the administrator the operation of the following functions     The setting function related to the SMTP server  The setting function related to the DNS server  The setting function related to the address of MFP  Backup function   Restoration function    The setting function of Encryption function       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   23 111    bizhub C360   bizhubC280   bushub 
123. ies of IT Security Functional Requirements    The dependencies of the IT security functional requirements components are shown in the       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   79 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       following table  When a dependency regulated in CC Part 2 is not satisfied  the reason is  provided in the section for the  dependencies Relation in this ST      Table 10 Dependencies of IT Security Functional Requirements Components  N A   Not Applicable    Functional  Requirements  Component for  this ST    Dependencies on CC Part 2 Dependencies Relation in this ST    FCS_CKM 2 or FCS_COP 1    FCS_COP 1  only partial event    FCS_CKM 4  lt The reason not to fulfill partially FCS_CKM 2 or  FCS_COP 1 gt   The cryptographic operation is performed using key  generated Konica Minolta HDD cryptographic key  generation algorithm in the IT environment by  FIT_CAP 1 1   TSF only uses this capability  and there   FCS _CKM 1 is no necessity of the distribution and cryptographic   operation      lt The reason not to apply FCS_CKM 4 gt    The encryption key is regularly kept for the stored   data  Moreover  an arbitrary access to the storage   medium is difficult  and there is no necessity of the   encryption key cancellation    FCS_CKM 1 or FDP_ITC 1   FCS_CKM 1  only
124. ification function of service engineer password by service engineer     Modification function of administrator password by service engineer     Stop function of Enhanced Security function by service engineer     Modification function of CE authentication lock time by service engineer     Operation function of Maintenance function by service engineer     Overwrite function for the default value of the user attribute of the user box by the user      Modification function of user password when method of user authentication is machine  authentication by user     Registration function of user box password by user     Modification function of user attribute of user box by user     Registration function of Belonging Account of user oneself by user who is permitted the use of the  account     User box registration function by user     Automatic Personal user box registration function by user box stored job that specifies unregistered  box by user     Machine non registered users  user ID automatic registration function with external server when  user authentication method is external server authentication     Registration function of secure print password according to secure print file registration by user     Modification function of user attribute of user box by user who is permitted the use of public user box     Modification function of user box password of the user box by user who is permitted the use of public          user box    Modification function of the concerned user box
125. igyo Software   English Name     bizhub C360   bizhub C280   bizhub C220   ineot 360   ineo  280    ineo t 220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software   AOEDOY0 0100 GM0 12   Software   KONICA MINOLTA BUSINESS TECHNOLOGIES  INC     This paragraph explains the usage  main security functions  and operational environment of    TOE     1 3 1  TOE Type    bizhub C360   bizhub C280   bizhub C220   ineot 360   ineo  280   ineo  220   VarioLink 3622c    VarioLink 2822c   VarioLink 2222c control software  which is the TOE  is an embedded software  product installed in the flash memory on the MFP controller to control the operation of the whole    MFP     1 3 2  Usage of TOE and Main Security Functions    bizhub C360  bizhub C280  bizhub C220  ineo  360  ineot 280  ineot 220  VarioLink 3622c   VarioLink 2822c and VarioLink 2222c are digital multi function products provided by Konica    Minolta Business Technologies  Inc   composed by selecting and combining copy  print  scan and  FAX functions   Hereinafter all the products are referred to as  MFP    TOE is the    control  software for bizhub C360   bizhub C280   bizhub C220   ineot 360   ineot 280   ineot 220      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved     6 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       VarioLi
126. ilure authentication in the  authentication of the user who is permitted the use of the group user box    When FIA_ATD 1 and FIA_USB 1 relates to the user box ID under the task to act for user   FDP_ACC 1 1  and FDP_ACF 1 1  permits the user box file that has a corresponding object  attribute to the account ID and the user box ID of the subject attribute the operation such as    print  download  transmissions  movement and copy      lt Necessary requirement to manage the group box gt    FMT_MAS 1 3  permits the modification operation of the user attribute of the user box that is  set  account ID  to the user who is permitted the access to the group user box    For the user box attribute of the user box file  the user box attribute value of the selected user  box as storage is set by FMT_MSA 3 3       lt Necessary requirement to manage the subject attribute related with the group user box gt   FMT_MTD 1 11  restricts the registration of the account ID and account password only to the  administrator  Also  FMT_MTD 11 3  restricts the modification of the account ID and account  password only to the administrator    FMT_MTD 1 12  restricts the registration of the belonging account assigned to the user  to  the administrator and to the user who is permitted the use of the account    FIA_SOS 1 1  verifies the quality of the account password       lt Management of the account authentication method gt   FMT_MOF 1 3  restricts the behavior management of the account authentication func
127. ime passed from specific operation  the release process is performed                              Hierarchical to   No other components  Dependencies   FIA _UAU 1  FIA_UAU 2 1                  FIA_AFL 1 2  Authentication failure handling    FIA_AFL 1 1 2     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Jet of authentication events     Authentication for accessing the administrator mode    Re authentication for changing the administrator password   selection   assignment  positive integer number   an administrator configurable positive integer  within lassignment  range of acceptable values      assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 2   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  ist of actions    selection  met  surpassed   Met    assignment  Jet of actions    lt Action when it is detected gt      Log otf from the authentication status of the administrator mode if it is  and lock the authentication   function which uses the administrator password      If it s not under the authentication status  lock the authentication function which uses the   administrator password    lt Operatio
128. ing confidential information    This condition assumes each password and encryption passphrase using for the use of TOE  should not be leaked by each user    OE SECRET regulates that the administrator makes the user to execute the operation rule  concerning the secure print password  user box password  user password  and account  password and that the administrator executes the operation rule concerning the  administrator password  SNMP password  encryption passphrase  account password  and  WebDAV server password  It also regulates that the service engineer executes the operation  rule concerning the CE password  and that the service engineer makes the administrator to  execute the operation rule concerning the administrator password  so that this condition is  realized        A SETTING  Enhanced Security Function Operational Setup Condition   This condition assumes the enhanced security function operational settings condition is  satisfied   OE SETTING SECURITY regulates that this is used after the administrator activates the  enhanced security function  so that this condition is realized     4 3 3  Sufficiency of Threats    The security objectives against threats are described as follows        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   28 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target    e
129. ing user identification and authentication      lt Necessary requirement for identification and authentication of the user gt    It identifies and authenticates that the user who accesses is a registered user by FIA_UID 2 3   and FIA_UAU 2 3     FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1  8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1  4  locks the authentication function for that user from then on   This lock status is released by the administrator s release operation    FMT_MOF 1 2  permits only the administrator the selection of the user authentication  methods which are  Machine authentication  and  External server authentication    FMT_MTD 1 3  permits only the administrator the setting  modification  of the threshold of  the Authentication failure frequency which is the trial frequency of the failure authentication  in the user authentication    FIA_SOS 1 5  secures the quality verification of the session information used in the user  authentication via the network  and FIA_SOS 2 secures the quality of the session information  which is generated and used      lt Necessary requirements for managing session of user who is identified and authenticated gt   The duration of session of the user who is identified and authenticated contribut
130. ion for the protection of the TSF data remaining information is necessary  But  the security function requirement to explain the protection of the remaining information  exists only in FDP_RIP 1 for the user data  There is no security function requirement to  satisfy this requirement     gt  Reason for applied class  FAD   There is no requirement to explain both of the user data and the TSF data with no  distinction  Therefore  new Class was defined     gt  Reason for applied family  RIP   As this is the extension up to the TSF data by using the content explained by the relevant  family of FDP class  the same label of this family was applied     e FIT_CAP 1   This is the security function requirement for regulating the necessary ability for TOE to use   effectively the security function of the external entity  IT environment     gt  Necessity of extension  In case of TOE using the external security functions  the external security function to be  surely secure is important  but TOE ability to provide is very important in order to use  correctly the external security function  But there is no concept as this requirement in the  security function requirements     gt  Reason for applied class  FIT   There is no such concept in CC part 2  Therefore  new Class was defined     gt  Reason for applied family  CAP 1   As similar to class  there is no such concept in CC part 2  Therefore  new Family was  defined     5 1 1  FAD_RIP 1 Definition       Class name  FAD  Protection of all d
131. irement to keep the administrator secure gt    gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt    gt  refer to set service     lt Role and controlling function for each management gt    As the role of doing these managements  FMT_SMR 1 2  maintains an administrator and  FMT_SMR 1 4  maintains a user permitted the use of the user box  FMT_SMF 1 specifies  these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O GROUP BOX  Group user box access control   This security objective permits the browser of the group box only to the user who is permitted  the use of the account  and limits the operation of the user function of the box file in the group  user box  set of the group box only to the user who is permitted the use of the group user box     and requires various requirements that relate to the access control      lt User box access control  a group user box  gt    After the user has been identified and authorized  the user ID is associated with the task of  acting a use by FIA_ATD 1 and FIA_USB 1 And after the account has been authorized  the  account ID is associated with the task of acting a use by FIA_ATD 1 and FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  permits a task to act for the user to operate the list to the  user box  group user box  where the user attribute corresponded with the Account Name   account ID  in the security attribute of the subjec
132. is a user permitted the use of a user  box concerned respectively      Provides the user box authentication mechanism that is authenticated by the user box  password that consists of the character shown in Table 12       After the user box is authenticated to the access from the network  it provides the user box  authentication mechanism using the session information besides the user box password     gt  According to protocol  it utilizes the 101   session information or more  or generated and  uses the 101   session information or more      Return     for each character as feedback for the entered user box password      Resets the number of authentication failure when succeeding in the authentication     gt  Incase of the access from the panel  when it fails in the authentication  an input from the  panel is not accepted for five seconds      When the authentication failure that becomes the 1 3 times in total is detected for the  public user box concerned  the authentication function to the public user box concerned is  locked     gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function      The lock of the authentication function is released by the lock release function to the public  user box of FADMIN executed    As described above  FIA_AFL 1 6   FIA_AFL 1 8   FIA_SOS 1 5   FIA_SOS 2  FIA_UAU 2I 5     FDP_UAU 7 and FIA_UID 2 5  are realized     The following is a function that the user who is permitte
133. is permitted to use of the account  FMT_SMR 1 2 6   The TSF shall be able to associate users with roles   Hierarchical to   No other components  Dependencies   FIA _UID 1  FIA_UID 2I 6                              6 1 1 5  TOE Access    FTA_SSL 3 TSF initiated termination    FTA_SSL 3 1  The TSF shall terminate an interactive session after a lassignment  time interval of user inactivity     assignment  time interval of user inactivity     Time decided from the final operation depending on the panel auto logoff time  1 9 minute s  while a  administrator or a user is operating on the panel  Hierarchical to   No other components  Dependencies   No dependencies                         6 1 1 6  Trusted Pass Channel    FTP_ITC 1 Inter TSF trusted channel    FTP_ITC 1 1  The TSF shall provide a communication channel between itself and a other trusted IT product that is  logically distinct from other communication channels and provides assured identification of its end  points and protection of the channel data from modification or disclosure    FTP_ITC 1 2  The TSF shall permit  selection   the TSF the other trusted IT product  to initiate communication via the  trusted channel    selection   the TSF the other trusted IT product    The other trusted IT product   FTP_ITC 1 3  The TSF shall initiate communication via the trusted channel for  assignment   et of functions for which  a trusted channel is required                           assignment   et of functions for which a trusted 
134. istrator Function           0  cccccceeceeeeeee cece eeeeeeeeceaeaeeeeeeeeeeeaaaaeeaeeeeeseseeecceaeeeeeeeeteneeas 85  7 1 1  Administrator Identification Authentication FUNCTION         cccccccceetceeeseneeeetenneeeeteneeeeseneeeeeenesesseneeeseneeeteneseneas 85  7 1 2  Auto Logoff Function of Administrator Mode A 86  7 1 3  Function Supported in Administrator Mode  u    cecccccccesceeeseeeeneeceneeteneeteaeeseneeseaeeseaeeceaeeseaeeseaeessaeeseaeesneteteaeenenes 86       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   3 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c    Control Software AOEDOYO0 0100 GMO0 12 Security Target  7 2  F ADMIN SNMP  SNMP Administrator Function                 ccccceece cece cece eeeeeeeeceeeeeeeeeseeeeeaeeeeeeeeteneaes 95  7 2 1  Identification and Authentication Function by SNMP Password       cccccscccesceceteteneeceneeteeeteaeeseneeseeeseneeeenneteate 95  7 2 2  Management Function using NM    96  7 3  F SERVICE  Service Mode Function                ccccccccceccceeeeeeeeeeeeee ease eeeeeeseseneaaeeseeeeeeeseseseeeaeeeeeeeeeee 96  7 3 1  Service Engineer Identification Authentication Fumchon  97  7 3 2  Function Supported in Service Mode A 97  7 4  USER   User  FUNCtION  tinia sweetie heerlen  98  7 4 1  User Identification and Authentication FUNCTION       ceeccceeseeeeenneeetenneeeeteneeeenenaeeetenaeeesnenaeeesenaeeetsn
135. its own  password  When the external server authentication is effective  this function cannot be applied    The user password is changed when it is re authenticated that the user is a user and the newly  setup password satisfies the quality      The user authentication mechanism which authenticates the user by the user password  consisting of the characters shown in Table 12 shall be usable      When authentication has succeeded  the authentication failure frequency is reset      When re authentication is performed  in the case of access from the panel          is returned to  the entry of the user password for each character as feedback        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   100   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target         When authentication failure which results in the first  second  or third time is detected by  each authentication function utilizing the user password of a user  all the authentication  functions utilizing the user password of the user are locked out   Log in by the user is denied   Change operation of the user password is denied      gt  The maximum number of times of failure frequency is specified by the administrator by the  unauthorized access detection threshold setup function       The lock out state of the authentication function is released w
136. lated to assignment  List of authentication events     assignment  Let of authentication events        Authentication when it accesses service mode from the panel     Authentication when it accesses administrator mode from the panel     User authentication when user accesses TOE from the panel     Account authentication when user accesses TOE from the panel     Authentication when it accesses secure print file from the panel     Authentication when it accesses Public user box from the panel from the panel   selection   assignment  positive integer number   an administrator configurable positive integer  within lassignment  range of acceptable values       assignment  positive integer number    1   FIA_AFL 1 2 8   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions     selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt   Deny all access from the panel                                      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   47 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target           lt Operation for recovering the normal condition gt   Automatically release the lock after 5 seconds   Hierarchical to   No other components  Dependencies   FIA_UAU 1
137. led TOE  furthermore  the operation of the group user box and  user box file in the group user box is restricted only to the permitted user by O GROUP BOX   so that the possibility of the threat is removed  When the user information management  server is used  the possibility of the threat is reduced because the user identification and  authentication function is operated through O AUTH CAPABILITY supporting the operation  for the user identification and authentication function by the user information management  server of Active Directory and through OE SERVER setting to use the user management by  the administrator   OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and account s authentication  and  OE SESSION also requires the log off operation after the operation ends  so that  O REGISTERED USER and O GROUP BOX are supported sufficiently   Accordingly  this threat is countered sufficiently     e T ACCESS SECURE PRINT  Unauthorized access to a secure print file or an ID  amp  print file  using the user function   This threat assumes the possibility that an unauthorized operation is done to the secure print  and ID  amp  print using user function   O REGISTERED USER assumes that only the user to whom TOE was registered is  permitted to use MFP installing TOE  furthermore  the operations of the secure print and ID   amp  print are limited only to the authorized user by O SECURE PRINT  so that
138. licitly deny access of subjects to objects      The TSF shall explicitly deny access of subjects to objects based on the  assignment  rules  based on security        assignment  rules  based on security attributes  that explicitly deny access of subjects to objects           None  Hierarchical to   No other components  Dependencies f FDP_ACC 1  FDP_ACC 1 2     FMT_MSA 3  FMT_MSA 3 2            FDP_ACF 1 3  Security attribute based access control    FDP_ACF 1 1 3        The TSF shall enforce the  assignment access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes         lassignment  list of subjects and objects controlled under the indicated SFP  and for each  the  SFP relevant security attributes  or named groups of SFP relevant security attributes    lt Subject gt   lt Subject attributes gt      Task substituted for a user  gt   Administrator attributes     lt Object gt      SMTP server group object     DNS server group object     MFP address group object     PC FAX operation setting object     Transmission Address data object      No Object Attribute   assignment  access control SFP      Setting management access control   FDP_ACF 1 2 3    The TSF shall enforce the following rules to determine if an operation among controlled subjects and  controlled objects is allowed   assignment  rules governi
139. ment  other operationell                             modity   assignment  the authorized identified roles     Service Engineer  Hierarchical to   No other components  Dependencies    FMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 1         FMT_MTD 1 10  Management of TSF data    FMT_MTD 1 1 10   The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear   assignment   other operationell the  assignment  Let of TSF data  to  assignment the authorized identified roles                     Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   59 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMO0 12 Security Target           assignment  list of TSF data     User ID    selection  change_default  query  modify  delete  clear   assignment  other operationell    assignment  other operations    Registration        assignment  the authorized identified roles     Administrator  External server       Hierarchical to   No other components          Dependencies   EMT_SMF 1  FMT_SMF 1    FMT_SMR 1  FMT_SMR 1 2   FMT_SMR 1 5            FMT_MTD 1 11  Management of TSF data    FMT_MTD 1 1 11        The TSF shall restrict the ability to  selection  change_default  query  modify  delete  clear  assignment   other operationell the  assignment  list of TSF data  to  assignment  the authorized identified roles       
140. n for recovering the normal condition gt                                      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   44 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target            Perform the lock release function offered within the service mode       Perform the boot process of the TOE   Release process is performed after Administrator  authentication lock time by the boot process      Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 2               FIA_AFL 1 3  Authentication failure handling    FIA_AFL 1 1 3     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Jet of authentication events      Authentication for accessing the MIB object through SNMP     Re authentication for changing the SNMP password   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values       assignment  range of acceptable values    an administrator configurable positive integer within 1 3   FIA_AFL 1 2 3    When the defined number of unsuccessful authentication attempt
141. n of secrets  FIA_SOS 1 1 2        The TSF shall provide a mechanism to verify that secrets  SNMP Password  meet  assignment  a  defined quality metricl            assignment  a defined quality metric       Number of digits  8  digits or more    Character type  possible to choose from 90 or more characters                  Rule     Do not compose by only the same type of characters    2 Do not set the same password as the current setting after change   Hierarchical to   No other components  Dependencies   No dependencies    FIA_SOS 1 3  Verification of secrets    FIA_SOS 1 1 3     The TSF shall provide a mechanism to verify that secrets  User Password  meet  assignment  a defined  quality metric             assignment  a defined quality metric       Number of digits  8  digits or more    Character type  possible to choose from 188 or more characters                     Rule  OI Do not compose by only the same type of characters    2  Do not set the same password as the current setting after change   Hierarchical to   No other components  Dependencies   No dependencies  FIA_SOS 1 4  Verification of secrets  FIA_SOS 1 1 4        The TSF shall provide a mechanism to verify that secrets  Encryption passphrase  meet  assignment  a  defined quality metricl         assignment  a defined quality metric       Number of digits  20  digits    Character type  possible to choose from 83 or more characters    Rule  OI Do not compose by only the same type of characters   Cl Do not set the s
142. nal requirements components  and the same labels will  be used as well  The new additional requirement which is not described in CC part 2 is newly  established and identified with the label that doesn t compete with CC part 2      lt  Method of specifying security function requirement  Operation   gt   In the following description  when items are indicated in  italic  and  bold   it means that they       are assigned or selected  When items are indicated in  italic  and  bold  with parenthesis right       after the underlined original sentences  it means that the underlined sentences are refined  A       number in the parentheses after a label means that the functional requirement is used       repeatedly    lt Method of clear indication of dependency gt   The label in the parentheses      in the dependent section indicates a label for the security  functional requirements used in this ST  When it is a dependency that is not required to be used  in this ST  it is described as  N A  in the same parentheses   6 1  TOE Security Requirements    6 1 1  TOE Security Function Requirements    6 1 1 1  Cryptographic Support    FCS_CKM 1 Cryptographic key generation    FCS _CKM 1 1       The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation  algorithm  assignment  cryptographic key generation algorithm  and specified cryptographic key sizes   assignment  cryptographic key sizes  that meet the following   assignment  Jist of standards    
143. ng access among controlled subjects and  controlled objects using controlled operations on controlled objects     assignment  rules governing access among controlled subjects and controlled objects using controlled  operations on controlled objects      A task act for a user who has a administrator attribute is permitted to set the SMTP server group   object  the DNS server group object  the MFP address group object  the PC FAX operation setting                         Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   41 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          object  and the transmission address data object and to operate the restoration   FDP_ACF 1 3 3   The TSF shall explicitly authorise access of subjects to objects based on the following additional rules    assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects       assignment  rules  based on security attributes  that explicitly authorise access of subjects to objects   None    FDP_ACF 1 4 3   The TSF shall explicitly deny access of subjects to objects based on the  assignment  rules  based on  security attributes  that explicitly deny access of subjects to objects     assignment  rules  based on security attributes  that explicitly deny access of subjects to objects        
144. nistrator configurable positive integer within 1 3  FIA_AFL 1 2 6   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  et of actions     selection  met  surpassed   Met   assignment  List of actions      lt Action when it is detected gt     While authentication is performed  log off from the authentication status of the user box  and lock  the authentication function for the concerned user box     Otherwise  lock the authentication function which uses the box password    lt Operation for recovering the normal condition gt       Perform the delete function of authentication failure frequency offered within the administrator  mode                             Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   46 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target          Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 5            FIA_AFL 1 7  Authentication failure handling  FIA_AFL 1 1 7     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment List of authentication events     assignment  Let of authentication even
145. nk 3622c   VarioLink 2822c   VarioLink 2222c  that controls the entire operation of MFP   including the operation control processing and the image data management triggered by the  panel of the main body of MFP or through the network    TOE supports the protection from exposure of the highly confidential documents stored in  MFP  Moreover  for the danger of illegally bringing out HDD  which stores image data in MFP   TOE can encrypt all the data written in HDD including image data using ASIC  Application  Specific Integrated Circuit   Besides  TOE has the function that deletes all the data of HDD  completely by deletion method compliant with various overwrite deletion standards at the time  of abandonment or the lease returns and the function that controls the access from the public  line against the danger using Fax function as a steppingstone to access internal network  So it    contributes to the prevention of information leakage of the organization that uses MFP   1 4  TOE Description  1 4 1  Roles of TOE Users  The roles of the personnel related to the use of MFP with TOE are defined as follows       User  An MFP user who is registered into MFP   In general  the employee in the office is assumed        Administrator  An MFP user who manages the operations of MFP  Manages MFP   s mechanical operations  and users   In general  it is assumed that the person elected from the employees in the office  plays this role        Service engineer  A user who manages the maintenance 
146. nsmission  FAX transmission  SMB transmission and WebDAV  transmission  the user box file     T ACCESS GROUP BOX  Unauthorized access to the group user box which used a user  function   Exposure of the user box file when a person or a user with malicious intent accesses the group  user box which the account where a user does not belong to owns  and moves  copies   downloads  prints and transmits  E mail transmission  FTP transmission  FAX transmission     SMB transmission and WebDAV transmission  the user box file     T ACCESS SECURE PRINT  Unauthorized access to the secure print file or ID  amp  print file by   utilizing the user function    e Secure print files are exposed by those malicious including users when he she prints ones to  which access is not allowed    e ID  amp  print files are exposed by those malicious including users when he she prints ones  which were registered by other users     T UNEXPECTED TRANSMISSION  Transmission to unintended address    e Malicious person or user changes the network settings that are related to the transmission  of a user box file  Even an addressee is set precisely  a user box file is transmitted  the  E mail transmission or the FTP transmission  to the entity which a user does not intend to   so that a user box file is exposed     lt The network settings which are related to user box file transmission gt    gt  Setting related to the SMTP server   gt  Setting related to the DNS server   e Malicious person or user changes the netw
147. nter Management Funchoni   110  7 15 1  Identification and Authentication Function by WebDAV Server Password  110  7 15 2  Management Function Utilizing Webfi  y 110       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   4 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c    Control Software AODEDOYO0 0100 GMOo 12 Security Target          List of Figures   eneen  Figure 1 An example of MFP   s use environments             eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseaeeeeeseeaeeeeeseaeeeensaeees 8  Figure 2 Hardware composition relevant to TOE            eeeeceeeeseeeeeeeeeeeeeeeeeeeeeeseeeeeeeeaaeeeeeseeeeeeeeaeees 9          List of Tables Innen  Table 1 Conformity of security objectives to assumptions  threats  and organization security   POlICIOS 23s cxcae cet us ooadee eek Salts Dedves steel Vel beg cia dinaae lS E A deii 27   Table 2 Cryptographic Key Generation  Relation of Standards Algorithm Key sizes             00 n    37  Table 3 Cryptographic Operation  Relation of Algorithm Keysizes Cryptographic Operation        37  Table 4 User Box Access Control  Operational Ust    38  Table 5 Secure Print File Access Control  Operational List 0 00 00    eeecseeeeeseeeeeeeeaeeeeesneeeetenaaes 38  Table 6 Setting Management Access Control  Operational Uet eree nerrerer ne 39  Table 7 ID  amp  Print file Access Control  Operational List            eee eeeseeeeeeneeeeeeen
148. ntrol Software AODEDOY0 0100 GMO0 12 Security Target       network  and FIA_SOS 2 secures the quality of session information that is generated and  used  FMT_MTD 1 6  restricts the change in the administrator password to the administrator  and the service engineer  When the administrator changes the administrator password   FIA_UAU 6 re authenticates it  In this re authentication  when the failure authentication  reaches 1 3 times  FIA_AFL 1 2  logoffs it if it s under authentication  and releases the  authentication status of the administrator from then on  And it locks all the authentication  functions to use the administrator password  The release function is executed by starting  TOE with turning OFF and ON the power supply  so that the lock is released after the  administrator authentication lock time passed      lt Role and management function for each management gt   FMT_SMR 1 1  have service engineer maintain the role to do these management  and  FMT_SMR 1 2  have the administrator do the same  Additionally  FMT_SMF 1 specifies these    management functions      gt  set service  Set of necessary requirement to keep service engineer secure    lt Identification and Authentication of a service engineer gt   FIA_UID 2 1  and FIA_UAU 2I 1  identifies and authenticates that the accessing user is a  service engineer   FIA_UAU 7 returns     every one character entered as the feedback protected in the panel   and supports the authentication   FIA_AFL 1 8  refuses all the input
149. objective is satisfied by the completion of these plural function requirements     e O  FAX CONTROL  Fax unit control   This security objective regulates to prohibit an access to internal network which the MFP  concerned connects with  from public line via the port of Fax public line   This means that communication  like remote diagnostic function or illegal operation  command  except image data which is sent from public line network and forwarded to  internal network via MFP is not forwarded to internal network  and various requirements  related to the flow control of Fax unit are necessary   Applying FDP_IFC 1 and FDP_IFF 1  the flow control not to send data  except the image data  which the reception function from a public line received  to internal network is achieved   This security objective is satisfied by the completion of this function requirement        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   77 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       e O AUTH CAPABILITY  Support action to use user identification and authentication  function   This security objective regulates that the user identification and authentication function is  used by the user information management server that is the entity of a necessary IT  environment for the security maintenance of TOE  and needs vario
150. of MFP  Performs the repair and adjustment of MFP   In  general  the person in charge of the sales companies that performs the maintenance service of  MFP in cooperation with Konica Minolta Business Technologies  Inc  is assumed        Responsible person of the organization that uses MFP  A responsible person of the organization that manages the office where the MFP is installed   Assigns an administrator who manages the operation of MFP       Responsible person of the organization that manages the maintenance of MFP  A responsible person of the organization that manages the maintenance of MFP  Assigns  service engineers who manage the maintenance of MFP     Besides this  though not a user of TOE  those who go in and out the office are assumed as  accessible persons to TOE        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   7 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMO0 12 Security Target       1 4 2  Physical Scope of TOE  1 4 2 1  Use Environment    Figure 1 shows a general environment in which the usage of MFP equipped with TOE is    expected  Moreover  the matters expected to occur in the use environment are listed below               Office       MFPre      TOE             SMTP Server DNS Server FTP Server              vn  Ze    Public line                                                                    
151. on     gt  Either failure of authentication by the privacy password or authentication is detected as  one time of failure      The lock out state is released when the FADMIN   s unlock function is performed to the MIB  object       It is verified that the SNMP password which is newly set up satisfies the quality below     gt  This password is composed of the characters and by the number of digits shown in Table  12     gt  This password is not composed of one character only     gt  This password is not equal to the currently setup password    As described above  FIA_AFL 1 3   FIA_SOS 1 2   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1 3    FMT_SMEF1  and FMT_SMR 1 2  are realized     7 1 3 12  Setup of SNMP Password Authentication Function    The authentication method in the SNMP password authentication function is set to  Only       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   92 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    Authentication password  or the  Authentication password and Privacy password    As described above  FMT MOF 1 2   FMT _SMF 1 and FMT_SMR 1 2  are realized     7 1 3 18  Account Setup      Account registration  Account is registered by setting the account ID and registering the account password  It  verifies whether the account password newly set have been satisfied the following qu
152. on function by SNMPv1 and v2    gt  Itis selected whether to enable or disable the function to change MIB by SNMPv1 and v2      Operational Setup of Authentication Function when writing using SNMPv3   gt  The security levels of authentication or skipping authentication is selected    gt  For the security levels  either  only authentication password  or  authentication password    privacy password  is available      Setup of the encryption function   gt  Whether to activate or stop the function is selected    gt  An encryption passphrase is registered or changed when the function is activated      Setup of the user box collective management function   gt  It is selected whether to enable or disable this function      Setup of the print capture function   gt  A function to verify the print data received by MFP when the print function is faulty    gt  Itis selected whether to enable or disable this function     Setup of the network setting management reset function   gt  This function resets a series of items to factory default values   gt  It is selected whether to enable or disable this function      Setup of the trusted channel  SSL TLS encryption communications  function   gt  SSL TLS server certificates are generated or imported    gt  The encryption method used for communications is set up     Setup of the transmission address data   gt  Atransmission address or method used for box file transmission etc  is selected    gt  S MIME certificates are imported     Setup of the 
153. on the behalf of users when  authenticated with the access to the user box    lt Account Name gt     In the method not synchronized with User authentication  the account ID of the concerned account  associates to the task acting on the behalf of users when authenticated with the access to the  account     In the method synchronized with User authentication  the account ID that is set to the concerned  user associates to the task acting on the behalf of users when authenticated with the access to the  user    lt File attribute gt   The secure print internal control ID of the concerned secure print file associates to the task acting on  the behalf of users when authenticated with the access to the secure print file    lt User attribute gt   The user ID of the concerned user associates to the task acting on the behalf of users when  authenticated with the access to the user    lt Administrator attribute gt   The Administrator s attributes associate to the task acting on the behalf of users when authenticated  with the access to the Administrator        FIA_USB 1 3       The TSF shall enforce the following rules governing changes to the user security attributes associated  with subjects acting on the behalf of users   assignment  rules for the changing of attributes          assignment  rules for the changing of attributes               None  Hierarchical to   No other components  Dependencies   FIA_ATD 1  FIA_ATD 1           6 1 1 4  Security Management    FMT_MOF 1 1  Managemen
154. ork settings which set in MFP to identify MFP   itself where TOE installed  by setting to the value of the entity such as another unauthorized   MFP from the value of MFP  NetBIOS name  AppleTalk printer name  IP address etc  that   TOE is originally installed  so that secure print files or ID  amp  print files are exposed    e Malicious person or user changes the TSI receiving settings  A user box file is stored to the   entity which a user does not intend to  so that a user box file is exposed        e Malicious person or user changes the PC FAX operation settings  By changing the setting of  the storing for the public user box to store to common area for all users  a user box file is  stored to the entity which a user does not intend to  so that a user box file is exposed      This threat exists only in the case that the operation setting of PC FAX is meant to work as  the operation setting for box storing     6 An abbreviation of Server Message Block  A protocol to realize file sharing or printer sharing on Windows        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   21 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       T ACCESS SETTING  An unauthorized change of a function setting condition related to  security   The possibility of leaking user box files  secure print files  or ID  amp  p
155. password     Return  Resets the number of authentication failure when succeeding in the authentication     Not accept the access from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total for the concerned account is  detected  it locks all the authentication functions to the account        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   99   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target    7 4 2     7 4 3         gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function     The lock of the authentication function is to perform the lock release function to the  concerned account of FADMIN   As described above  FIA_AFL 1 7   FIA_AFL 1 8   FIA UAU 2 6   FIA_UAU 7 and  FIA_UID 2 6  are realized     When accessing from a network  the account is not authenticated after the user authentication  but the user and the account are processed with one sequence  When authenticating the account   the account ID is associated with the user ID  and the user ID and the account ID are measured  by the session information which is the same as user identification and authentication in the  account authentication  the synchronized method      Provides the user authentication me
156. r    gt  SMTP setting  setting of the SMTP server utilized by E mail transmission    gt  IP addresses  NetBIOS names  and AppleTalk printer names etc   e Backup or restore function of NVRAM and HDD   gt  This is performed through the network by using an application exclusive use for the  management installed in the client PC      Complete overwrite deletion function of HDD   gt  There are data deletion methods conformed to various military standards  ex  Military  Standard of United States Department of Defense    gt  When this function is started up  in conformity with a set method  the overwrite deletion is  executed for the overall area of HDD   e Format function of HDD   gt  A logical format is executable      Counter management function   gt  A function to manage the counter information such as the number of printed sheets for  each user through the WebDAV service or FTP service   Reference of user password and  account password is possible    e Management of FAX setup  when Fax unit is installed     gt  Setup of TSI    receiving   gt  Setup of FAX output at PC FAX receiving  Storing in Box or common Box area for all users  are available      The functions below are the operation setting functions related especially to the behavior of the  security function        4 An abbreviation of Transmitting Subscriber Identification  The same meaning of Identification of Subscriber s  Terminal  TSI receiving is the function that can designate the user box to be stored for each sub
157. r  Administrator    Hierarchical to   FIA_UID 1    Dependencies   No dependencies                   FIA_UID 2 3  User identification before any action    FIA_UID 2 1 3   The TSF shall require each user  User  to identify itself before allowing any other TSF mediated  actions on behalf of that user  User     Hierarchical to   FIA _UID 1   Dependencies   No dependencies                   FIA_UID 2 4  User identification before any action  FIA_UID 2 1 4     The TSF shall require each user  User who is permitted to use secure print file  to be successfully  identified before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use secure print file      Hierarchical to   FIA_UID 1    Dependencies   No dependencies                      FIA_UID 2 5  User identification before any action  FIA_UID 2 1 5     The TSF shall require each user  User who is permitted to use the public user box  to be successfully  identified before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use the public user box      Hierarchical to   FIA_UID 1    Dependencies   No dependencies                      FIA_UID 2 6  User identification before any action  FIA_UID 2 1 6     The TSF shall require each user  User who is permitted to use the account  to be successfully  identified before allowing any other TSF mediated actions on behalf of that user  User who is  permitted to use the account     Hierarchical to   FIA_UID 1    Depen
158. r box attributes of the user box  that selected as a target to store the user box file concerned    assignment  access control SFP  information flow control SFP    User box access control  FMT_MSA 3 2 3   The TSF shall allow the lassignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created    assignment  the authorized identified roles                                None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  N A    FMT_SMR 1  N A           FMT_MSA 3 4  Static attribute initialization    FMT_MSA 3 1 4   The TSF shall enforce the  assignment  access control SFP information flow control SFP to provide   selection  choose one of  restrictive  permissive  lassignment  other property  default values for the  security attributes  User attributes of ID  amp  print  that are used to enforce the SFP    selection  choose one of  restrictive  permissive  lassignment  other property      assignment  other property    Shall be equal to the values of the user attributes of the user who  registers that ID  amp  print file    assignment  access control SFP  information flow control SFP    ID  amp  print file access control  FMT_MSA 3 2 4                                Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   56   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c 
159. r password and secure print password confidential   e Keep the user box password and account password confidential between the users who  commonly utilize it   e Should not set the value that can be guessed for the user password  secure print password  and the user box password   e The user password and the user box password should be properly changed   e When the administrator changes the user password or the user box password  make the user  to change them promptly   The administrator executes the following operation   e Avoid setting an easy to guess value on the administrator password  account password   SNMP password  encryption passphrase  and WebDAV server password   e Keep the administrator password  account password  SNMP password  encryption  passpharse and WebDAV server password confidential   e Change the administrator password  account password  SNMP password  encryption  passphrase  and WebDAV server password appropriately   The service engineer executes the following operation   e Should not set the value that can be guessed for the CE password   e Keep the CE password confidential   e The CE password should be properly changed   e When the service engineer changes the administrator password  make the administrator to  change it promptly     OE SETTING SECURITY  Operational setup of Enhanced Security function   The administrator makes the setup of the enhanced security function effective for the operation  of TOE        Copyright c  2009 KONICA MINOLTA BUSINESS
160. r various settings are falsified   so that user box files  secure print files  or ID  amp  print files may leak    O CONFIG regulates that the use of the back up function and the restoration function is  permitted only to the administrator  so that the possibility of the threat is removed   OE FEED BACK uses the application regulating that the protected feedback is returned for  the entered password by the administrator authentication and OE SESSION is also       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   31 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       requested the log off operation after the operation ends  and so O CONFIG is sufficiently  supported   Accordingly  this threat is countered sufficiently     4 3 4  Sufficiency of Organizational Security Policies  Security objective corresponding to organizational security policies is explained as follows     e P COMMUNICATION DATA  secure communication of image file   This organizational security policy prescribes carrying out processing via trusted pass to a  correct destination or encrypting to ensure the confidentiality about the image file which  flows on a network in the case of the organization or the user expect to be protected  As this  corresponds as one s request  there is no need to provide secure communication function for 
161. rational Emironment   A 25  4 3  Security Objectives Rationale 2    cece ceeessceceeeeeeeceeeeeeeeeeeeeaneeeesesaaneceesaaeeseeseaeeseseenansenesssnaeenaas 27   ANS  1  NOCOSSILY ities siecle ation ape edie Se  ee ee A ee ee eet 27  43 2  SUTICIENCY  Tee TEE 28  eat TEEN 28  4 3 4  Sufficiency of Organizational Security Police  32   5  Extended Components Definition                  ccccesseeeeeeeseeeeeeeseeeeeeeeeeseeeeeessneeeeeesseeeeeseseeneeeeeees 33   5 1  Extended Function Component              cccceecececeeeeeeeceeeeeseaeeeeesaaeeneesaneeeeseagaeeceesaaeeceeneseeeesessenseneesas 33  E D FAD RIP A De tintin csc Fetsccesc chee assent sh E eae see 33  9 1 2  FIT  CAPA Definition sieeve hee ei Bae Pe Aa Da a A dena ee a ies 34   6     IT Security Requirements egene eit erica endl 36   6 1  TOE Security Heouirements kk 36  6 1 1  TOE Security Function Requirements        csccceeceeeteteneeteeeteneeteneeseneeseaeeseneeseaeeseneeseaeeseaeeseatessaeeseeeseatessueeteaeees 36  6 1 2  TOE Security Assurance Requirements         cccccecceeeneeceneeeeneeteeeteneeteaeeseaeessaeessaaeesanessaaecsaessaeeeseaeesneeseeeseneees 65   6 2  IT Security Requirements Rationale AANEREN ENEE 66  6 2 1  Rationale for IT Security Functional Requirements         eccecceetee cette eeneeeeneeeeeeeeaeeesseeesaaecseaeseaeeeseaeeeseeeaeeteaeees 66  6 2 2  Rationale for IT Security Assurance Heouirements   84   7  TOE Summary Specification acc  o sctection ste actin seh ieee ee 85   7 1  FADMIN  Admin
162. rator is authenticated to the access  from the network    gt  According to protocol  use the session information of more than 10   or generate and use  the session information more than 102     e Return     for each character as feedback for the entered administrator password     Resets the number of authentication failure when succeeding in the authentication        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   85   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target         In the case of access from a panel  it doesn t accept the input from a panel for five seconds  when failing in the authentication      Locks all the authentication functions to use the administrator password when detecting the  authentication failure that becomes 1 3 times at total in each authentication function by  using the administrator password   Refuse the access to the administrator mode    gt  The administrator specifies the failure frequency threshold by the unauthorized access  detected threshold setting function      EF  RESET works and the lock release function of the administrator authentication function in  F SERVICE is carried out  and the lock of authentication function is released   As described above  FIA_AFL 1 2   FIA_AFL 1 8   FIA_SOS 1 5   FIA_SOS 2  FIA_UAU 2 2    FIA_UAU 7 and FIA_UID 2 2  are realized    
163. rd which is newly set up satisfies the quality  below     gt  Itis composed of the characters and by the number of digits shown in Table 12    gt  It shall not be composed of one kind of character    gt  This password is not equal to the currently setup password   As described above  FIA_AFL 1 6   FIA_SOS 1 1   FIA_UAU 2 5   FIA_UAU 6  FIA_UAU 7   FMT_MTD 1 4   FMT_SMF 1  and FMT_SMR  114  are realized     7 5 3  Group User Box Function  7 5 3 1  Access Control Function for Group User Box    The task to act for the identified and authenticated user has the    Account ID  as the Account  Name that is associated with the identified and authenticated user  This task is permitted the  display of the list of the group user box which has a corresponding user attribute with this  account ID    As described above  FIA_ATD 1  FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 1  are realized     7 5 3 2  Access Control Function to User Box File in Group User Box    When the user box to operate is selected   User Box ID  of the user box is associated with the  task as a user box attribute in addition to the user attribute  This task is permitted  to the user  box file with the user box attribute corresponding to the user box attribute of subject attribute   the printing  the E mail transmission  include the S MIME transmission   the FTP transmission        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   104 111    bizhub C360   bizhubC280   bushub C220   ineo  36
164. re is no additional assurance component   2 4  Reference  e Common Criteria for Information Technology Security Evaluation Part 1  Introduction and  general model September 2006 Version 3 1 Revision 1 CCMB 2006 09 001  e Common Criteria for Information Technology Security Evaluation Part 2  Security  functional components September 2007 Version 3 1 Revision 2 CCMB 2007 09 002  e Common Criteria for Information Technology Security Evaluation Part 3  Security  assurance components September 2007 Version 3 1 Revision 2 CCMB 2007 09 003    e Common Criteria for Information Technology Security Evaluation  Evaluation  methodology September 2007 Version 3 1 Revision 2 CCMB 2007 09 004    3  Security Problem Definition    This chapter will describe the concept of protected assets  assumptions  threats  and    organizational security policies   3 1  Protected Assets    Security concept of TOE is  the protection of data that can be disclosed against the intention of       the user   As MFP is generally used  the following image file in available situation becomes the  protected assets        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   18 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       e Secure Print file  An image file registered by Secure Print   e ID  amp  print file  An image file saved as an ID
165. re used  the  authentication failure frequency is reset only when both passwords together succeeded in  the authentication        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   95 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target      When the authentication failure that becomes the 1 3 times at total in each authentication  function by using the SNMP password is detected  all the authentication functions to use the  SNMP password are locked   The access to the MIB object is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function    gt  In the case of both the Privacy password and the Authentication password are utilized   even though both passwords together fails in authentication  it is detected as one failure    e The lock status is released when the lock release function to the MIB object of F  ADMIN is  performed    As described above  FIA_AFL 1 3    FIA_UAU 2 2  and FIA_UID 2 2  are realized     7 2 2  Management Function using SNMP    When it is identified and authenticated that the user is an administrator by the SNMP  password  the access to the MIB object is permitted  and then the operation of the setting data  shown below is permitted to be done      1  Network Setup  Setup operation of the following se
166. reshold by the unauthorized access   detection threshold setting function       FE  RESET works or the lock release function of the administrator authentication function in  F SERVICE is carried out  so that the lock of the authentication function is released      Verify the new administrator password if the following qualities are satisfied    gt  Itis composed of the characters and by the number of digits  shown in the Table 12    gt  It shall not be composed of one kind of character    gt  It doesn t match with the current value    As described above  FIA_AFL 1 2   FIA_SOS 1 1   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1I 6     FMT _ SMF 1 and FMT_SMR 1 2  are realized     7 1 3 2  User Setup    e User Registration  Only the user who uses with the machine authentication as User  authentication method    User is registered by setting the user ID  Though user ID is composed of the user name and  the authentication server information     only user name is registered in case of the machine  authentication   and registering the user password  It verifies whether the user password  newly set have been satisfied the following qualities    gt  Itis composed of the characters and by the number of digits  shown in the Table 12    gt  It shall not be composed of one kind of character   While the external server authentication is effective  the user password cannot be registered   Also register the belonging account  account ID   and relate   The account setting is  necessary beforehand      e C
167. rforms access control by sharing a password set to the user box among users  and the group  box limits operations only for the users of the account that are permitted to use it        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   11 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target       TOE processes the following operation requests to a user box or image files in the user box that  is transmitted from the panel or the network unit through a network from a client PC     e Print  transmit  and download from a client PC  of image files in a user box    gt  The encryption of box file is possible in the E mail that is one of the transmission  methods    e Delete an image file in a user box  move copy it to other user boxes and copy it to USB  memory      Set a storing period of image files in a user box  delete automatically after the period passes       Change the name and password of a user box  or delete a user box      Set attributes of a user box  change the type of a personal user box  public user box  or group  box     1 4 3 3  User Authentication Function    TOE can limit the user who uses MFP  For access through the panel or the network  TOE  identifies and authenticates that the user is permitted to use the MFP by applying the user  password and user ID  When the identification and authentic
168. rget       box into the user box appointed is executed due to the same requirement  a user ID of the user  who executes a job concerned is appointed automatically    As for the box attribute of the user box file  the value consistent with the box attribute of the  user box which was selected as the file saved is set up by FMT_MSA 3 3       lt Necessary requirement to keep the administrator secure gt    gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt    As the role of doing these managements  FMT_SMR 1 2  maintains an administrator and  FMT_SMR 1 3  maintains a user permitted the use of the user box  FMT_SMF 1 specifies  these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O PUBLIC BOX  a public user box access control   This security objective permits the inspection of the public user box to all users  and limits  the setting of the public user box and the operation of the user box file in the public user box  only to the user who permitted the utilization of that public user box  And it needs the various    requirements regarding access control      lt User box access control  a public user box  gt    After the user has been identified and authorized  the user ID is associated with the task of  acting a use by FIA_ATD 1 and FIA_USB 1  FDP_ACC 1 1  and FDP_ACF 1 
169. ribed above  FIA_SOS 1 4   FIA_UAU 7  FIA_UAU 6  FMT_MTD 1 3   FMT_SMF 1    and FMT_SMR 1 2  are realized   7 1 3 11  Change of SNMP Password    The SNMP password  Privacy password and Authentication password  is changed  This is  performed when the newly setup password satisfies quality requirements  If the operation is not  performed from SNMP  change shall be permitted only when it is re authenticated that the user  is an administrator      For re authentication  a SNMP authentication mechanism which authenticates the user by  the SNMP password consisting of the characters shown in Table 12 shall be usable      When re authentication is performed  in the case of access from the panel          is returned to  the entry of the SNMP password for each character as feedback      When re authentication has succeeded  the authentication failure frequency is reset     gt  When authentication has succeeded by either the privacy password or the authentication  password  the authentication failure frequency is reset      When authentication failure which results in the first  second  or third time is detected by  each authentication function utilizing a SNMP password  all the authentication functions  utilizing the SNMP password is locked out   Access to the MIB object is denied  Use of the  change function of SNMP password is denied      gt  The maximum number of times of failure frequency is specified by the administrator by the  unauthorized access detection threshold setup functi
170. rint files rises because  those malicious including users change the settings related to the enhanced security function     T BACKUP RESTORE  Unauthorized use of backup function and restoration function   User box files  secure print files  or ID  amp  print files can leak by those malicious including users  using the backup function and the restoration function illegally  Also highly confidential data  such as passwords can be exposed  so that settings might be falsified     3 4  Organizational Security Policies    Recently  there are a lot of organizations that demand security of network in office  Although a  threat of wiretapping activities etc  in intra office LAN is not assumed in this ST  TOE security  environment that corresponds to the organization that demanded security measures in  intra office LAN is assumed  Moreover  although a stored data in a client PC and a server  existing in internal network or a general data flowing on internal network is not protected assets   TOE security environment that corresponds to the organization that prohibit the access to  internal network via Fax public line of MFP is assumed    The security policies applied in the organization that uses TOE are identified and described as  follows     P COMMUNICATION DATA  Secure communication of image file   Highly confidential image files  secure print files  user box files  and ID  amp  print files  which  transmitted or received between IT equipment must be communicated via a trusted pass 
171. rom the panel  though it  does not affect the operation of security functions     RS 232C   Serial connection using D sub 9 pin connectors is usable  The maintenance function is usable  through this interface in the case of failure  It is also possible to use the remote diagnostic  function  described later  by connecting with the public line via a modem     FAX unit    optional part    A device that has a port of Fax public line and is used for communications for FAX data  transmission and remote diagnostic  described later  via the public line  Is not pre installed  in MFP as a standard function according to the circumstances in sales  but sold as an optional  part  Fax unit is purchased when the organization needs it  and the installation is not  indispensable     1 4 2 8  Guidance    bizhub C360   C280   C220 Service Manual Security Functions  Japanese    bizhub C360   C280   C220 SERVICE MANUAL SECURITY FUNCTION  English   ineo  360   280   220 SERVICE MANUAL SECURITY FUNCTION  English    VarioLink 3622c   2822c   2222c SERVICE MANUAL SECURITY FUNCTION  English   bizhub C360   C280   C220 User s Guide Security Functions  Japanese    bizhub C360   C280   C220 User s Guide  Security Operations   English    ineot 360   280   220 User s Guide  Security Operations   English    VarioLink 3622c   2822c   2222c User s Guide  Security Operations   English     1 It is usable when the display language is English  French  Italian  German or Spanish        Copyright c  2009 KONICA MI
172. rver password  all the  authentication functions utilizing the SNMP password is locked out   Access utilizing  WebDAV is denied  Use of the change function of WebDAV server password is denied         Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   94 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target        gt  The maximum number of times of failure frequency is specified by the administrator by the  unauthorized access detection threshold setup function     The lock out state is released when the unlock function is performed to the WebDAV  authentication of FADMIN      Itis verified that the WebDAV server password which is newly set up satisfies the quality  below    gt  The characters and the number of digits of this password conform to those specified in  Table 12    gt  This password is not composed of one character only    gt  This password is not equal to the currently setup password   As described above  FIA_AFL 1 9   FIA_SOS 1 1   FIA_UAU 6  FIA_UAU 7  FMT_MTD 1 3    FMT_SMF 1  and FMT_SMR 1 2  are realized     7 1 3 20  Operational Setup of the ID  amp  Print Function    The operation modes of the ID  amp  print function are set up as follows      ID  amp  print automatic operation mode  An operation mode that registers a print file sent from a client PC as an ID  amp  print file even  if prin
173. s control operational list    assignment  access control SFP    Secure print file access control  Hierarchical to   No other components  Dependencies   FDP_ACF1  FDP_ACF1 2                     Table 5 Secure Print File Access Control  Operational List    Subject Object Operational list    A task to act for a user Secure Print File Access Control       FDP_ACC 1 3  Subset access control    FDP_ACC 1 1 3        The TSF shall enforce the  assignment  access control SFP on  assignment  List of subjects  objects  and  operations among subjects and objects covered by the SFP         assignment  list of subjects  objects  and operations among subjects and objects covered by the SFP                  Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   38   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target          Listed in  Table6 Setting management access control operational list    assignment  access control SFP    Setting management access control  Hierarchical to   No other components  Dependencies   PDP AC   FDP_ACF 1 3                  Table 6 Setting Management Access Control  Operational List    Subject Object Operational list    A task to act for a user   SMTP Server Group Object   Settings    DNS Server Group Object   Restore      MFP Address Group Object 7    PC FAX operation setting Object    Transmis
174. s described above  FIA_SOS 1 3   FMT_MTD 1 1   FMT_MTD 1 2   FMT_MTD 1 3    FMT_MTD 1 10   FMT_MTD 1 12   FMT_SMF 1 and FMT_SMR 1 2  are realized     7 1 3 8  User Box Setup      User Box Registration  When the administrator attribute is related  the view of the list of user boxes is permitted  A  personal user box  a group user box  and a public user box are registered by selecting the user  attribute to the non registration user box ID selected from the list of user boxes  When they  are registered     public    is specified on the user attribute of the user box by default  however  a  user ID or an account ID can be selected    gt  Inthe case of the personal user box  the arbitrary user ID registered is specified    gt  Inthe case of the public user box  verify that a user box password registered satisfies the  following conditions    e Itis composed of the characters and by the number of digits  shown in the Table 12    e It shall not be composed of one kind of character    gt  Specify the arbitrary account ID registered when Group user box     e Change of User Box Password   gt  The user box password set to the public user box is changed    gt  It verifies whether the user box password newly set have been satisfied the following  qualities   e Itis composed of the characters and by the number of digits  shown in the Table 12   e It shall not be composed of one kind of character   e It shall not be equal to the value which is currently set     e Change of user attribute o
175. s has been  selection  met   surpassed  the TSF shall  assignment  Jet of actions    selection  met  surpassed    Met   assignment  List of actions      lt Action when it is detected gt    Deny the access to the MIB object and lock the authentication function to use SNMP password    lt Operation for recovering the normal condition gt      Perform the delete function of authentication failure frequency offered within the administrator                                  mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 2         FIA_AFL 1 4  Authentication failure handling    FIA_AFL 1 1 4     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Jet of authentication events       Authentication for accessing the TOE by user    Re authentication when a user changes his her own user password   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of acceptable values    an administrator configurable positive integer within I 3  FIA_AFL 1 2 4   When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  et of actions     selection  met  surpa
176. s lock state  is released by the administrator   s unlock operation    When an administrator is authenticated by the WebDAV server password  FMT_MTD 113   restricts the setup of the maximum number of times of unsuccessful authentication only to  the administrator    FMT_MTD 1 3  restricts the change of the WebDAV server password only to the  administrator  FIA_SOS 1 1  verifies the quality of the WebDAV server password  Besides   when the WebDAV server password is changed  FIA_UAU 6 re authenticates the  administrator      lt  Operational Limit of Trusted Channel function setting data gt   The behavior and the stop setting of Trusted Channel function are permitted only to the  administrator by FMT_MOF 1 3       lt Operational Limit for S MIME function gt    The registration of the S MIME certificate is permitted only to the administrator by  FMT_MTD 1 11   The modification of the S MIME certificate registered is permitted only to  the administrator by FMT_MTD 1 8   In addition  the setup of transmission address data is  permitted only to the administrator by FDP_ACC 1 3  and FDP_ACF 1 3     The behavior of the S MIME function is permitted only to the administrator by the  FMT_MOF 1 2       lt Necessary requirements to keep the administrator secure gt    gt  refer to set admin     lt Necessary requirements to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing these managements  FM
177. scriber        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   13 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target         Method setup of a user authentication function   gt  Machine authentication  external server authentication  or user authentication stop is  selected    gt  Combination with Account Authentication is set up   Method synchronized with User  Authentication  Method not synchronized with User Authentication     Setup of access when the user attribute is public   gt  Itis selected whether to permit or prohibit MFP utilization of the user who is not identified  by user ID      Setup of a password policy function   gt  It is selected whether to enable or disable the function to check the several conditions of  the password  such as the number of valid digits of various passwords     Setup of the authentication method of Secure Print and the prohibit function of  authenticating operations    gt  When secure print files are authenticated  the authentication prohibition function operates  in a mode  and does not operate in the other mode    gt  The operation mode of the function detecting unsuccessful authentication in each  authentication function is also synchronous with the above mode    gt  The above mentioned operational modes are selected      Setup of the network setting modificati
178. sed with F  RESET function operated    As described above  FIA AFL 1 1   FIA AFL 1 8   FIA_UAU 2 1   FIA_UAU 7 and  FIA_UID 2I 1  are realized     Function Supported in Service Mode  When a user is identified and authenticated as a service engineer by the service engineer    identification authentication function at the access request to the service mode  the use of the    following functions is permitted     7 3 2 1  Change of CE Password    When a user is re authenticated as a service engineer and the new password satisfies the  quality  it is changed      Provides the CE authentication mechanism that is re authenticated by the CE password that  consists of the characters shown in Table 12      Resets the authentication failure frequency when succeeding in the re authentication    e Return     for each character as feedback for the entered service codes in the  re authentication      When the authentication failure that becomes 1 3 times at total in each authentication  function by using the CE password is detected  it logoffs the service mode accessing from the  panel  and locks all the authentication functions to use the CE password   The access to the  service mode is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access   detection threshold setting function    e The F RESET function unlocks the authentication function      It verifies that the CE password newly set satisfies the following qualities    gt  Itis composed o
179. server  password by FMT_MTD 1I 3       the user box password by FMT_MTD 1 4     FMT_MTD 1 7  permits only to the administrator the backup operation  inquiry operation   of the SNMP password  the user password  the user box password  and the secure print  password  the account password  and WebDAV server password      lt Operational limitation of Enhanced Security function gt   FMT_MOF 1 1  permits only the administrator and service engineer to disable the setting  for the enhanced security function      lt Management of encryption passphrase  gt    FMT_MTD 1 3  permits the modification operation to the encryption passphrase   FIA_SOS 1 4  verifies the quality of the encryption passphrase  When an encryption  passphrase is changed  the change is permitted only when it is re authenticated  successfully by FIA_UAU 6 that the user is an administrator by collating with the  registered encryption passphrase object   Moreover  FMT_MTD 1 11  permits only to the administrator to register the encryption  passphrase      lt Necessary requirement for accessing MIB object gt    The SMTP server group object  the DNS server group object and the MFP address group  object exists as an MIB object as well  so that the restriction is necessary even in the access  from the SNMP    FIA_UID 2 2  and FIA_UAU 2 2  identifies and authenticates that the user who accesses  the MIB object is an administrator    FIA_AFL 1 3  locks the authentication function to access the MIB object when the failure  auth
180. set  within the following time range        panel auto logoff time   1 9 minutes  As described above  FMT_MTD 1 3   FMT SMF 1 and FMT_SMR 1 2  are realized     7 1 3 8  Network Setup    A setup operation of the following setting data is performed      Aseries of setup data that relates to SMTP server  IP address  Port Number  etc       Aseries of setup data that relates to DNS server  IP address  Port Number  etc       A series of setup data that relates to MFP address  IP address  NetBIOS Name  AppleTalk  Printer Name  etc    As described above  FDP_ACC 1 3  and FDP_ACF 1 3  are realized     7 1 3 9  Execution of Back up and Restoration Function    All the setting data stored in NVRAM and HDD are backed up and re stored except the  administrator password  the CE password  and encryption passphrase  As the object related to    security  due to the relation of confidentiality and completeness  the one shown by the following  classifications is targeted      lt Type A  Object to which back up and restoration should be limited gt     SNMP password     User password     Account password      Secure print password     User Box password     WebDAV server password     lt Type B   Object to which restoration should be limited gt        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   90   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0
181. sion Address Data Object       FDP_ACC 1 4  Subset access control    FDP_ACC 1 1 4   The TSF shall enforce the  assignment  access control SEO on  assignment  List of subjects  objects  and  operations among subjects and objects covered by SFP    assignment  ist of subjects  objects  and operations among subjects and objects covered by SFP    Listed in  Table7 ID  amp  print file Access Control operational list    assignment  access control SFP    ID  amp  print file access control  Hierarchical to   No other components  Dependencies   PDP ACEL  FDP_ACF1 4                           Table 7 ID  amp  Print file Access Control  Operational List    Subject Object Operational list    A task to act for a user ID  amp  print File       FDP_ACF 1 1  Security attribute based access control    FDP_ACF 1 1 1   The TSF shall enforce the  assignment  access control SFP to objects based on the following   assignment   list of subjects and objects controlled under the indicated SFP and for each  the SFP relevant security  attributes  or named groups of SFP relevant security attributes     assignment  list of subjects and objects controlled under the indicated SFP  and for each  the  SFP relevant security attributes  or named groups of SFP relevant security attributes      lt Subject gt   lt Subject attributes gt     A task to act for a user  gt    User Attribute  User ID     Account Name  Account ID     User Box Attribute  User Box ID     Administrator Attribute           lt Object gt   lt 
182. ssed   Met   assignment  List of actions      lt Action when it is detected gt     While authentication is performed  log off from the authentication status of the user  and lock the  authentication function for the user     Otherwise  lock the authentication function for using the user password    lt Operation for recovering the normal condition gt                                      Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   45 111       bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target                  Perform the delete function of authentication failure frequency offered within the administrator  mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2 3         FIA_AFL 1 5  Authentication failure handling    FIA_AFL 1 1 5     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to assignment  List of authentication events     assignment  Let of authentication events      Authentication for accessing the secure print file   selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values      assignment  range of acceptable 
183. t is set    It is required to be a user who is permitted the use of the group user box to operate the user  box file in the group user box  When the Account authentication method is  the method not       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   71 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOY0 0100 GMOo 12 Security Target       synchronized   FIA_UID 2 6  and FIA_UAU 2I 6  identifies and authenticates that it is a user  who is permitted the use of the group user box  When the account authentication method is   synchronized method  and the Account that user belongs to is not registered  FIA_UID 2 6   and FIA_UAU 2I 6  identifies and authenticates that it is a user who is permitted the use of  the account    FIA_UAU 7 returns     for each entered character as feedback protected by the panel and  supports the authentication    In the case of the failure authentication from the panel  FIA_AFL 1 8  refuses all input  acceptances from the panel for 5 seconds in every failure  When the authentication failure  reaches 1 3 times  FIA_AFL 1 7  locks the authentication function for that account from  then on  This lock status is released by the administrator s release operation    FMT_MTD 1 3  permits only the administrator the setup of the threshold of the unauthorized  access detection value that is the trial frequency of the fa
184. t of security functions behavior    FMT_MOF 1 1 1        The TSF shall restrict the ability to  selection  determine the behavior of disable  enable  modify the  behavior of the functions  assignment  Jet of functions  to assignment  the authorized identified roles          assignment  Jet of functions     Enhanced Security Setting        selection  determine the behavior of  disable  enable  modify the behavior oft  disable        assignment  the authorized identified roles     Administrator    Service Engineer                Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   53   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c                Control Software AOEDOY0 0100 GMOo 12 Security Target  Hierarchical to   No other components  Dependencies   FMT_SMF1 FMT_SMEF1    FMT_SMR 1  FMT_SMR 1 1   FMT_SMR 1 2    FMT_MOF 1 2  Management of security functions behaviour  FMT_MOF 1 1 2        The TSF shall restrict the ability to  selection  determine the behavior of disable  enable  modify the  behaviour o   the functions  assignment  Jet of functions  to  assignment  the authorized identified  roles          assignment  List of functions       User Authentication Function    S MIME function    SNMP password authentication function    ID  amp  print function    selection  determine the behavior of  disable  enable  modify the behavior of  modity the behavior of
185. th the TOE will be installed is not intercepted    e When the intra office LAN where the MFP with the TOE will be installed is connected to an  external network  access from the external network to the MFP is not allowed     A SECRET  Operational condition about secret information   Each password and encryption passphrase does not leak from each user in the use of TOE     A SETTING  Operational setting condition of Enhanced Security function   e MFP with the TOE is used after enabling the enhanced security function     3 3  Threats    In this section  threats that are assumed during the use of the TOE and the environment for  using the TOE are identified and described     T DISCARD MFP  Lease return and disposal of MFP   When leased MFPs are returned or discarded MFPs are collected  secure print files  user box  files  ID  amp  print files  on memory image files  stored image files  HDD remaining image files   image related files  transmission address data files  and various passwords which were set up  can leak by the person with malicious intent when he she analyzes the HDD or NVRAM in the  MFP     T BRING OUT STORAGE  An unauthorized carrying out of HDD    e Secure print files  user box files  ID  amp  print files  on memory image files  stored image files   HDD remaining image files  image related files  transmission address data files  and  various passwords which were set up can leak by a malicious person or a user illegally when  he she brings out the files to analyze 
186. the HDD in a MFP    e A person or a user with malicious intent illegally replaces the HDD in MFP  In the replaced  HDD  newly created files such as secure print files  user box files  ID  amp  print files   on memory image files  stored image files  HDD remaining image files  image related files   transmission address data files and various passwords which were set up are accumulated   A person or a user with malicious intent takes out to analyze the replaced HDD  so that such  image files will leak     T ACCESS PRIVATE BOX  Unauthorized access to the personal user box which used a user  function   Exposure of the user box file when a person or a user with malicious intent accesses the user       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   20 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       box where other user owns  and moves  copies  downloads  prints and transmits  E mail  transmission  FTP transmission  fax transmission  SMB   transmission and WebDAV    transmission  the user box file     T ACCESS PUBLIC BOX  Unauthorized access to public box which used a user function   Exposure of the user box file when a person or a user with malicious intent accesses the public  user box which is not permitted to use  and moves  copies  downloads  prints and transmits   E mail transmission  FTP tra
187. ting data    Remaining TSF data      Hierarchical to   No other components  Dependencies   No dependencies                      6 1 1 8  Extension  Capability of Using IT Environment Entity    FIT_CAP 1 1  Capability of using security service of IT environment entity    FIT_CAP 1 1 1   TSF shall provide the necessary capability to use the service for  assignment  security service provided       by IT environment entity      assignment  necessary capability list for the operation of security servicel       lassignment  security service provided by IT environment entity     User identification and authentication function of user information management server using Active  Directory   assignment  necessary capability list for the operation of security service       Inquiry function of authentication information for the identification and authentication target user    Acquirement function of authentication information for the identification and authentication target                   user  Hierarchical to   No other components  Dependencies   No dependencies            FIT_CAP 1 2  Capability of using security service of IT environment entity      12 TSF data remaining in the HDD data area  which cannot be deleted only by the deletion of the file  management area              Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   64 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   
188. ting is requested by the normal print setup      ID  amp print specified operation mode  An operation mode that registers a print file sent from a client PC as an ID  amp  print file only  when it is requested to register that file as an ID  amp  print file   As described above  FMT MOF 1 2   FMT SMF 1  and FMT_SMR 1 2  are realized     7 2  FADMIN SNMP  SNMP Administrator Function     F ADMIN SNMP is a security function  which identifies and authenticates the administrator  in the access through the network by using SNMP from client PC  and then permits the  operation of a setting function of the network only to the administrator whose identification and  authentication was succeeded     7 2 1  Identification and Authentication Function by SNMP Password    It identifies and authenticates by the SNMP password  that the user who accesses the MIB  object through the network with the use of SNMP is an administrator    Provides the SNMP authentication mechanism which authenticates by the SNMP password  that consists of the character shown in Table 12    gt  Only Authentication password or both the Privacy password and the Authentication  password is used    gt  In the case of SNMP  the SNMP password is used for every session without requiring the  administrator authentication mechanism by the separate session information     Reset the authentication failure frequency if it succeeds in authentication    gt  In the case of both the Privacy password and the Authentication password a
189. tion   Prohibited      TOE update function via Internet   Prohibited     Transmission address data user setup function    Prohibited      Operational setup of Trusted Channel function    Valid     Administrator authentication lock out time   Setup prohibited for 1 4 minutes      CE authentication lock out time   Setup prohibited for 1 4 minutes     FTP Server function   Prohibited     Automatic registration of S MIME certificate   Prohibited     Setup of limitation of S MIME encryption severity    Valid  Only 3DES and AES are  user selectable         Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   17 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    2  Conformance Claims  2 1  CC Conformance Claim  This ST conforms to the following standards   Common Criteria for Information Technology Security Evaluation  Part 1  Introduction and general model 2006 9 Version 3 1 Revision 1  Translation v1 2   Part 2  Security functional requirements 2007 9 Version 3 1 Revision 2  Translation v2 0     Part 3  Security assurance requirements 2007 9 Version 3 1 Revision 2  Translation v2 0     e Security function requirement   Part2 Extended    e Security assurance requirement   Part3 Conformant  2 2  PP Claim  There is no PP that is referenced by this ST   2 3  Package Claim  This ST conforms to Package   EAL3  The
190. tion  and the stop operation management to the administrator      lt Necessary requirement to keep the administrator secure gt    gt  refer to set admin     lt Necessary requirement to keep the service engineer secure gt      gt  refer to set service     lt Role and controlling function for each management gt   As the role of doing these managements  FMT_SMR 1 2  maintains an administrator and  FMT_SMR 1 6  maintains a user permitted the use of the group user box  FMT_SMF1       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   72 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       specifies these management functions     This security objective is satisfied by the completion of these multiple functional    requirements     e O SECURE PRINT  Access control of secure print file and ID  amp  print file   These security objectives explain the policy for the secure print file   First  for secure print file  this security objective limits the print of the secure print file only  for the user  who is permitted the use of the secure print file  and requires various  requirements that relate to the access control      lt Secure print file access control gt    After the user has been identified and authorized  the user ID is associated with the task of  acting a use by FIA_ATD 1 and FIA_USB 1  FDP_ACC 1 2  
191. tion led from the TOE security function requirement is shown  in Table 11 below  The detailed specification is explained in the paragraphs described below     Table 11 Names and Identifiers of TOE Security Function      6  FPRINT   Secure print function  ID  amp  print function      FOVERWRITE ALL All area overwrite deletion function      8  RCRYPT   Encryption key generation function          9   FRESET   Authentication Failure Frequency Reset function    External Server authentication operation support function          7 1  RADMIN  Administrator Function     F ADMIN is a series of security function that administrator operates  such as an administrator  identification authentication function in an administrator mode accessing from a panel or  through a network  and a security management function that includes a change of an  administrator password and a lock cancellation of a locked user box   Nevertheless  all functions  are not feasible functions through both a panel and a network      7 1 1  Administrator Identification Authentication Function    It identifies and authenticates the accessing user as the administrator in response to the    access request to the administrator mode       Provides the administrator authentication mechanism authenticating by the administrator  password that consists of the character shown in Table 12    gt  Provides the administrator authentication mechanism using the session information  besides the administrator password  after the administ
192. to the    correct destination  or encrypted when the organization or the user expects to be protected     P REJECTLINE  Access prohibition from public line   An access to internal network from public line via the port of Fax public line must be  prohibited        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   22 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       4  Security Objectives    In this chapter  in relation to the assumptions  the threats  and the organizational security    policy identified in Chapter 3  the required security objectives policy for the TOE and the    environment for the usage of the TOE are described by being divided into the categories of the    security objectives for the TOE and the security objectives for the environment  as follows     4 1  Security Objectives for the TOE    In this section  the security objectives for the TOE is identified and described     O REGISTERED USER  Utilization of registered user     TOE permits only the registered user to user the MFP installing TOE     O PRIVATE BOX  Personal user box access control     TOE permits only a user to use the user function of the personal user box that this user  owns    TOE permits only a user to use the user function of the use box file in the personal user box  that this user owns     O PUBLIC BOX  Publ
193. ts       Account authentication  Account authentication when the belonging account of the user who  accesses in the synchronized method is not registered       Account authentication  Account authentication of the user who accesses in the method not  synchronized               selection   assignment  positive integer number   an administrator configurable positive integer   within  assignment  range of acceptable values       assignment  range of acceptable values    an administrator configurable positive integer within 1 3  FIA_AFL 1 2 7    When the defined number of unsuccessful authentication attempts has been  selection  met    surpassed   the TSF shall  assignment  ist of actions     selection  met  surpassed    Met   assignment  List of actions      lt Action when it is detected gt              Lock the authentication function for the concerned account  and deny the access to the TOE by the  user who permitted the use of the account      lt Operation for recovering the normal condition gt   Perform the delete function of authentication failure frequency offered within the administrator          mode   Hierarchical to   No other components  Dependencies   FIA_UAU 1  FIA_UAU 2I 6               FIA_AFL 1 8  Authentication failure handling  FIA_AFL 1 1 8     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within  assignment  range of acceptable values  unsuccessful  authentication attempts occur re
194. tting data is performed    gt  Setting data that relates to SMTP server  IP address  port number  etc     gt  Setting data that relates to DNS server  IP address  port number  etc     gt  Aseries of setting data that relates to MFP address  IP address  NetBIOS name  AppleTalk  printer name  etc    As described above  FDP_ACC 1 3  and FDP_ACF 1 3  are realized     2  Change of SNMP password   The SNMP password  Privacy password and Authentication password  is changed  Verify that   the SNMP password newly set satisfies the following qualities     gt  It is composed of the characters and by the number of digits shown in Table 12     gt  This password is not composed of one character only     gt  This password is not equal to the currently setup password    As described above  FIA_SOS 1 2   FMT_MTD 1 3    FMT _SMF1 and FMT_SMR 1 2  are  realized      3  Setup of SNMP password authentication function  The authentication method in the SNMP password authentication function is set to the   Authentication password only  or the  Privacy password and the Authentication password    As described above  FMT_MOF1 2    FMT_SMF 1 and FMT_SMR 1 2  are realized     7 3  FSERVICE  Service Mode Function     F SERVICE is a series of security function that the service engineer operates  such as the  service engineer identification authentication function in service mode accessing from a panel   and a security management function that includes a change in the CE password and the  administrator pass
195. ubstantiation of capability needed to use the security function correctly provided by IT    environment entity        Audit   FIT_CAP 1    The following actions should be auditable if FAU_GEN Security audit data generation is included in the  PP ST   a  Minimal Failure of operation for IT environment entity          b  Basic Use all operation of IT environment entity  success  failure   Management   FIT_CAP 1  The following actions could be considered for the management functions in FMT           There is no management activity expected    FIT_CAP 1 Capability of using security service of IT environment entity    FIT_CAP 1 1  TSF shall provide the necessary capability to use the service for lassignment  security service provided             by IT environment entity      assignment  necessary capability list for the operation of security servicel  Hierarchical to   No other components                Dependencies   No dependencies          Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   35 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target       6  IT Security Requirements  In this chapter  the TOE security requirements are described      lt Definition of Label gt    The security function requirements required for the TOE are described  Those regulated in CC  Part 2 will be directly used for the functio
196. ue     In the case of the personal user box  the arbitrary user ID registered is specified     In the case of the public user box  verify that a user box password registered satisfies the  following conditions    gt  Itis composed of the characters and by the number of digits  shown in the Table 12    gt  It shall not be composed of one kind of character     In the case of group user box  the arbitrary account ID registered is specified     As described above  FIA SO UU FMT MSA 3 1   FMT_MTD 1 5   FMT_SMF1 and  FMT_SMR 1 3  are realized      lt Automatic registration of user box gt     In the user box operation to store of the copy job and the print job  when the specified user box  is unregistered  the personal user box which is set the user ID of the user who operates the  job concerned is automatically registered   As described above  FMT_MSA 3 1  and FMT_SMF 1 are realized        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   101 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target        lt Registration of user box file gt       In the new registration operation  move or copy operation of user box file  the user box ID  equivalent to the user box specified as target storage is set to the user box attribute as the  user box file    As described above  FMT_MSA 3 3  is realized     7 5 1  Personal Us
197. unt registration function when the belonging account of user is   not registered in the synchronized method gt      Require the Account authentication after User identification and authentication      Register the successful account ID as account name when succeeding in the account  authentication   By this  FMT_MTD 1 12   FMT_SMS 1 and FMT_SMR 1I6  are realized     The detail of the account authentication is the same as processing of the items explained in  the following  lt Account authentication  User identification and authentication in the  authentication method not synchronized gt       lt Account Authentication    User identification and authentication in the authentication method  not synchronized gt    When the access request for the user box and the request for the registration of the secure  print file  it is identified and authenticated to be a user  The detail of user authentication is the  same as account authentication  user identification and authentication in the synchronized  method  In the case of the access from the panel  the account authentication is required  Account  Name is associated with the user ID if succeeding the account authentication  and the use of  F BOX and F PRINT is permitted to the user who is identified and authenticated     Provides account authentication mechanism that is authenticated the account by the   account password that consists of the characters shown in Table 12         for each character as feedback for the entered account 
198. ure print password is verified to meet the following requirements    gt  Itis composed of the characters and by the number of digits shown in Table 12    gt  It shall not be composed of one kind of character        Giving of the secure print internal control ID  When the verification of the secure print password is completed in a registration request of  the secure print file  the secure print internal control ID uniquely identified is set to the  concerned secure print file   As described above  FMT_SOS 1 1   FMT_MSA 3 2   FMT_MTD 1 8   FMT_SMF 1 and  FMT_SMR 1 3  are realized     7 6 2  ID  amp  print Function  7 6 2 1  ID  amp  Print File Registration Function  When it is requested to register an ID  amp  print file  if the user is authenticated as a registered  user  that file is registered     The user ID of the user who tries to register the file is set as a user attribute of that ID  amp   print file   As described above  FIA_MSA 3 4  is realized     7 6 2 2  ID  amp  Print File Access Control Function    When the user is authenticated as a registered user  the ID  amp  print file access control       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   106   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AOEDOY0 0100 GMOo 12    operates     Security Target      The task substituting for the identified and authenticated user has a us
199. us requirements that  relate to the encryption   Applying FIT_CAP 1 1   the inquiry and the acquirement function for the identification and  authentication objective user are achieved for the user identification and authentication  function by the Active Directory of the user information management server   This security objective is satisfied by the completion of this function requirement     e O CRYPTO CAPABILITY  Support action to use the encryption function   This security objective regulates that TOE s support action for the data stored in HDD is  encrypted by ASIC that is the entity out of TOE  and needs various requirements that  regulates the support of external entity action   Applying FIT_CAP 1 2   a support function to process all data in HDD through the encryption  function implemented by ASIC is achieved for that encryption function   This security objective is satisfied by the completion of this function requirement      gt  set admin  Set of necessary requirement to keep administrator secure    lt Identification and Authentication of an administrator gt   FIA_UID 2 2  and FIA_UAU 2 2  identifies and authenticates that the accessing user is a  administrator   FIA_UAU 7 returns     for each character entered as feedback protected in the panel  and  supports the authentication   FIA_AFL 1 8  refuses  in case of the failure authentication tried from the panel  all the input  receipts from the panel for five seconds in every failure  When the failure authentication 
200. used to enforce the SFP    selection  choose one of  restrictive  permissive   assignment  other property       assignment  other property      Responded the registered situation of the user box classified into the following cases    OI  Public   when an user box is registered by the operation of user or administrator    2   User ID  of the user who performed the relevant job  when an user box is registered   automatically according to the operation of stored job specitying unregistered user box     assignment  access control SFP  information flow control SFP     User box access control   FMT_MSA 3 2 1    The TSF shall allow the  assignment  the authorized identified roles  to specify alternative initial  values to override the default values when an object or information is created                                                                                               Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   55 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target                       assignment  the authorized identified roles   Case  1  identified in  assignment  other property  of FMT_MSA 8 1   User  administrator  Case  2  identified in  assignment  other property  of FMT_MSA 3 1   None  Hierarchical to   No other components  Dependencies   FMT_MSA 1  FMT_MSA 1 1   FMT_MSA 1 2     FMT_
201. user information  management server is used  the possibility of the threat is reduced because the user  identification and authentication function is operated through O AUTH CAPABILITY  supporting the operation for the user identification and authentication function by the user  information management server of Active Directory and through OE SERVER setting to use       Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   29 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMO0 12 Security Target    the user management by the administrator    OE FEED BACK uses the application regulating to return the protected feedback for the  entered password in the user s authentication and user box s authentication  and  OE SESSION requires the log off operation after the operation ends  so that  O REGISTERED USER and O PUBLIC BOX are supported sufficiently    Accordingly  this threat is countered sufficiently     e T ACCESS GROUP BOX  Unauthorized access to a group user box using user function   This threat assumes the possibility that an unauthorized operation is performed by using the  user function for the group box that is a storage area of image file used by user who is  permitted the use of the account  or the user box file in it   O REGISTERED USER assumes that only the user to whom TOE was registered is  permitted to use MFP instal
202. values    an administrator configurable positive integer within 1 3   FIA_AFL 1 2 5    When the defined number of unsuccessful authentication attempts has been  selection  met   surpassed   the TSF shall  assignment  Jet of actions     selection  met  surpassed    Met   assignment  List of actions      lt Action when it is detected gt    Deny the access to the secure print file and lock the authentication function for the secure print file    lt Operation for recovering the normal condition gt      Perform the delete function of authentication failure frequency offered within the administrator                               mode   Hierarchical to   No other components  Dependencies    FIA_UAU 1  FIA_UAU 2 4            FIA_AFL 1 6  Authentication failure handling    FIA_AFL 1 1 6     The TSF shall detect when  selection   assignment  positive integer number   an administrator  configurable positive integer within lassignment  range of acceptable values  unsuccessful  authentication attempts occur related to  assignment List of authentication events     assignment  Jet of authentication events         Authentication for accessing a public user box      Re authentication when a user authorized to access a public user box changes the box password of  the public user box              selection   assignment  positive integer number   an administrator configurable positive integer  within  assignment  range of acceptable values        assignment  range of acceptable values    an admi
203. word        Copyright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   96   111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c  Control Software AODEDOYO0 0100 GMOo 12 Security Target    7 3 1     7 3 2        Service Engineer Identification Authentication Function    It is identified and authenticated the accessing user as the service engineer in response to the  access request to the service mode from the panel       Provides the CE authentication mechanism that is authenticated by the CE password that   consists of the character shown in Table 12     gt  The CE authentication mechanism by the separate session information is not required  because the service mode can only be accessed from the panel    Return         for each character as feedback for the entered CE password    Resets the number of the authentication failure when succeeding in the authentication    Not accept the input from the panel for five seconds when the authentication failed     When the authentication failure that becomes 1 3 times at total in each authentication  function by using the CE password is detected  it locks all the authentication functions to use  the CE password   The access to the service mode is refused     gt  The administrator specifies the failure frequency threshold by the unauthorized access  detection threshold setting function    e Lock of authentication function is relea
204. yright c  2009 KONICA MINOLTA BUSINESS TECHNOLOGIES  INC   All Rights Reserved   2 111    bizhub C360   bizhubC280   bushub C220   ineo  360   ineo  280   ineo  220   VarioLink 3622c   VarioLink 2822c   VarioLink 2222c    Control Software AOEDOY0 0100 GMOo 12 Security Target          Contents                                                        2     2 202  nnnnnnn nnn n nn      Tz ST Introd  ction eene Eege 6  Tals ST IASNtiiGationiwiss  Sarvcc ede reese Sere asec a i  So renee ogee ia 6  1 2  TOE  Identification  sais svcd  tase ied iin alta dee hed dima cin lve seh  6  1 3  KEE 6   1 3 9   TOE YPO e E EET aise aes co a eee ease eens 6  1 3 2  Usage of TOE and Main Security Functons 6  1 4  TOE  RE e e E H  1 4 1  Roles OF TOE USCIS EEN 7  1 4 2  Physical   Scope  Of TOE i gek satu tos  Ree ee ee 8  1 4 3  Logical Scope  Of TOE zi  feces  reads et deeg eege ne nea al Pattee A es 11   2    Conformance ClaiMS oasis oe inna eiae EE anaia Kaaa a aaeain ntaa daralan 18  2 1  CC Conformance e E EE 18  2 2  PP Claim EE 18  2232 PACKAGE  Calin EE 18  PA le 18   3  Security  Problem Definition cigs stoctescct ake ctichaneclec tate eel eaclectsla iene 18  3 12 Protected Assets  eegene Lead dei deena EE ieee dale 18  SD  2 HASSUIMPUONS weceesttectethctecd EE 19  D EE 20  3 4  Organizational Security Policies AA 22   d Security Objectiv   Siis idn NEE cts aa eiaa ees sence esheets etd eee dee 23  4 1  Security Objectives for the TOE REENEN EEN 23  4 2  Security Objectives for the Ope
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Operator Manual, Service and Parts List  Appendice  RYVYR CST250WT Installation Guide  Biostar TForce 550 Owner's Manual  V7 Nano USB 2.0 Flash Drive 4GB Red  avertissement  AN1787 DragonBall Power Management  Bedienungsanleitung  Veranstaltungstechnik • Veranstaltungswirtschaft  MMATS Professional Audio D700.2 User's Manual    Copyright © All rights reserved. 
   Failed to retrieve file