Home
        ST of the Oce PRISMAsync 11.9.75.55 as used in
         Contents
1.       10  Appendix B References    1  Secure Deletion of Data from Magnetic and Solid State Memory  Peter Guttman 1996   http   www cs auckland ac nz  pgut001 pubs secure_del html    2  US Department of Defence Military Standard DOD 5220 22m   http   www dss mil isecnispom_0195 htm        08 October 2009 Page 50 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       11  Appendix C Glossary of Terms    Repro room Reprographics room     08 October 2009 Page 51 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       12     Appendix D    Firewall rule table    The firewall rule table that is used by the Oc   PRISMAsync for controlling the inbound flow of    data is given below     By default no traffic is permitted to enter the TOE except for the ports defined in the rule tables                            below    ICMP administration   Protocol Destination Port  ICMP any   LPR  accepting print jobs   Protocol Destination Port  TCP 515                Web HTTPS server    with HTTP redirect  administration                                      Protocol Destination Port  TCP 443  TCP 80  SNMP  non security functionality related administration   Protocol Destination Port  UDP 161  08 October 2009 Page 52 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       13  Appendix E Security Related Administration Functions    In this appendix the security related administration functions that are available to  S SERVICE_ENGINEER and S REMOTE_SYSADMIN are detailed  The tables give the  administration f
2.      P TOE_ADMINISTRATION X                                           P JOB_DELETE X       The individual rationales demonstrating that the threats  assumptions and organizational security  policies are met are described as follows     A DIGITAL_COPIER  The assumption is met by the following TOE assurance objective     O E LOCAL_INTERFACE   The environment into which the TOE will be introduced shall  contain an Oc   VP41x0 MFD that provides a Local User Interface and Glass Plate through which  S OPERATOR can interact easily with the TOE to manage the print queues  When sending a  D PRINT_JOB to the Oc   PRISMAsync  S OPERATOR is aware that they must delete the job on  the same workday that it is sent to the TOE  whether or not it is used  Requiring job data to be  deleted from the TOE on the same workday it is sent reduces the time available to an attacker in  which the data object is vulnerable  The MFD provides a glass plate and LUI with which  S OPERATOR can perform print copy scan jobs  The ST claim is not valid when the TOE is used  with any other type of Oc   MFD  The TOE will not work with any other device  including Digital  MED Products from any other manufacturers      08 October 2009 Page 36 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Although the assumption states that a VP41x0 MFD from Oc   will be used  the MFD is an un   trusted device     A ENVIRONMENT  The assumption is met by the following objectives for the environment     O E ENVIRONMENT   The env
3.   2 1 TOE Overview  This section presents an overview of the TOE   2 1 1 TOE physical scope and boundary    The firm Oc   produces a wide range of multifunctional devices for copying  printing and  scanning  MFDs   For the purpose of this evaluation  the MFD consists of two main parts   1  the  Oc   PRISMAsync controller and  2  the Digital Printer and Scanner Copier and Local User  Interface peripherals that together form the VP41x0 R1 3 product     The Oc   PRISMAsync is a PC based MFD controller that provides a wide range of printing   scanning and copy functionality to the Digital Printer  Scanner and Copier and Local User  Interface peripherals to which the Oc   PRISMAsync is connected  The Oc   PRISMAsync  provides security functionality to the MFD     The Oc   PRISMAsync can operate in two different security modes     High    and    Normal     This  Security Target covers the Oc   PRISMAsync operating in the security mode    High    as delivered  by Oc   to the customer  This mode provides a restricted set of functionality that is configured to  meet the Security Target claim  Changing the operational mode invalidates the claims made in  this Security Target     08 October 2009 Page 10 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The Oc   PRISMAsync is connected between a network and the MFD  This is depicted in Figure  1     Input Glass Plate of MFD  Copy Data Scan Data    Flow Flow         gt   Network       Print Data       Flow    y y  Output Tray of MFD  F
4.  FPT_SEP 1 TSF domain separation   Filtering of network traffic occurs is an area of the TOE that is separate to non TSF related  operation  This SFR supports the objective by ensuring that the filtering mechanism is protected  by it not being exposed to non TSF mechanisms from which a possible attack could be made        O F JOB_SHRED   FDP_RIP 1 Subset residual  information protection   This SFR supports the objective by ensuring that once print  copy or scan job is no longer needed  and during the startup procedure  if residual print or scan job data is found then the related data  will be electronically shredded from the hard disk  The SFR has been refined to describe the  moment when the data will be shredded     FPT_RVM 1 Non bypassability of the TSP  Print and scan jobs must pass through the shredding mechanism  This SFR supports the objective    by ensuring that print and scan jobs cannot leave the TOE except in the authorised manner     FPT_SEP 1 TSF domain separation   Shredding occurs is an area of the TOE that in separate to non TSF related operation  This SFR  supports the objective by ensuring that the shredding mechanism is protected by it not being  exposed to other non TSF mechanisms from which a possible attack could be made        O F  AUTHENTICATE   FIA_UID 2 User identification before any action   S REMOTE_SYSADMIN and S SERVICE_ENGINEER must identify themselves to the TOE  before any TOE management actions can be performed        FIA_UAU 2 User authentic
5.  SFR helps to  reduce the amount of sensitive data present on the hard disk in the event of it being stolen     FIA_UID 2   This Security Functional Requirement ensures that administrators correctly identify themselves to  the TOE before security management functions can be used  This SFR is supported by  SF MANAGEMENT and provides functionality whereby administrators   S REMOTE_SYSADMIN and S SERVICE_ENGINEER  can identify themselves to the TOE   This helps to restrict access to security management functions and thereby reduces the risk of  modification being made to the TOE settings by unauthorised users     08 October 2009 Page 45 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       FIA_UAU 2   This Security Functional Requirement ensures that administrators correctly authenticate  themselves to the TOE before security management functions can be used  This SFR is supported  by SF MANAGEMENT and provides functionality whereby administrators   S REMOTE_SYSADMIN and S SERVICE_ENGINEER  can authenticate themselves to the  TOE  This helps to restrict access to security management functions and thereby reduces the risk  of modification being made to the TOE settings by unauthorised users     FMT_MOF 1   This Security Functional Requirement ensures that the TOE management functions are only used  by either the Oc   technician  S SERVICE_ENGINEER  or customer system administrator   S REMOTE_SYSADMIN   This SFR is supported by SF  MANAGEMENT and ensures that  non administrators ca
6.  SNMP   These are remote administrators  typically a network  administrator from the organization owning renting the TOE  They can read and write a limited  set of settings of the TOE through a SNMP connection  None of the settings that the remote  system administrator can access through SNMP are security related in the sense that they provide  access to the assets that the TOE protects or allow changes to be made to the TOE security  functionality     Service engineer  These are local administrators  and are typically employed by Oc    They have  access through an Ethernet connection to a wide range of settings on the TOE  The TOE  connection is PIN code protected and service license protected and access to the management  functions provided to the Service engineer require specific hardware and software  It is not  possible to access the management functions made available to the service engineer without the  software that is installed on the service engineer laptop     08 October 2009 Page 17 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The various administrators and the interfaces through which they interact with the TOE are  depicted in Figure 7     MED Peripheral                       Service    Engineer Remote system    administrator    Figure 7  MFD Administrators and interfaces    The TOE has minimized all other functionality    The TOE supports the following network protocols   e TCP IP  UDP IP and ICMP     No other network protocols are enabled  The TOE manu
7.  a wide  range of printing  scanning and copying functionality to the MFD peripherals to which it is  connected  The Oc   PRISMAsync provides security functionality to the MFD     This Security Target describes the Oc   PRISMAsync and the specific security problem that it  addresses  The Target of Evaluation  TOE  is a collection of software components  Oc    developed software  3    party printer language interpreters  Operating System  that use the  underlying hardware platform  The TOE is a subset of the complete Oc   PRISMAsync     08 October 2009 Page 8 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       1 3 CC Conformance  The evaluation is based upon     e Common Criteria for Information Technology Security Evaluation  Version 2 3  Part 1   General model  August 2005    e Common Criteria for Information Technology Security Evaluation  Version 2 3  Part 2   Security functional requirements  August 2005    e Common Criteria for Information Technology Security Evaluation  Version 2 3  Part 3   Security assurance requirements  August 2005    e Common Methodology for Information Technology Security Evaluation  Version 2 3  Part 2   Evaluation Methodology  August 2005     The chosen level of assurance is   EAL2  Evaluation Assurance Level 2 augmented with ALC_FLR 1   This Security Target claims the following conformance to the CC     CC Part 2 conformant  CC Part 3 conformant    08 October 2009 Page 9 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       2  TOE Description  
8.  environment and not on a recurring basis     It is assumed that the customer will have a Security Policy governing  the use of IT products by employees in the customer organisation  The  TOE assumes that the network to which it is attached is protected by  security measures that are intended to prevent mal ware  viruses and  network traffic  not related to the working of the operational  environment  entering the network to which it is attached  Although  the Virus database files and various patches are kept up to date  the  policy recognises that new threats emerge over time and that  occasionally they may enter the environment from outside and    08 October 2009 Page 22 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       A SLA    3 3 Threats    T RESIDUAL_DATA    T MALWARE    provides measures to help limit the damage  The Policy will define  how IT products are protected against threats originating from outside  the customer organisation  The organisation   s employees are aware of   are trained in and operate according to the terms and conditions of the  policy  The policy also covers physical security and the need for  employees to work in a security aware manner including the usage of  the TOE  The Security Policy describes and requires a low to medium  level of assurance  EAL2  for the TOE     It is assumed that any security flaws discovered in the TOE will be  repaired by Oc    possibly as part of an agreed service level  agreement      S THIEF steals the TOE or par
9.  installation  generation  and start up of the TOE is    e Software development and delivery for the Oc   PRISMAsync Controllers    Development  ADV  assurance measures  The developer documentation for ADV functional specifications can be found in   e Functional Specification for the Oc   PRISMAsync 11 9 75 55 as used in the Oc   VP41x0  R1 3  version 1 4  e High Level Design for the Oc   PRISMAsync 11 9 75 55 as used in the Oc   VP VP41x0  R1 3  version 1 3    Guidance  AGD  assurance measures  The document containing the guidance for Oc   service engineers is maintained on the service  engineers    laptop with the reference   e Oc   VarioPrint 4110 4120 Security service documentation  Edition 2009 10  It is not a publicly available document     The guidance for the customer administrators and users is in   e Oc   VarioPrint 4110 4120 Administrator settings and tasks  Edition 2009 05  e Oc   VarioPrint 4110 4120 Manual type Operating information  version 2008 11  e Oc   VarioPrint 4110 4120 Common Criteria certified configuration of the Oc    PRISMAsync  Edition 2009 09    Life Cycle  ALC  assurance measures  The physical  procedural  personnel and other security measures applied by the developer can be  found in    e Flaw remediation for Oc   printer copier scanner products    08 October 2009 Page 33 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Test  ATE  assurance measures  The developer test documentation can be a test analysis showing that the tests cover the ent
10.  uses a generic PC hardware platform  The Oc    PRISMAsync only provides functionality related to the operation of the TOE and does not have  dual function  for example  as an office file server  The nature of the TOE is such that evaluation  at EAL2 provides a suitable level of assurance that the TSF operates in its own domain     08 October 2009 Page 46 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The operation of the TSF in its own domain provides the following    1  The filtering mechanisms are in a separate domain to the rest of the non security related  operations that the TOE performs  This SFR is supported by SF FILTERING  This  protects the integrity of the filtering mechanism against un authorised subjects and threat  attacks    2  The shredding mechanisms are in a separate domain to the rest of the non security  related operations that the TOE performs  This SFR is supported by SF  SHREDDING   This protects the integrity of the shredding mechanism against un authorised subjects  and threat attacks    3  The TOE security management mechanisms are in a separate domain to the rest of the  non security related operations that the TOE performs  This SFR is supported by  SF MANAGEMENT  This protects the integrity of the security management  mechanisms against un authorised subjects and threat attacks     FPT_RVM 1   This Security Functional Requirement ensures that no security related operations can be  performed without being controlled by the TOE   s security m
11. 1072  KB935839 KB951698  KB935840 KB951748  KB936021 KB952954  KB937143 KB953838  KB938829 KB953839  KB939373 KB953839  KB939653 KB954211  KB941568 KB956390  KB941644 KB956391  KB941693 KB956803  KB942527 KB956841  KB942615 KB957095  KB942763    08 October 2009 Page 54 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       15  Distribution list    1  BSI  2  Oc   Technologies BV  3  Brightsight    08 October 2009 Page 55 of 55 Commercial    BSI DSZ CC 0615    
12. D TRAFFIC from  S NETWORK_DEVICE to enter its boundary     It is assumed that the TOE has a S DIGITAL_PRINTER device  attached to it  S DIGITAL_PRINTER is part of the Oc   VP41x0  MED  It is assumed that for EAL2  that the interface from the Oc    PRISMAsync to the S DIGITAL_PRINTER will not be used to mount  an attack and that the interface is only used for the purposes of  printing     It is assumed that the TOE has an S DIGITAL_SCANNER device  attached to it  S DIGITAL_SCANNER is part of the Oc   VP41x0  R1 3MFD  It is assumed that for EAL2  that the interface from the  Oc   PRISMAsync to the S DIGITAL_SCANNER will not be used to  mount an attack and that the interface is only used for the purposes of  scanning     It is assumed that the TOE has a S LUI device attached to it  S LUI is  part of the Oc   VP41x0 MED  It is assumed that for EAL2  the  interface from the LUI to the Oc   PRISMAsync will not be used to  mount an attack as the TOE security functions cannot be accessed via  this interface and the interface is only used for the purposes of  printing  scanning and copying     The TOE assumes that its operational environment is a repro room  contained within a regular office environment  Physical access to the  operational environment is restricted to S OPERATOR and  S SERVICE_ ENGINEER  The office environment also contains non   threatening office personnel  S OPERATOR  S REMOTE_USER   S REMOTE_SYSADMIN and S SERVICE_ENGINEER   S THIEF  is only rarely present in this
13. NT_JOB  D SCAN_JOB  and D_COPY_JOB    e On deletion of R PRINT_JOB  R COPY_JOB and R SCAN_JOB by  S OPERATOR  S REMOTE_SYSADMIN or S SERVICE_ENGINEER   e On TOE start up or TOE reboot      Dependencies  No dependencies     5 13 SFRs for Management    FIA_UID 2 User identification before any action  FIA_UID 2 1 The TSF shall require S REMOTE_SYSADMIN and  S SERVICE_ENGINEER to identify themselves before allowing any other TSF   mediated actions on the behalf of that user        Dependencies  No dependencies     FIA_UAU 2 User authentication before any action  FIA_UAU 2 1 The TSF shall require S REMOTE_SYSADMIN and  S SERVICE_ENGINEER to be successfully authenticated before allowing any other  TSF mediated actions on the behalf of that user        Dependencies  FIA_UID 1  hierarchical component included     FMT_MOF 1 Management of security functions behaviour  S REMOTE_SYSADMIN  0  FMT_MOF 1 1 The TSF shall restrict the ability to modify the behaviour of the  functions described in appendix E for SSREMOTE_SYSADMIN to  S REMOTE_SYSADMIN        Dependencies  FMT_SMF 1  included   FMT_SMR 1  included        8 This is a refinement to show when the de allocation is to take place  When you delete a file  the    OS modifies the relevant entry from the file allocation table  The data remains on the hard disk and can  be retrieved with suitable tools  This is why the TOE shreds the data  What is happening is that     e When the job manager discards data  it moves the data reference in  
14. Oc   Technologies BV    BrightSight report  ST Oc   PRISMAsync 11 9 75 55 4 6 2    ST of the Oc   PRISMAsync 11 9 75 55  as used in the Oc   VarioPrint 41x0 Release 1 3    Version 4 6 2  Date 08 October 2009  Certification ID BSI DSZ CC 0615  Sponsor Oc   Technologies BV  File name Oce PRISMAsync Security_Target 4 6 2 doc  No of pages 19  This Security Target was prepared for   Oc   Technologies BV  P O  Box 101   5900 MA Venlo   The Netherlands    bri g htsig ht    by Brightsight     your  partner   in security  approval       2009 Oc   Technologies B V   Brightsight  Respectively    COMMERCIAL       COMMERCIAL       08 October 2009 Page 2 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Document information    Date of issue  Author s    Version number report  Certification ID  Scheme   Sponsor    Evaluation Lab    Sponsor Project leader    Target of Evaluation  TOE     TOE reference name  CC EAL number    Classification    Report title    Report reference name    08 October 2009 Page 3 of 55    08 October 2009    4 6 2  BSI DSZ CC 0615  BSI   Oc   Technologies BV  P O  Box 101    5900 MA Venlo    The Netherlands    Brightsight    IT Security Evaluation Facility  Delftechpark 1   2628XJ Delft   The Netherlands   Frederik Eveilleau   Oc   PRISMAsync 11 9 75 55 as used in  the Oc   VarioPrint 41x0 Release 1 3    Oc   PRISMAsync   2   augmented with ALC_FLR 1   Commercial   ST of the Oc   PRISMAsync 11 9 75 55  as used in the Oc   VarioPrint 41x0    Release 1 3  ST Oc   PRI
15. R Yovsscsccsscaciccosesesscaseesssisecsessesseccsassosesssacseacpusenteapiocseasouscndenssocsececadestensaasesscodseseuasadsensse 4  1  SECURITY TARGET INTRODUCTION  snsssnnenerenesenennnnenenesenensnnsnnese 7  1 1 ST Ten tafi cation sos  ss times nn intel un ELLE tile con nr lath inti need 7  1 2 ST OVERVIEW ibs ee E Ne Re dashed hs Sete ta hah EE delays hid ecto ase se 8  1 3 GC CONTOPM ANCE eoi emon aeree en lee di taf ne nent 9  2  TOE DESCRIPTION  sseesemsenmenenenessennnnennsesesessnnessennsesensseseenescenenseceescece 10  2 1 TOE OVERVICW   Si me ne SARE LE  BA EE EIS 10  2 1 1 TOE physical scope and boundary ss 10  2 1 2 TOE logical scope and boundary    14  3  TOE SECURITY ENVIRONMENT mssennnenerenennennenerenenerenenenensnnese 20  3 1 Definition of subjects  objects and operations 000 0    ce eee eeeeeeseeereeeeeceecnaecsaeceseeneeeaee 20  3 1 L  Nonhuman Subjects  45m men  es manette R ni nee desde 20  3 1 2   Human  subjectssisi rie ris men en mt eta ork ae eddie 20  3 13  SOBDIJESCIS Haine ER TR mt ne sale aeasscbeaued EEEa 21  2154  Op  rations  imite E E one nt cdots sab tente ete nest ts ss int 21  3 2 ASSUMP ONS zoi vr n teei UN ee ME CUA te eal ees Ten on en see 22  3 3 Threats os Tnt eh nn rem uen T Na eee denis A 23  3 4 Organisational Security Policies ss 23  4  SECURITY OBJECTIVES   enesensnnnnnnensnnensnsnenenseneeneeeoneessesesceneeseeee 24  4 1 TOE Security ODJECUVES este nn nt tn EEA tnt een fige tels 24  4 1 1 Functional Security Objectives for the 
16. SA 3 1 The TSF shall enforce the NETWORK_POLICY to provide restrictive  default values for security attributes that are used to enforce the SFP     FMT_MSA 3 2 The TSF shall allow nobody 3 to specify alternative initial values to  override the default values when an object or information is created     Dependencies  FMT_MSA 1  included   FMT_SMR 1  included     FMT_SMF 1 Specification of Management Functions  FMT_SMF 1 1 The TSF shall be capable of performing the following security  management functions as described in appendix E        Functions related to R SHRED_ JOB that are available to S REMOTE_SYSADMIN  and S SERVICE_ ENGINEER  e Set the number of shred runs      Dependencies  No dependencies        11 For grammatical and clarity reasons  the underscore between change and default was  removed and the word    the    before security attributes was moved to between    change    and     default       12 The TOE does not allow any users to change any security attributes in the evaluated  configuration    13 The word    the    before    nobody    was removed for grammatical reasons    14 Note that this is the only setting which is available in security mode high  the evaluated  configuration     08 October 2009 Page 28 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       FMT_SMR 1 Security roles  FMT_SMR 1 1 The TSF shall maintain the roles S REMOTE_SYSADMIN   S SERVICE_ENGINEER  S REMOTE_USER and S OPERATOR        FMT_SMR 1 2 The TSF shall be able to associate users with ro
17. SMAsync 11 9 75 55 4 6 2    Commercial BSI DSZ CC 0615    COMMERCIAL       Document history       Version Date Comment       0 1 14 04 05 Initial draft   0 2 17 05 05 Incorporated Oc   comments   0 3 30 05 05 Incorporated Oc   and BSI comments   0 4 24 11 05 Incorporated Oc   comments   1 0 06 02 06 Incorporated BSI comments   2 0 10 02 06 Incorporated BSI comments   2 1 16 02 06 Incorporated BSI comments   3 0 13 12 07 Updated for 21x0   3 1 31 1 08 Correction small error in Appendix D    3 2 10 06 08 Adaptation to comments from BSI   3 3 04 07 08 Adaptation to comments ZK_0510_ASE_03 rtf   4 0 16 02 09 Updated for 41x0   4 0 19 02 09 Repair errors in ST   4 1 05 03 09 Incorporated BSI comments   4 2 27 03 09 Update with the last TOE version and the new brand  name   4 3 01 04 09 Update with the BSI ID and the ast TOE version   4 4 27 04 09 Incorporate BrightSight comments    4 5 03 06 09 Incorporate BSI comments    4 6 16 06 09 Update the reference to the user manual CCC  configuration    4 6 1 21 09 09 Update the reference to the user manual CCC  configuration  2009 09    4 6 2 08 10 09 Update the reference to the security service manual for   CCC  2009 10              Signature    The sponsor project leader has signed for technical correctness     Frederik Eveilleau  Sponsor Project leader    08 October 2009 Page 4 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Contents  DOCUMENT INFORMATION msmeneensenennnenenerenenenenenenenenesenensnsenenesenses 3  DOCUMENT HISTO
18. TOE                      ss 24  4 1 2 Assurance Security Objectives for the TOE eee eeeeseeneecneeceeceseceseeeeeeeseeeeaes 24  4 2 Security Objectives for the environment    24  5 IT SECURITY REQUIREMENTS smnnenenenenennennenenenennennenesenesse 26  5 1 TOE Security Functional Requirements 0000 0    ceeeeeceeseeeeeeeeeeeseeeeeeecseceseeeseeseneeeaes 26  SLL  SERS for Bilterin o3icc  ste nee finit te it laste ta cerees tl otavebbiueteatshetectees 26  S4122  USER sifor Shred din ges  2seiesss52stecsees aie Mess titres ins sas rates nl tance tests 26  5 1 3     SFRS for Management  gt   reisene trs domaine menant eee Reste 27  5 1 4  SFRS for Protection of the TSF itself    29  5 1 5  Strength of function claim    ss 29  5 2 TOE Security Assurance Requirement             ccceccceesseceecceceeeeeeaeceeaeeceeeeessaeeeeaaeceeneeees 29  5 3 Security Requirements for the IT Environment    30  5 4 Explicitly stated requirements    30  6  TOE SUMMARY SPECIFICATION ssmsneeenerenennnnnenerenenenensenensnnese 31  6 1 IT Security  FUNCTIONS annro aa in ment Eae iea a eg  31  6 1 1 Probabilistic functions and mechanisms    31  6 1 2   Strength of function  Claims  it semer Rate E E Muni en rte 32    08 October 2009 Page 5 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL             6 2 Assurance  Measures rennene ienee e eea ent nent Lette eee ates 33  7  PP A i S I SEET EE A E E 35  8  RATIONALE DAE EE EEN E OA EEA EA 36  8 1 Security Objectives Rationale ss 36  8 2 Security Requirements Ra
19. UDP IP and ICMP as a network  protocol  DINBOUND_TRAFFIC shall only enter the TOE  R ENTER_TOE  if the Port is  specified as being open in Appendix D     The chances of mal ware being accidentally sent to the TOE and causing a security violation is  limited by only opening the ports and enabling the protocols that are absolutely necessary for the  operation of the TOE     Although the TOE is designed  tested and configured with security as a main concern  it is  possible that vulnerabilities will be discovered in the future that could be exploited in order to use  the TOE as a launch pad for an attack  By only opening the ports and enabling the protocols that  are absolutely necessary for the operation of the TOE  the chances of a successful attack launch  are limited     P JOB_DELETE  The policy requirement is met by the following TOE functional objective     O F JOB_SHRED   The TOE shall delete all D PRINT_JOB  D SCAN_JOB and D COPY_JOB  data as soon as it is no longer required or if during the start up procedure residual  PRINT_JOB   D SCAN_JOB and D COPY_JOB are found on the TOE   s hard disk  including the swap file    The first write cycle starts immediately after the job has deleted and the remaining cycles are  completed once the TOE enters an idle state  The data shall be deleted according to a recognised  standard so that it cannot be reconstituted        Scrubbing    the data from the hard disk when it is no longer needed helps prevent the data been  accessed by un
20. Version 3018  PCL6  interpreter  Version IPS6 0 2  Tomcat Web server version 5 5 26  with SSL support      Of these 6  the first three are not part of the TOE and together form the underlying hardware  platform that the TOE makes use of  The underlying hardware platform does not provide any  specific security related functionality for the TOE  The TSF is mediated by the last three software  components that are part of the TOE  This is depicted in   Figure 4        1 Note that the Oc   PRISMAsync protects print  copy  and scan data stored in it against  theft through e shredding  but the Oc   PRISMAsync itself may be stolen     08 October 2009 Page 12 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       TOE    Non TOE Generic PC Hardware Drivers  3     Generic PC Hardware  1 2        Figure 4  Division of the Oc   PRISMAsync into TOE and non TOE     The physical interfaces through which the TOE communicates are    e A network card through which a service engineer can administer the TOE  directly  physically accessible thanks to a cable extender     e A network card through which print and scan jobs can pass and a remote system  administrator can administer the TOE  physically accessible after removing a screwed  panel     e A RS232 interface  The data that flows between the TOE and the MED for printer control  purposes passes through this interface  physically accessible after removing a screwed  panel     e A RS422 interface  The data that flows between the TOE and the MFD fo
21. age 24 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       O E DEPLOYMENT    addition  measures shall be implemented to only allow connections to  the TOE from devices situated on the same network  No inbound  connections from external networks are allowed  The network scans  data for mal ware  viruses and worms   This type of data may  originate from either inside or outside the network to which the TOE  is attached and includes the TOE itself     The network  LAN  to which the TOE is attached is well managed  with established procedures for introducing and attaching new devices  to the network     O E LOCAL_INTERFACE The environment into which the TOE will be introduced shall    contain an Oc   VP41x0 MED that provides a Local User Interface and  Glass Plate through which S OPERATOR can interact easily with the  TOE to manage the print queue  When sending a D PRINT_JOB to  the Oc   PRISMAsync  S OPERATOR will ensure the print job is  deleted from the TOE during the same working day either by printing  not using the TOE waiting room  or deleting the jobs manually from  the automatic print queue or waiting room  Additionally   S REMOTE_SYSADMIN can remove all jobs in the waiting room at  any time  The Oc   PRISMAsync MED peripheral provides a glass  plate and LUI with which S OPERATOR can perform print  scan and  copy jobs  The ST claim is not valid when the TOE is used with any  other type of Oc   MED  The TOE will not work with any other device   including Digital MFD Prod
22. ation before any action  S REMOTE_SYSADMIN and S SERVICE_ENGINEER must authenticate themselves to the  TOE before any TOE management actions can be performed        FMT_SMEF 1 Specification of Management Functions  The functions that can be performed by either the S REMOTE_SYSADMIN or    S SERVICE_ENGINEER are defined     FMT_MOF 1 Management of security functions behaviour  Only TOE administrators and Oc   technicians can use security related functions        FMT_SMR 1 Security roles  The TOE shall make a distinction between administrators and ordinary users        FPT_RVM 1 Non bypassability of the TSP       08 October 2009 Page 41 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Users other than S REMOTE_SYSADMIN and S SERVICE_ENGINEER cannot gain access to  security management functions of the TOE without begin first controlled by the mechanisms  specified in this document     FPT_SEP 1 TSF domain separation  Identification and authentication of users occurs in an area of the TOE that is separate to non   security related operation        8 2 2 The security requirements for the IT environment meet the security objectives for  the environment    The TOE does not make any security requirements on its environment     08 October 2009 Page 42 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       8 2 3 The Assurance Requirements and Strength of Function Claim are appropriate       EAL2  ALC_FLR    Which comprises of    ACM_CAP  2 Configuration Items   ADO_DEL 1 Delivery proc
23. authorised persons     P TOE_ADMINISTRATION  The policy requirement is met by the following TOE functional objective     08 October 2009 Page 38 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       O F AUTHENTICATE   The TOE ensures that S IREMOTE_ SYSADMIN and  S SERVICE_ENGINEER must identify and authenticate themselves to the TOE before allowing  them to modify the TOE security settings     08 October 2009 Page 39 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       8 2 Security Requirements Rationale    The purpose of the Security Requirements Rationale is to demonstrate that the security  requirements are suitable to meet the Security Objectives     8 2 1 The SFRs meet the Security Objectives for the TOE  For each Security Objective for the TOE we demonstrate that it is met by the SFRs  The tracings  are provided implicitly by the rationales                    jesi Jez  m 1 m m m   B R FF 8 EE 8 E i    Eb KE EK   B B E P P 5 S E E  eo R  H H Lo pi   P  O F INBOUND_FILTER X X X X X X  O F JOB_SHREAD X X X  O F AUTHENTICATE X X X X X X X                                                    The individual rationales demonstrating the objectives are met are described as follows     O F INBOUND_FILTER   FDP_ACC 1 Subset access control   Inbound traffic is filtered so that only traffic relating to the operation of the TOE is allowed to  enter the TOE  This SFR supports the security objective by restricting the TOE data flow to only  that that is necessary for the operation of th
24. curity Environment for which a low attack potential exists     The Security Function that is realised by probabilistic or permutational mechanisms is   e SF MANAGEMENT    08 October 2009 Page 47 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The claim for this Security Function is    SOF basic     These Security Function is traced back to the  TOE SFRs it implements in 8 3 1     As the SOF claim for the Security Function is equal to the SOF claims for the TOE SFRs it  implements  the SOF claims are consistent     8 3 4 The functions are mutually supportive   The requirements are mutually supportive  see section 8 2 6  and the functions that implement  theses requirements are complete  see section 8 3 1   The functions are mutually supportive   This  argument has been based on section 9 3 8 of Guide for the production of PPs and STs  PDTR  15446 N2449      8 4 PP Claims Rationale    This Security Target TOE does not claim conformance to any Protection Profile     08 October 2009 Page 48 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       BSI  ITSEF  LUI    MFD    Appendix A Abbreviations    Bundesamt f  r Sicherheit in der Informationtechnik   IT Security Evaluation Facility   Local User Interface  attached to the Oc   PRISMAsync via a USB  connection  non security related interface used to manage the print queues  Multifunctional device for copying  printing and scanning  connected to a  network    08 October 2009 Page 49 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL 
25. e TOE  This reduces the number of vulnerable entry  points        FDP_ACF 1 Security attributes based access control  All ports that are not necessary for the operation of the TOE as described in this document are    blocked  This SFR supports the security objective by reducing the number of entry points that  could be vulnerable to attack     FMT_MSA 1 Management of security attributes   The TOE is delivered pre configured to the customer  This SFR supports the objective by  ensuring that it is not possible for any user  including S SERVICE_ENGINEER and  S REMOTE_SYSADMIN  to change the settings of the firewall mechanism        FMT_MSA 3 Static Attribute initialisation   In order to change the security attributes of the TOE the management interfaces provided for  S SERVICE_ENGINEER and S REMOTE_SYSADMIN must be used  This SFR supports the  objective by ensuring that the TOE provides restrictive default security related settings that  require no additional modification by SERVICE_ENGINEER or S REMOTE_SYSADMIN   Nobody is allowed to create new settings with alternative values        FPT_RVM 1 Non bypassability of the TSP       08 October 2009 Page 40 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       In order for data to enter or leave the TOE it must pass through the filtering mechanism  This  SFR supports the security objective by ensuring that TSF cannot be bypassed  resulting in a direct  line between the network to which the TOE is attached and the TOE being created    
26. echanisms  The Oc   PRISMAsync  provides a limited set of security functionality that is related to the operation of the TOE  The  nature of the TOE is such that evaluation at EAL2 provides a suitable level of assurance that the  only the TSF can perform security related operations     This SFR is supported by SF  MANAGEMENT   This Security Functional Requirement ensures that   1  No filtering mechanisms can be performed without being controlled by the TOE    s  security mechanisms  This SFR is supported by SF FILTERING   2  No shredding mechanisms can be performed without being controlled by the TOE   s  security mechanisms  This SFR is supported by SF  SHREDDING   3  No security related operations can be performed without being controlled by the TOE   s  security mechanisms  This SFR is supported by SF  MANAGEMENT     8 3 2 The assurance measures meet the SARs   The statement of assurance measures has been presented in the form of a reference to the  documents that show that the assurance measures have been met  CC Part 3 paragraph 188   This  statement can be found in section 6 2     8 3 3 The SOF claims for functions meet the SOF claims for the SFRs    The SFRs FIA_UAU 2  and FIA_UID 2 require the TOE to provide security functions that  provide identification authentication functionality that meets a SOF claim of    SOF basic        This rational for this is that the claim must adequate to defend against the identified threats to the  TOE that are identified in the TOE Se
27. edures   ADO_IGS 1 Installation  generation  and start up procedures   ADV_FSP 1 Fully defined external interfaces   ADV_HLD 1 Security enforcing high level design  O A SLA ADV_RCR 1 Informal correspondence demonstration   AGD_ADM 1 Administrator Guidance   AGD_USR 1 User guidance   ALC_FLR 1 Basic Flaw remediation   ATE_COV 1 Analysis of coverage   ATE_FUN 1 Functional testing   ATE_IND 2 Independent testing     sample   AVA_SOF 1 Strength of TOE security function evaluation             AVA_VLA 1 Developer vulnerability analysis          The Assurance Requirements consist of EAL 2 requirements components  The TOE is a  commercially available device produced by a well known manufacturer and most importantly   provides a limited set of security related functionality  The TOE has been structurally tested by  Oc   and is suitable for environments that require a low to moderate level of independently  assured security  The developer works in a consistent manner with good commercial practice     Occasionally the TOE may develop a problem that requires S SERVICE_ENGINEER to make a  visit to the customer location in order to repair the TOE  Oc   has procedures that support these  processes and for this reason the assurance requirements have been augmented with the following  assurance classes as the developer is able to meet them    Components for Life cycle support  Class ALC    e ALC _FLR 1 Basic Flaw Remediation    The evaluation of the TOE security mechanisms at AVA_VLA 1 is des
28. ements  support the security functionality provided by the TOE     3 1 Definition of subjects  objects and operations    To facilitate definition of threats  OSPs  assumptions  security objectives and security  requirements  we define the subjects  objects and operations to be used in the ST first     3 1 1  Non human subjects  The system  equipment  that will be interacting with the TOE  in alphabetical order      S DIGITAL_PRINTER A device that is part of the MFD peripheral that physically renders a  print job and is attached to the TOE via a cable     S DIGITAL_SCANNER A device that is part of the MED peripheral that scans in a copy or  scan job and is attached to the TOE via a cable     S LUI A device that provides a User Interface to S OPERATOR for non   security related operations  such as local  copying printing scanning queue management     S NETWORK_DEVICE An unspecified network device that is logically connected to the TOE  and is located in the same operating environment  office building      3 1 2 Human subjects  The users  or subject acting on behalf of that user  that will be interacting with the TOE are     S REMOTE_USER A person who can interact with the TOE indirectly by sending or  creating print jobs  and can send them to S OPERATOR to be  forwarded to the TOE  They are not malicious towards the TOE   S REMOTE_USER typically sends print jobs from their desktop PC     S OPERATOR A person with access to the operational environment of the TOE who  is aware of 
29. facturer has filtered all network ports so  that only data that is essential to the operation of the TOE can enter the TOE through the network  interface  The TOE has further restricted the functionality behind each open network port to that  which is absolutely necessary to its functioning  This is done to maximize the integrity of the  TOE itself and minimize the risk of the TOE being infected or hacked and subsequently being  used as a stepping stone to damage the network     The availability of security related functionality    As depicted in Figure 7  The Remote Key Operator is not able to influence the security of the  TOE as they have no access to security settings via the Oc   PRISMAsync Setting Editor     08 October 2009 Page 18 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Because the Remote Key Operator and TOE Operator cannot access security related settings on  the Oc   PRISMAsync LUI  they cannot affect the TOE  For the sake of clarity  Figure 8 shows  the interfaces to the TOE and the subjects that can access and manage TOE security settings              Network  ES   di B  Service Remote system  Engineer administrator    Figure 8  TOE Administrators and interfaces    08 October 2009 Page 19 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       3  TOE Security Environment    The TOE is intended to provide scan  print and copy functionality to users requiring a low to  moderate level of security assurance  Additional environmental and organisational requir
30. formal correspondence demonstration  Components for Guidance documents  Class AGD   AGD_ADM 1 Administrator guidance  AGD_USR 1 User guidance  Components for Life cycle support  Class ALC   ALC_FLR 1 Basic flaw remediation  Components for Tests  Class ATE   ATE_COV 1 Evidence of coverage  ATE_FUN 1 Functional testing  ATE_IND 2 Independent testing     sample  Components for Vulnerability assessment  Class AVA   AVA_SOF 1 Strength of TOE security function evaluation  AVA_VLA 1 Developer vulnerability analysis    5 3 Security Requirements for the IT Environment    None       5 4 Explicitly stated requirements    None        15 The ST defines security objectives for the IT environment in which the TOE will operate   In accordance with the Common Criteria Standard  these objectives are not mapped to Security  Requirements for the IT Environment     08 October 2009 Page 30 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       6  TOE Summary Specification    6 1 IT Security Functions    SF FILTERING   The TOE uses a built in firewall to block ports that are not needed for the operation of the TOE   In addition no network protocols that are not supported by the evaluated configuration are  enabled     By default no traffic is permitted to enter the TOE from the network to which it is attached   except for the supported network packets via the ports defined in the rule table described in  Appendix D     SF SHREDDING   Once a print  copy or scan job has been deleted  the data is overwr
31. how the TOE should be used  They are not malicious  towards the TOE  S OPERATOR typically interacts indirectly with  the TOE via S LUI or over the network  S OPERATOR receives print  jobs from S REMOTE_USER and places the jobs in the TOE print  queue or in the waiting room as appropriate to be processed by the  TOE     S REMOTE_SYSADMIN A person who can change some TOE settings using an Oc   supplied  interface accessed remotely over a network connection  They are  trusted by the customer and are adequately trained  They are capable    08 October 2009 Page 20 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       S SERVICE_ENGINEER    S THIEF    3 1 3 Objects    of making mistakes  They access the TOE via its network card from a  remote location on the customer LAN  They do not access the TOE  via the service network link     A person with elevated privileges above those of S OPERATOR and  S REMOTE_SYSADMIN  This person is an Oc   representative and  accesses the TOE through a dedicated network interface that is  separated from the customer network interface  They are not  malicious towards the TOE but are capable of making mistakes when  operating it    S THIEF  cleaning staff  burglar  visitor  in rare cases a user  will  have no moral issues in stealing the TOE or parts of it  Once S  THIEF  has stolen the TOE or parts of it he may attempt to retrieve earlier  print  scan and copy jobs from the TOE  S THIEF is opportunistic and  is not a recurring visitor to the environment 
32. igned to provide assurance  the exploit of obvious vulnerabilities by an attacker with a low attack potential  Therefore the  SOF claim is SOF basic  This strength of function claim is consistent with the security objectives  for the TOE and the defined TOE assumptions that have been made     08 October 2009 Page 43 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       8 2 4 All dependencies have been met  The following dependencies are identified and met  FDP_ACF 1  FDP_ACC 1  FMT_MSA 1   FMT_MSA 3  FIA_UID 2  FMT_SMF 1  FMT_SMR 1     8 2 5 The requirements are internally consistent  Because the assurance requirements form a package  EAL 2  they are internally consistent  The  addition of ALC_FLR 1 does not cause inconsistencies with the EAL 2 package     The functional requirements and assurance requirements do not have any dependencies between  them  and are therefore completely independent of each other  Because both functional and  assurance requirements are internally consistent  and they are independent  the requirements are  internally consistent     8 2 6 The requirements are mutually supportive   The requirements are complete and do not cause inconsistencies  therefore the requirements are  considered to be mutually supportive   This argument has been based on section 9 3 8 of Guide  for the production of PPs and STs  PDTR 15446 N2449      08 October 2009 Page 44 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       8 3 TOE Summary Specification Rationale  8 3 1 The f
33. igure 1  Relation between the Oc   PRISMAsync and MFD     The Oc   PRISMAsync is located internally in the MFD  This physical configuration is depicted  in Figure 2        Figure 2  View of the Oc   PRISMAsync controller in VP4110 4120  open or closed side     08 October 2009 Page 11 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL          Figure 3  Viewer of a separated Oc   PRISMAsync controller    The internal configuration helps prevent theft of the Oc   PRISMAsync  but prevention of theft of  the Oc   PRISMAsync is outside the scope of this evaluation   All logical access points  network  ports  USB serial parallel ports etc   are protected from physical access in the internal  configuration by a metal casing     The Oc   PRISMAsync consists of    1  A generic off the shelf PC comprising an Intel CPU  Mono Core   2 0GHz or Dual   Core   2 2GHz    Up to 2Go internal DDR2 RAM   a VGA output  graphical I O   up  to2 x 160GB hard drive   6 x USB 2 0 ports  2 x serial ports  1 x RS 232  amp  1 x RS 422   and 2 x Ethernet ports  UTP   Audio output    2  Generic embedded graphics card and 2 network cards supporting 10 100 1000Mbs  Ethernet UTP    3  Drivers for the PC  Chipset  CPU  graphics card  audio and network cards     4  The Microsoft Windows XP embedded  XPe  operating system with service pack 2  included the additional patches listed in Appendix F    5  Oc   PRISMAsync specific software release 11 9 75 55    6  Third party developed software  Adobe PS3 PDF Interpreter  
34. ime interval is set to everyday at 12am by default     08 October 2009 Page 15 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL          E mail server FTP server            Operators    ET    Figure 6  Operators and interfaces for scanning       7 The operator is unable to access any of the TOE security functions through the LUI  The LUI can only be  used for scanning  copying  printing and managing print queues     08 October 2009 Page 16 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The TOE can be managed    As indicated in the previous sections  the MFD  of which the TOE is a part  supports remote end   users and Operators  The MED also supports various administrators  which are described briefly  here     Remote Key Operator  These are typically administrators or secretaries from the organization  owning renting the TOE  They can interact with the Oc   PRISMAsync through a Web interface  that communicates with the TOE via the LAN  Through this interaction they have access to a  limited amount of non security related settings of the TOE     Remote System administrator  HTTPS   These are remote administrators  typically a network  administrator from the organization owning renting the TOE  They can read and write a limited  set of settings of the TOE through an SSL over HTTP connection  HTTPS   The remote  administrator can identify the TOE via a certificate  Web pages that are delivered via the HTTPS  connection are    non cacheable        Remote System administrator 
35. in which the TOE  operates     The  data  objects for the TOE that the TOE will operate upon are     D PRINT_JOB    D SCAN_JOB    D COPY_JOB    D INBOUND_TRAFFIC    3 1 4 Operations    A print job received by S OPERATOR from S REMOTE_USER  and  submitted to the TOE    Data that is scanned in via the S DIGITAL_SCANNER peripheral  attached to the Oc   PRISMAsync  Data is sent from the TOE to a FTP  or e mail server located elsewhere on the network    Data that is scanned in via the S DIGITAL_SCANNER peripheral  attached to the Oc   PRISMAsync  Data is returned from the TOE to  the printer peripheral for rendering    TCP IP  UDP IP or ICMP network packets received by the TOE   D INBOUND_TRAFFIC has the Security Attributes Port and  Protocol associated with it        The operations that are performed by the TOE are     R PRINT_JOB    R SCAN_JOB    R COPY_JOB    The TOE processes and releases a D PRINT_JOB to the attached  S DIGITAL_PRINTER peripheral    The TOE processes and releases a D SCAN_JOB to the attached  network though S NETWORK_DEVICE    The TOE processes and releases a D COPY_JOB to the attached  S DIGITAL_PRINTER peripheral     08 October 2009 Page 21 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       R SHRED_JOB    R ENTER_TOE    3 2 Assumptions    A DIGITAL_PRINTER    A DIGITAL_SCANNER    A LUI    A ENVIRONMENT    A SECURITY_POLICY    The TOE shreds released D PRINT_JOB  D SCAN_JOB and  D_COPY_JOB data objects from the TOE   s hard disk     The TOE allows D INBOUN
36. ire  functional specification can be found in     Test Specification for the Common Criteria Evaluated Security Functionality  implemented in the Oc   PRISMAsync Controller  version 2 6    Vulnerability Assessment  AVA  assurance measures  An analysis of vulnerabilities can be found in     Strength of function analysis the Oc   PRISMAsync 11 9 75 55 as used in the Oc    VP41x0 R1 3  version 1 4   Vulnerability analysis for the Oc   PRISMAsync 11 9 75 55 as used in the Oc    VarioPrint 4110 4120 printer copier scanner Release 1 3  version 1 3    Oc   PRISMAsync Vulnerability Analysis  Internal Report   Oc   PRISMAsync Penetration Tests  Internal Report   Oc   PRISMAsync Common Criteria Security test results  Internal Report    08 October 2009 Page 34 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       7  PP Claims    This Security Target TOE does not claim compliance to a Protection Profile     08 October 2009 Page 35 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       8  Rationale    8 1 Security Objectives Rationale    For each assumption  threat and OSP we demonstrate that it is met by the security objectives  The  tracings are provided in the following table        VIS VO    WALT GNNOGNIA O  HS OfO  AOVAYALNI TWOOTH O    LNAWNONMIANT  T O  AONOd HHOMLAN  HO  INANAOTIdAd  4 O    ALVOLLNAHLAV AO       A DIGITAL_PRINTER X       A DIGITAL_SCANNER  A LUI X    x lt        A ENVIRONMENT X       A SECURITY_POLICY X X X          A SLA X       T RESIDUAL_DATA X       T MALWARE X  
37. ironment into which the TOE will be introduced is protected by  physical measures that limit access to S OPERATOR  and S SERVICE_ENGINEER  The  physical measures are adequate to prevent all other persons but a determined S THIEF who  deliberately wants to steal a part of or the entire TOE by methodically planning an attack on the  TOE over a period of time     A SECURITY_POLICY  The assumption is met by the following objectives for the environment     O E NETWORK_POLICY   The network to which the TOE is attached shall be adequately  protected so that the TOE is not visible outside the network  In addition  measures shall be  implemented to only allow connections to the TOE from devices situated on the same network   No inbound connections from external networks are allowed  The network scans data for mal   ware  viruses and worms   This type of data may originate from either inside or outside the  network to which the TOE is attached and includes the TOE itself     O E DEPLOY MENT   The network  LAN  to which the TOE is attached is well managed with  established procedures for introducing and attaching new devices to the network     O E LOCAL_INTERFACE   The environment into which the TOE will be introduced shall  contain an Oc   VP41x0 that provides a Local User Interface and Glass Plate through which  S OPERATOR can interact easily with the TOE to manage the print queues  When sending a  D PRINT_JOB to the Oc   PRISMAsync  S OPERATOR is aware that they must delete the job o
38. itten  It is possible to perform  multiple write cycles  with various patterns being applied  At least three write cycles will always  take place  The first write cycle starts after the job has been deleted and to improve job  throughput performance  all other remaining cycles are done once the TOE enters an idle state   The shredding mechanism supports US DOD 5220 22m and Gutmann algorithms          SF MANAGEMENT   The TOE can be managed in relation to SF SHREDDING  In order to gain access  the  S REMOTE_SYSADMIN or S SERVICE_ ENGINEER must authenticate themselves to the  TOE  S SERVICE_ENGINEER does this by entering a PIN  S REMOTE_SYSADMIN  authenticates himself by entering a password  The TOE is delivered by Oc   with the most  restrictive set of operational settings     6 1 1 Probabilistic functions and mechanisms    The TOE contains probabilistic functions and mechanisms in the form of passwords and PIN  numbers that are used for the authentication of SIREMOTE_ SYSADMIN and  S SERVICE_ENGINEER respectively     16 See Appendix B     References for more information relating to these algorithms    08 October 2009 Page 31 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL                Subject Function Mechanism  S REMOTE_SYSADMIN   SF MANAGEMENT    For the HTTPS connection   SF SHREDDING an alpha numeric password     ASCII characters 32 127   ranging in length between 8  and 50 characters is required   After the first failed attempt   a delay mechanism is  invoked     There a
39. les     Dependencies  FIA_UID 1  hierarchical component included     5 1 4 SFRs for Protection of the TSF itself    FPT_SEP 1 TSF domain separation  FPT_SEP1 1 The TSF shall maintain a security domain for its own execution that  protects it from interference and tampering by untrusted subjects        FPT_SEP 1 2 The TSF shall enforce separation between the security domains of subjects  in the TSC     Dependencies  No dependencies     FPT_RVM 1 Non bypassability of the TSP  FPT_RVM 1 1 The TSF shall ensure that TSP enforcement functions are invoked and  succeed before each function within the TSC is allowed to proceed        Dependencies  No dependencies  5 15 Strength of function claim    The Strength of function claim for all the probabilistic functions and mechanisms provided by the  TOE is SOF basic     5 2 TOE Security Assurance Requirements    The TOE security assurance requirements are conformant to the CC Evaluation Assurance Level  EAL2  ALC_FLR 1  In detail the following Security Assurance Requirements are chosen for the  TOE     Components for Configuration management  Class ACM   ACM_CAP 2 Configuration Items   Components for Delivery and operation  Class ADO   ADO_DEL 1 Delivery procedures  ADO_IGS 1 Installation  generation  and start up procedures    08 October 2009 Page 29 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Components for Development  Class ADV   ADV_FSP 1 Informal functional specification  ADV_HLD 1 Descriptive high level design  ADV_RCR 1 In
40. n  the same workday that it is sent to the TOE  whether or not it is printed  The MFD provides a  glass plate and LUI with which S OPERATOR can perform print copy scan jobs  The ST claim is  not valid when the TOE is used with any other type of Oc   MED  The TOE will not work with  any other device  including Digital MFD Products from any other manufacturers      A SLA  The assumption is met by the following TOE assurance objective     O A SLA   The TOE shall be evaluated to ALC_FLR 1 There are measures in place to repair  faults in the TOE when they occur     T RESIDUAL_DATA  The threat is met by the following TOE functional objective     08 October 2009 Page 37 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       O F JOB_SHRED   The TOE shall delete all D PRINT_JOB  D SCAN_JOB and D COPY_JOB  data as soon as it is no longer required or during the start up procedure if residuals  D PRINT_JOB  D SCAN_JOB or D COPY_JOB are found on the TOE   s hard disk  including  the swap file   The first write cycle starts immediately after the job has deleted and the rest are  completed once the TOE enters an idle state  The data shall be deleted according to a recognised  standard so that it cannot be reconstituted        Scrubbing    the data from the hard disk when it is no longer needed helps prevent the data been  accessed by unauthorised persons     T MALWARE  The threat is met by the following objectives for the environment     O F INBOUND_FILTER   The TOE will only support TCP IP  
41. nnot administer the TOE     FMT_MSA 1   This Security Functional Requirement ensures that the TOE management functions related to the  filter mechanism settings cannot be changed  This SFR is supported by SF  MANGEMENT that  ensures that filter related settings cannot be changed by administrators     FMT_MSA 3   This Security Functional Requirement ensures that the TOE management functions related to the  filter mechanism settings are given default values  This SFR is supported by  SF MANAGEMENT that ensures that the filter related settings are pre configured before delivery  to the customer     FMT_SMF 1   This Security Functional Requirement ensures that the TOE management functions are defined   This SFR is supported by functions made available by SF MANAGEMENT and defines the set of  operations that are available to the Oc   technician  S SERVICE_ENGINEER  or customer  system administrator  S REMOTE_SYSADMIN  that are needed to administrate the TOE     FMT_SMR 1   This Security Functional Requirement ensures that the TOE makes a distinction between security  related roles and normal users  This SFR is supported by SF  MANAGEMENT  This SFR is  supported by SF  MANAGEMENT and ensures that non administrators cannot administer the  TOE     FPT_SEP 1   This Security Functional Requirement ensures that the TSF operates in its own domain and  cannot be influenced by external sources  This requirement is met by the physical characteristics  of the TOE that comprises software that
42. r scanner  control purposes passes through this interfaces  physically accessible after removing a  screwed panel     e A USB interface  The data that flows between the TOE and the MFD for all printing   scanning  copying  and power management purposes passes through this interface   physically accessible after removing a screwed panel     e A USB port through which the Operator can communicate with the TOE via the toucg  screen  LUI  to manage print jobs  but this interface cannot be used to perform any  security management operations   physically accessible after removing a screwed  panel     e A USB port through the TOE gives the printer status via the Red Orange Green Operator  light   e A USB port through which the Operator can stop or re start the print process  HO GO  Button      08 October 2009 Page 13 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       The operator    guidance for the TOE consists of   e Oc   VarioPrint 4110 4120 Manual type Operating information  version 2008 11   e Oc   VarioPrint 4110 4120 Common Criteria certified configuration of the Oc    PRISMAsync  Edition 2009 09     The administrator guidance for the TOE consists of   e Oc   VarioPrint 4110 4120 Administrator settings and tasks  Edition 2009 05  e Oc   VarioPrint 4110 4120 Common Criteria certified configuration of the Oc    PRISMAsync  Edition 2009 09    The Oc   PRISMAsync administration guidance for the Oc   service engineer consists of   e Oc   VarioPrint 4110 4120 Security service doc
43. re no security  management functions or  access to the assets that the  TOE protects that are  accessible via the SNMP             connection   S SERVICE_ENGINEER   SF MANAGEMENT    A fixed length numeric pin  SF SHREDDING code of 6 digits        6 1 2 Strength of function claim    The SFRs FIA_UID 2 and FIA_UAU 2 require the TOE to provide security functions that  provide identification authentication functionality that meets a SOF claim of    SOF basic        A strength of function claim of    SOF basic    is made for the security function  SF MANAGEMENT  This is the security function that implements FIA_UID 2 and FIA_UAU 2     08 October 2009 Page 32 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       6 2 Assurance Measures    Appropriate assurance measures are employed to satisfy the security assurance requirements  The  following list gives a mapping between the assurance requirements and the documents containing  the information needed for the fulfilment of the respective requirement     Configuration Management  ACM  assurance measures  The documents containing the description of the configuration management system as required by  ACM and how it is used are is   e Configuration Management List for the Oc   PRISMAsync Controller  PS  R11 9 75 55  as used in the Oc   VarioPrint 4110 4120 printer copier scanner release 1 3 products   version 1 9 2    Delivery and Operation  ADO  assurance measures  The document containing the description of all steps necessary for secure
44. shall only enter the TOE   R ENTER_TOE  if its Port is specified as being open in Appendix D     O F JOB_SHRED The TOE shall delete all D PRINT_JOB  D SCAN_JOB and  D COPY_JOB data as soon as it is no longer required  During the  start up procedure  any residual D PRINT_JOB  D SCAN_JOB and  D COPY_JOB located in the TOE   s hard disk  including the swap  file  is deleted  The first write cycle occurs after the job has been  deleted and the other remaining cycles occur once the TOE enters an  idle state  The data shall be deleted according to a recognised standard  so that it cannot be reconstituted     O F AUTHENTICATE The TOE ensures that S IREMOTE_SYSADMIN and  S SERVICE_ ENGINEER must authenticate themselves to the TOE  before allowing them to modify the TOE security settings     4 1 2 Assurance Security Objectives for the TOE    O A SLA The TOE shall be evaluated to ALC_FLR 1    42 Security Objectives for the environment    O E ENVIRONMENT The environment into which the TOE will be introduced is protected  by physical measures that limit access to S OPERATOR  and  S SERVICE_ENGINEER  The physical measures are adequate to  prevent all other persons but not a determined S  THIEF who  deliberately wants to steal a part of or the entire TOE by methodically  planning an attack on the TOE over a period of time     O E NETWORK_POLICY The network to which the TOE is attached shall be adequately  protected so that the TOE is not visible outside the network  In    08 October 2009 P
45. sssnsscesssssesssssnesessnessessessossesooes 54  15  DISTRIBUTION LIST sue 55  08 October 2009 Page 6 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       1  Security Target Introduction    1 1 ST Identification    Name of the TOE   Oc   PRISMAsync 11 9 75 55 as used in the Oc   VarioPrint 41x0 Release 1 3    Name of the Security Target   ST of the  Oc   PRISMAsync 11 9 75 55 as used in the Oc   VarioPrint 41x0 Release 1 3    ST evaluation status  Non evaluated release    ST version number  4 6 2  ST publication date  08 October 2009    ST authors   This Security Target was prepared for   Oc   Technologies BV  P O  Box 101     5900 MA Venlo   The Netherlands    bri g htsig ht    by Brightsight  IT Security Evaluation    Facility    ed Delftechpark 1  partner   in security 2628XJ Delft  approval The Netherlands    08 October 2009 Page 7 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       1 2 ST Overview  The firm Oc   produces a wide range of multifunctional devices for copying  printing and scanning   MFDs  for various purposes  One of these MFD seriess  the VP41x0 R1 3 VP4110 and VP4120     uses PC hardware based controller  the Oc   PRISMAsync       The Oc   PRISMAsync v11 9 75 55  is used with the Oc   VP41x0 R1 3    These VarioPrint products are referred to collectively in this Security Target as MFDs          An Oc   VP41x0  R1 3 with  embedded the Oc    PRISMAsync  controller                 The Oc   PRISMAsync is a PC based MFD controller  The Oc   PRISMAsync provides
46. the file allocation table to a location that is dedicated to the E shred subsystem   e The E shred subsystem then erases the data  makes the data  unavailable  by overwriting the data several times      The E shred service then removes the reference to the erased data  from the file allocation table so that the erased disk resources can be re used   9 The Oc   PRISMAsync can experience errors and sometimes require restarting to handle    these errors  or users restart the photocopier anyway in an attempt to handle these errors   It is  therefore important that the photocopier also deletes data whenever it is restarted    10 Note that this SFR relates to administration via the HTTPS connection  There are no TSF  mediated actions that can be managed via the SNMP connection     08 October 2009 Page 27 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL          FMT_MOF 1 Management of security functions behaviour  S SERVICE_ ENGINEER   FMT_MOF 1 1 The TSF shall restrict the ability to modify the behaviour of the  functions described in appendix E for SSERVICE_ENGINEER to  S SERVICE_ENGINEER     Dependencies  FMT_SMEF 1  included   FMT_SMR 1  included     FMT_MSA 1 Management of security attributes  FMT_MSA 1 1 The TSF shall enforce the NETWORK_POLICY to restrict the ability  to change the default    security attributes Port and Protocol to nobody  2       Dependencies  FDP_ACC 1  included   FMT_SMF 1  included   FMT_SMR 1  included     FMT_MSA 3 Static Attribute initialisation  FMT_M
47. tionale ee eeeeseeesceeseeeseeesaecnseceseceseeesecseeeeeeseeeeaaecaaees 40  8 2 1 The SFRs meet the Security Objectives for the TOE oe  eee esesseceseceneceteeeeeees 40  8 2 2 The security requirements for the IT environment meet the security objectives for  the environments sienne dite ates eee eed peta er eee 42  8 2 3 The Assurance Requirements and Strength of Function Claim are appropriate        43  8 2 4 All dependencies have been met    44  8 2 5 The requirements are internally consistent                                                           44  8 2 6 The requirements are mutually supportive 2 0 0    eee eeeceseeeeeeeeeeeeaeeeseeeaeesaaecnaeees 44  8 3 TOE Summary Specification Rationale                                               ss 45  8 3 1 The functions meet the SFRS                                     R A R 45  8 3 2 The assurance measures meet the SARS                                      47  8 3 3 The SOF claims for functions meet the SOF claims for the SFRs                            47  8 3 4 The functions are mutually supportive ss 48  8 4 PP Claims  Rational  s c seit  misent main ternnninihnmitiaenittin 48  9  APPENDIX A ABBREVIATIONSeeenenennnnnnennse 49  10  APPENDIX B REFERENCES eee 50  11  APPENDIX C GLOSSARY OF TERMS   ssenennnnnenerenensenesesensenese 51  12  APPENDIX D FIREWALL RULE TABLE   ssssnnneenesee 52  13  APPENDIX E SECURITY RELATED ADMINISTRATION FUNCTIONS ss 53  14  APPENDIX F XP PATCHES APPLIED              csscscssscsscsscsscssesss
48. to print jobs  and temporary files        This is achieved by writing over the job related data with other data  thereby making it difficult to  retrieve the original data     The TOE administrators can select the number of write iterations  This 2 fold mechanism is fully  asynchronous  Shredding is performed in a separate process  with different priorities depending  on the overwriting iteration  The first iteration starts after the data is deleted  The remaining  iterations take place with low priority in the background     Additionally  the TOE is also configured to shred all data periodically  Every day  every week or  every month or never         The TOE operators scan jobs that are exported to the network   Operators can scan documents on the VP41x0 R1 3 using the Local User Interface  LUD  and the  resulting images will then be submitted to the TOE  The TOE can process the images to a variety  of file formats and then transfer the resulting files by ftp to an ftp server or by SMTP to an e mail  server on the network  The Operator can also complete copy jobs through the LUI  with the  resulting images sent to the MFD     The operators and interfaces they interact with  LUI    and network  are depicted in Figure 6       Also scan and copy jobs  see the next sub section and Figure 6   Job data is deleted when the job is completed or deleted from the mailbox  Temporary files  swap  file  are shredded during system restart     The setting to shred the data at a particular t
49. ts thereof and retrieves stored or  deleted D PRINT_JOB  D SCAN_JOB and D COPY_JOB  The  motivation for S  THIEF to attack the TOE is low because it requires  sophisticated data recovery equipment that can recover data even after  the shredding mechanism has executed to recover data that has little  value to the attacker     An S NETWORK_DEVICE is used by malware that may have  entered the TOE   s operational environment to launch an attack on the  integrity of the TOE  The motivation to carry out this attack is low     3 4 Organisational Security Policies    P JOB_DELETE    When D PRINT_JOB  D SCAN_JOB and D COPY_JOB objects are  no longer needed by the TOE  they will be deleted by the TOE at the  earliest available opportunity in a manner that meets a recognised  standard     P TOE_ADMINISTRATION The modification of TOE security settings shall be restricted to    S SERVICE_ENGINEER and S REMOTE_SYSADMIN     08 October 2009 Page 23 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       4  Security Objectives    41 TOE Security Objectives    This section consists of two groups of objectives    e Functional Security Objectives for the TOE  that deal with what the TOE must do    e Assurance Security Objectives for the TOE  that deal with how much assurance one should  have in that the TOE does what it is expected to     4 1 1 Functional Security Objectives for the TOE    O F INBOUND FILTER The TOE will only support TCP IP  UDP IP and ICMP as a network  protocol  DINBOUND_TRAFFIC 
50. ucts from any other manufacturers      08 October 2009 Page 25 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       5  IT Security Requirements    5 1 TOE Security Functional Requirements  5 1 1 SFRs for Filtering  FDP_ACC 1 Subset access control    FDP_ACC1 1 The TSF shall enforce the NETWORK _ POLICY on      D INBOUND_TRAFFIC       Dependencies  FDP_ACF 1  included     FDP_ACF 1 Security attributes based access control  FDP_ACF1 1 The TSF shall enforce the NETWORK_POLICY to objects based on  the following   e Port   e Protocol        FDP_ACF 1 2 The TSF shall enforce the following rules to determine if an operation   among controlled subjects and controlled objects is allowed    e The TOE shall perform R ENTER_TOE on D INBOUND_TRAFFIC only if  Port D INBOUND_TRAFFIC    ICMP  LPR  HTTP  HTTPS  SNMP and  Protocol   TCP IP or UDP IP    FDP_ACF 1 3 The TSF shall explicitly authorise access of subjects to objects based on  the following additional rules    e none   FDP_ACF 1 4 The TSF shall explicitly deny access of subjects to objects based on the  following additional rules    e none    Dependencies  FDP_ACC 1  included   FMT_MSA 3  included     5 1 2 SFRs for Shredding    FDP_RIP 1 Subset residual  information protection    08 October 2009 Page 26 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       FDP_RIP 1 18 The TSF shall ensure that any previous information content of a resource  is made unavailable upon the deallocation of the resource from the following objects   D PRI
51. umentation  Edition 2009 10    2 1 2 TOE logical scope and boundary  The TOE protects two assets  itself and the copy  print and scan job data that it receives   Firstly  the TOE protects its own integrity against threats from the LAN to which it is attached    through use of a firewall     Secondly  the TOE protects the confidentiality of print  copy and scan job data after they are no  longer needed  The Oc   PRISMAsync does this by shredding the data after they are deleted     In order to protect these two assets  it offers the following functionality   The TOE controls printing from the network    The TOE accepts Postscript  PDF and PCL6 print jobs from remote users on the network  lpr  over TCP IP  and provides these as images to the attached MFD printing peripheral     The TOE receives a print job from a remote end user  and it is either put in the print waiting  room    or in the print queue  Once this job becomes the first in the queue  the TOE processes this  print job into images  and sends these images to the attached MED peripheral for printing     The remote end users and interfaces they interact with are depicted in Figure 5          No guidance is necessary for the remote end user of the TOE     The waiting room is the name use to refer to operator mailbox     08 October 2009 Page 14 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       Remote end user          Figure 5  End users and interfaces for printing    The TOE is configured to destroy the data relating 
52. unction name and a short description     S SERVICE_ENGINEER       Administration Function Description       ResetSASPassword Resets the S REMOTE_SYSADMIN  password to its default value                   S REMOTE_SYSADMIN  amp  S SERVICE_ENGINEER       Administration Function Description   Security Security level enable high level Enable disable switch for high security  level    This must not be changed if the  customer requires the CC evaluated  configuration                 Security E shredding Method Shredding method  Dod  Guttmann   custom    Security E shredding Number of runs Number of runs can be set from 3 to 35  when the    Custom    shredding method is  selected     System System administrator PIN Change S REMOTE_SYSADMIN  password                         17 In high security mode shredding cannot be turned off   18 When  DoD  is chosen  the number of passes is fixed to 3  and cannot be changed  When   Gutmann  is chosen  the number of passes is fixed to 35  and cannot be changed     08 October 2009 Page 53 of 55 Commercial BSI DSZ CC 0615    COMMERCIAL       14  Appendix F XP Patches applied    KB888413 KB942830  KB918118 KB942831  KB921503 KB943055  KB924270 KB943460  KB924667 KB943485  KB925454 KB944338  KB925902 KB944338 v2  KB926247 KB944533  KB926255 KB944945  KB926436 KB945553  KB927779 KB946026  KB928090 KB947864  KB928255 KB948590  KB928388 KB948686  KB930178 KB94888 1  KB931784 KB950749  KB931836 KB950759  KB933360 KB950760  KB933566 KB950974  KB933729 KB95
53. unctions meet the SFRs    For each SFR we demonstrate that it is met by the Security Functions  The tracings are provided  implicitly by the rationales                                                                    PET TEEEEREEREEEE   PR    EREEREEEEE  SF FILTERING X X X X X X  SF SHREDDING X X X  SF MANAGEMENT X X X X X X X X X  FDP_ACC 1    This Security Functional Requirement ensures that only traffic is allowed to enter the TOE that is  relevant to its operation  This SFR is supported by SF FILTERING that restricts flow of network  traffic and limits the supported network protocols     FDP_ACF 1   This Security Functional Requirement ensures that all ports that are non essential to the operation  of the TOE are blocked  This SFR is supported by SF FILTERING  SF FILTERING expands on  the restricted flow of network traffic and supported network protocols by defining which ports are  open and which protocols are supported     FDP_RIP 1   This Security Functional Requirement ensures requires that residual information relating to  D PRINT_JOB  D COPY_JOB and D SCAN_JOB is deleted once they are no longer needed or  during the startup procedure  if residual print or scan job data is found on the hard disk  including  the swap file   The SFR has been refined to describe the moment when the data will be shredded   This SFR is supported by SF SHREDDING that provides functionality that ensures the data  objects detailed above are shredded in accordance with known standards  This
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
HPLC: Troubleshooting und Methodenoptimierung 21.04.2015  ASSMANN Electronic AK 154 5M printer cable  NETQuest website  Manual Relógio de Ponto - BIO - Pointline  Wiley Visio 2007 Bible  Oricom SECURE 200 Baby Monitor User Manual  Baixar  Manual de instrucciones  TC74HCT139AP, TC74HCT139AF      Copyright © All rights reserved. 
   Failed to retrieve file