Home > Ricoh > All in One Printer > Ricoh Mp C3001 Instruction Manual

Ricoh Mp C3001 Instruction Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Ricoh Mp C3001 Instruction Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 127 Ricoh manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							    Page 60 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    FIA_UAU.1.2(a)  The TSF shall require each user to be successfully authenticated before allowing any other 
    TSF-mediated actions on behalf of that user. 
    FIA_UAU.1(b)  Timing of authentication 
    Hierarchical to:  No other components. 
    Dependencies:  FIA_UID.1 Timing of identification 
    FIA_UAU.1.1(b)  The TSF shall allow [assignment: the viewing of the list of user jobs, Web Image Monitor 
    Help from a Web browser, system status, counter and information of inquiries, execution 
    of fax reception, and repair request notification] on behalf of the user to be performed before 
    the user is authenticated (refinement: authentication of MFP administrator and supervisor with 
    Basic Authentication, and authentication of normal user with external authentication server). 
    FIA_UAU.1.2(b)  The TSF shall require each user to be successfully authenticated before allowing any other 
    TSF-mediated actions on behalf of that user. 
    FIA_UAU.2  User authentication before action 
    Hierarchical to:  FIA_UAU.1 Timing of authentication 
    Dependencies:  FIA_UID.1 Timing of identification 
    FIA_UAU.2.1  The TSF shall require each user to be successfully authenticated (refinement: authentication of 
    a person who intends to use the TOE from RC Gate communication interface) before allowing 
    other TSF-mediated actions on behalf of that user. 
    FIA_UAU.7 Protected authentication feedback 
    Hierarchical to:  No other components. 
    Dependencies:  FIA_UAU.1 Timing of authentication 
    FIA_UAU.7.1  The TSF shall provide only [assignment: displaying dummy letters as authentication 
    feedback on the Operation Panel] to the user while the authentication is in progress. 
    FIA_UID.1(a) Timing of identification 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FIA_UID.1.1(a)  The TSF shall allow [assignment: the viewing of the list of user jobs, Web Image Monitor 
    Help from a Web browser, system status, counter and information of inquiries, execution 
    of fax reception, and repair request notification] on behalf of the user to be performed before 
    the user is identified (refinement: identification with Basic Authentication). 
    FIA_UID.1.2(a)  The TSF shall require each user to be successfully identified before allowing any other 
    TSF-mediated actions on behalf of that user. 
    FIA_UID.1(b) Timing of identification 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FIA_UID.1.1(b)  The TSF shall allow [assignment: the viewing of the list of user jobs, Web Image Monitor 
    Help from a Web browser, system status, counter and information of inquiries, execution  
    						
    							    Page 61 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    of fax reception, and repair request notification] on behalf of the user to be performed before 
    the user is identified (refinement: authentication of MFP administrator and supervisor with 
    Basic Authentication, and identification of normal user with external authentication server). 
    FIA_UID.1.2(b)  The TSF shall require each user to be successfully identified before allowing other 
    TSF-mediated actions on behalf of that user. 
    FIA_UID.2  User identification before action 
    Hierarchical to:  FIA_UID.1Timing of identification 
    Dependencies: No dependencies. 
    FIA_UID.2.1  The TSF shall require each user to be successfully identified (refinement: identification of a 
    person who intends to use the TOE from RC Gate communication interface) before allowing 
    other TSF-mediated actions on behalf of that user. 
    FIA_USB.1 User-subject binding 
    Hierarchical to:  No other components. 
    Dependencies:  FIA_ATD.1 User attribute definition 
    FIA_USB.1.1  The TSF shall associate the following user security attributes with subjects acting on the behalf 
    of that user: [assignme nt: login user na me  of nor mal user, login user na me of MFP 
    administrator, available function list, and user role]. 
    FIA_USB.1.2  The TSF shall enforce the following rules on the initial association of user security attributes 
    with subjects acting on the behalf of users: [assignment: rules for the initial association of 
    attributes listed in Table 25]. 
    Table 25 : Rules for Initial Association of Attributes 
    Users Subjects User Security Attributes 
    Normal user  Normal user process  - Login user name of normal user 
    - User role 
    - Available function list 
    Supervisor  Supervisor process  - User role 
    MFP administrator  MFP administrator process  - Login user name of MFP administrator 
    - User role 
    RC Gate  RC Gate process  - User role 
    FIA_USB.1.3  The TSF shall enforce the following rules governing changes to the user security attributes 
    associated with subjects acting on the behalf of users: [assignment: none]. 
    6.1.5  Class FMT: Security management 
    FMT_MSA.1(a) Management of security attributes 
    Hierarchical to:  No other components.  
    						
    							    Page 62 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    Dependencies:  [FDP_ACC.1 Subset access control, or 
    FDP_IFC.1 Subset information flow control] 
    FMT_SMR.1 Security roles 
    FMT_SMF.1 Specification of Management Function 
    FMT_MSA.1.1(a) The TSF shall enforce the [assignment: document access control SFP] to restrict the ability to 
    [selection: query, modify, delete, [assignment: newly create]] the security attributes 
    [assignment: security attributes in Table 26] to [assignment: the user roles with operation 
    permission in Table 26]. 
    Table 26 : User Roles for Security Attributes (a) 
    Security Attributes Operations User Roles 
    with Operation Permission 
    Query, 
    modify, 
    delete, 
    newly create MFP administrator 
    Login user name of normal user 
    for Basic Authentication 
    Query Normal user who owns the applicable 
    login user name 
    Login user name of normal user 
    for External Authentication Query, 
    modify, 
    delete, 
    newly create MFP administrator   
    Login user name of supervisor Query, 
    modify Supervisor 
    Newly create  MFP administrator 
    Query, 
    modify MFP administrator who owns the 
    applicable login user name Login user name of MFP administrator 
    Query Supervisor 
    Document data attribute  No operation permitted  - 
    Document user list 
    [when document data attributes are 
    (+PRT), (+SCN), (+CPY), and 
    (+FAXOUT)] No operation permitted  - 
    Document user list 
    [when document data attribute is (+DSR)] Query, 
    modify MFP administrator, 
    applicable normal user who stored the 
    document data 
    Document user list 
    [when document data attribute is 
    (+FAXIN)] Query, 
    modify MFP administrator 
    -: No user roles are permitted for operations by the TOE.  
    						
    							    Page 63 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    FMT_MSA.1(b)Management of security attributes 
    Hierarchical to:  No other components. 
    Dependencies:  [FDP_ACC.1 Subset access control, or 
    FDP_IFC.1 Subset information flow control] 
    FMT_SMR.1 Security roles 
    FMT_SMF.1 Specification of Management Function 
    FMT_MSA.1.1(b)The TSF shall enforce the [assignment: TOE function access control SFP] to restrict the 
    ability to [selection: query, modify, delete, [assignment: newly create]] the security attributes 
    [assignment: security attributes in Table 27] to [assignment: the user roles with operation 
    permission in Table 27]. 
    Table 27 : User Roles for Security Attributes (b) 
    Security Attributes Operations User Roles with operation permission 
    Query, 
    modify, 
    delete, 
    newly create MFP administrator 
    Login user name of normal user 
    for Basic Authentication 
    Query  Normal user who owns the applicable 
    login user name 
    Login user name of normal user 
    for External Authentication Query, 
    modify, 
    delete, 
    newly create MFP administrator 
    Query, 
    modify MFP administrator Available function list 
    Query 
    (however, query is not 
    allowed in case of 
    External Authentication) Applicable normal user 
    Function type  No operation permitted  - 
    User role  No operation permitted  - 
    -: No user roles are permitted for operations by the TOE. 
    FMT_MSA.3(a) Static  attribute  initialisation 
    Hierarchical to:  No other components. 
    Dependencies:  FMT_MSA.1 Management of security attributes 
    FMT_SMR.1 Security roles 
    FMT_MSA.3.1(a) The TSF shall enforce the [assignment: document access control SFP] to provide [selection: 
    restrictive] default values for security attributes that are used to enforce the SFP.  
    						
    							    Page 64 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    FMT_MSA.3.2(a) The TSF shall allow the [assignment: authorised identified roles shown in Table 28] to 
    specify alternative initial values to override the default values when an object or information is 
    created. 
    Table 28 : Authorised Identified Roles Allowed to Override Default Values 
    Objects Security 
    Attributes 
    Authorised Identified Roles 
    Document data  Document  data 
    attribute - No authorised identified roles 
    Document data 
    [when document 
    data attribute is 
    (+DSR)] Document user 
    list - MFP administrator 
    - Normal user who stored the applicable document data 
    Document data 
    [when document 
    data attributes are 
    (+PRT), (+SCN), 
    (+CPY), 
    (+FAXIN), and 
    (+FAXOUT)] Document user 
    list - No authorised identified roles 
    User job  Login user name 
    of normal user - No authorised identified roles 
    FMT_MSA.3(b) Static attribute initialisation 
    Hierarchical to:  No other components. 
    Dependencies:  FMT_MSA.1 Management of security attributes 
    FMT_SMR.1 Security roles 
    FMT_MSA.3.1(b)The TSF shall enforce the [assignment: TOE function access control SFP] to provide 
    [selection: [assignment: the permissive to the available function list, restrictive to the 
    function type, restrictive to the user role]] default values for security attributes that are used 
    to enforce the SFP. 
    FMT_MSA.3.2(b) The TSF shall allow the [assignment: MFP administrator for the available function list, no 
    authorised identified roles for the function type, no authorised identified roles for the user 
    role] to specify alternative initial values to override the default values when an object or 
    information is created. 
    FMT_MTD.1  Management of TSF data 
    Hierarchical to:  No other components. 
    Dependencies:  FMT_SMR.1 Security roles 
    FMT_SMF.1 Specification of Management Functions  
    						
    							    Page 65 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    FMT_MTD.1.1  The TSF shall restrict the ability to [selection: query, modify, delete, [assignment: newly 
    create]] the [assignment: list of TSF data in Table 29] to [assignment: the user roles in 
    Table 29]. 
    Table 29 : List of TSF Data 
    TSF Data Operations User Roles 
    Newly create, modify  MFP administrator Login password of normal user 
    for Basic Authentication Modify  Normal user who owns the login 
    password 
    Login password of supervisor  Modify  Supervisor 
    Modify Supervisor 
    Newly create  MFP administrator Login password of MFP 
    administrator 
    Modify  MFP administrator who owns the 
    login password 
    Number of Attempts before 
    Lockout for Basic 
    Authentication Query MFP administrator 
    Setting for Lockout Release 
    Timer for Basic Authentication Query MFP administrator 
    Lockout time for Basic 
    Authentication Query MFP administrator 
    Query, modify  MFP administrator Date setting (year, month, 
    day), time setting (hour, 
    minute) Query Supervisor, 
    normal user 
    Minimum character number for 
    Basic Authentication Query MFP administrator 
    Password complexity setting 
    for Basic Authentication Query MFP administrator 
    Audit logs  Query, delete  MFP administrator 
    HDD cryptographic key  Newly create  MFP administrator 
    Newly create, modify, query, 
    delete MFP administrator 
    S/MIME user information Query 
    (however, operation of query 
    on user certificate is not 
    allowed in case of External 
    Authentication) Normal user 
    Newly create, modify, query, 
    delete MFP administrator Destination information for 
    folder transmission 
    Query Normal user  
    						
    							    Page 66 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    TSF Data Operations User Roles 
    Users for stored and received 
    documents Query, modify  MFP administrator 
    User authentication method  Query  MFP administrator 
    FMT_SMF.1  Specification of Management Functions 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FMT_SMF.1.1  The TSF shall be capable of performing the following management functions: [assignment: 
    management functions shown in Table 30]. 
    Table 30 : List of Specification of Management Functions 
    Management Functions 
    New creation, query, modification, and deletion of the login user name of normal user by MFP administrator 
    when the Basic Authentication is used 
    Query of own login user name by normal user when the Basic Authentication is used 
    New creation, query, modification, and deletion of the login user name of normal user by MFP administrator 
    when External Authentication is used 
    Query and modification of login user name of supervisor by supervisor 
    New creation of login user name of MFP administrator by MFP administrator 
    Query and modification of own login user name by MFP administrator 
    Query of login user name of MFP administrator by supervisor 
    New creation and modification of login password of normal user by MFP administrator when the Basic 
    Authentication is used 
    Modification of own login password by normal user when the Basic Authentication is used 
    Modification of login password of supervisor by supervisor 
    Modification of login password of MFP administrator by supervisor 
    New creation of login password of MFP administrator by MFP administrator 
    Modification of own login password by MFP administrator 
    Query of minimum character number by MFP administrator when the Basic Authentication is used 
    Query of Password Complexity by MFP administrator when the Basic Authentication is used 
    Query of Number of Attempts before Lockout by MFP administrator when the Basic Authentication is used 
    Query of Lockout Release Timer Setting by MFP administrator when the Basic Authentication is used 
    Query of lockout time by MFP administrator when the Basic Authentication is used 
    Query and modification of document user list by MFP administrator 
    Query and modification of document user list by the normal user who stored the document 
    Query and modification of available function list by MFP administrator 
    Query of own available function list by normal user when the Basic Authentication is used  
    						
    							    Page 67 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    Query and modification of date and time by MFP administrator 
    Query of date and time by supervisor 
    Query of date and time by normal user 
    Query and deletion of audit logs by MFP administrator 
    New creation of HDD encryption key by MFP administrator 
    New creation, modification, query and deletion of S/MIME user information by MFP administrator 
    Query of S/MIME user information by normal user 
    New creation, modification, query and deletion of destination information for folder transmission by MFP 
    administrator 
    Query of destination information for folder transmission by normal user 
    Query and modification of users for stored and received documents by MFP administrator 
    Query of user authentication method by MFP administrator 
     
    FMT_SMR.1 Security roles 
    Hierarchical to:  No other components. 
    Dependencies:  FIA_UID.1 Timing of identification 
    FMT_SMR.1.1  The TSF shall maintain the roles [assignment: normal user, supervisor, MFP administrator, 
    and RC Gate]. 
    FMT_SMR.1.2  The TSF shall be able to associate users with roles. 
    6.1.6  Class FPT: Protection of the TSF 
    FPT_STM.1  Reliable time stamps 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FPT_STM.1.1  The TSF shall be able to provide reliable time stamps. 
    FPT_TST.1 TSF testing 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FPT_TST.1.1  The TSF shall run a suite of self tests [selection: during initial start-up] to demonstrate the 
    correct operation of [selection: [assignment: the MFP Control Software, FCU Control 
    Software]]. 
    FPT_TST.1.2  The TSF shall provide authorised users with the capability to verify the integrity of [selection: 
    [assignment: the audit log data file]]. 
    FPT_TST.1.3  The TSF shall provide authorised users with the capability to verify the integrity of [selection: 
    [assignment: the stored TSF executable code]].  
    						
    							    Page 68 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    FPT_FDI_EXP.1  Restricted forwarding of data to external interfaces 
    Hierarchical to:  No other components. 
    Dependencies:  FMT_SMF.1 Specification of Management Functions 
    FMT_SMR.1 Security roles 
    FPT_FDI_EXP.1.1  The TSF shall provide the capability to restrict data received on [assignment: the 
    Operation Panel, LAN, telephone line] from being forwarded without further processing by 
    the TSF to [assignment: the LAN and telephone line]. 
    6.1.7  Class FTA: TOE access 
    FTA_SSL.3 TSF-initiated termination 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FTA_SSL.3.1  The TSF shall terminate an interactive session after a [assignment: elapsed time of auto 
    logout, completion of document data reception from the printer driver, completion of 
    document data reception from the fax driver, and termination of communication with RC 
    Gate]. 
    6.1.8  Class FTP: Trusted path/channels 
    FTP_ITC.1 Inter-TSF trusted channel 
    Hierarchical to:  No other components. 
    Dependencies: No dependencies. 
    FTP_ITC.1.1  The TSF shall provide a communication channel between itself and another trusted IT product 
    that is logically distinct from other communication channels and provides assured identification 
    of its end points and protection of the channel data from modification or disclosure. 
    FTP_ITC.1.2  The TSF shall permit [selection: the TSF, another trusted IT product] to initiate 
    communication via the trusted channel. 
    FTP_ITC.1.3  The TSF shall initiate communication via the trusted channel for [assignment: communication 
    via the LAN of document data, function data, protected data, and confidential data, and 
    communication with RC Gate via the LAN]. 
    6.2 Security Assurance Requirements 
    The evaluation assurance level of this TOE is EAL3+ALC_FLR.2. Table 31 lists the assurance components 
    of the TOE. ALC_FLR.2 was added to the set of components defined in evaluation assurance level 3 
    (EAL3).  
    						
    							    Page 69 of 93 
    Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved. 
    Table 31 : TOE Security Assurance Requirements (EAL3+ALC_FLR.2) 
    Assurance Classes Assurance Components 
    ADV_ARC.1  Security architecture description 
    ADV_FSP.3  Functional specification with complete summary 
    ADV: 
    Development 
    ADV_TDS.2 Architectural design 
    AGD_OPE.1  Operational user guidance AGD: 
    Guidance documents 
    AGD_PRE.1 Preparative procedures 
    ALC_CMC.3 Authorisation controls 
    ALC_CMS.3  Implementation representation CM coverage 
    ALC_DEL.1 Delivery procedures 
    ALC_DVS.1  Identification of security measures 
    ALC_LCD.1  Developer defined life-cycle model 
    ALC: 
    Life-cycle support 
    ALC_FLR.2  Flaw reporting procedures 
    ASE_CCL.1 Conformance claims 
    ASE_ECD.1 Extended components definition 
    ASE_INT.1 ST introduction 
    ASE_OBJ.2 Security objectives 
    ASE_REQ.2  Derived security requirements 
    ASE_SPD.1  Security problem definition 
    ASE: 
    Security Target evaluation 
    ASE_TSS.1 TOE summary specification 
    ATE_COV.2  Analysis of coverage 
    ATE_DPT.1  Testing: basic design 
    ATE_FUN.1 Functional testing 
    ATE: 
    Tests 
    ATE_IND.2  Independent testing - sample 
    AVA: 
    Vulnerability assessment AVA_VAN.2 Vulnerability analysis 
    6.3  Security Requirements Rationale 
    This section describes the rationale for security requirements. 
    If all security functional requirements are satisfied as below, the security objectives defined in 4 Security 
    Objectives are fulfilled. 
    6.3.1 Tracing 
    Table 32 shows the relationship between the TOE security functional requirements and TOE security 
    objectives. Table 32 shows that each TOE security functional requirement fulfils at least one TOE security 
    objective.  
    						
    All Ricoh manuals Comments (0)

    Related Manuals for Ricoh Mp C3001 Instruction Manual