Security Target - Xerox

3y ago
37 Views
2 Downloads
450.58 KB
90 Pages
Last View : Today
Last Download : 3m ago
Upload by : Aydin Oneil
Transcription

あXerox WorkCentre 5325/5330/5335Security TargetVersion 1.0.9This document is a translation of the evaluatedand certified security target written in Japanese.-i-

- Table of Contents 1.ST INTRODUCTION. 11.1.1.2.1.3.1.3.1.TOE Type and Major Security Features.11.3.2.Environment Assumptions .41.3.3.Required Non-TOE Hardware and Software.51.4.2.User Assumptions .71.4.2.Logical Scope and Boundary .71.4.3.Physical Scope and Boundary. 151.4.4.Guidance . 16CONFORMANCE CLAIMS .17PP Claims. 172.2.2.Package Claims . 172.2.3.Conformance Rationale . 17SECURITY PROBLEM DEFINITION .18Threats . 183.1.1.Assets Protected by TOE. 183.1.2.Threats. 203.2.3.3.Organizational Security Policies. 21Assumptions . 21SECURITY OBJECTIVES .224.1.4.2.4.3.5.CC Conformance Claims . 17PP Claims, Package Claims . 172.2.1.3.1.4.TOE Description.71.4.1.2.1.2.2.3.ST Reference .1TOE Reference .1TOE Overview .1Security Objectives for the TOE . 22Security Objectives for the Environment . 23Security Objectives Rationale . 23EXTENDED COMPONENTS DEFINITION .275.1.Extended Components. 27- ii -

6.SECURITY REQUIREMENTS .286.1.6.1.1.Class FAU:6.1.2.Class FCS: Cryptographic support. 386.1.3.Class FDP:6.1.4.Class FIA: Identification and authentication . 446.1.5.Class FMT: Security management . 496.1.6.Class FPT:6.1.7.Class FTP: Trusted path/channels . 556.2.6.3.7.User data protection. 39Protection of the TSF . 55Security Assurance Requirements . 57Security Requirement Rationale . 58Security Functional Requirements Rationale . 586.3.2.Dependencies of Security Functional Requirements . 636.3.3.Security Assurance Requirements Rationale . 65TOE SUMMARY SPECIFICATION .67Security Functions . 677.1.1.Hard Disk Data Overwrite (TSF IOW). 687.1.2.Hard Disk Data Encryption (TSF CIPHER) . 697.1.3.User Authentication (TSF USER AUTH) . 697.1.4.System Administrator’s Security Management (TSF FMT) . 747.1.5.Customer Engineer Operation Restriction (TSF CE LIMIT) . 767.1.6.Security Audit Log (TSF FAU) . 767.1.7.Internal Network Data Protection (TSF NET PROT). 797.1.8.Fax Flow Security (TSF FAX FLOW) . 81ACRONYMS AND TERMINOLOGY .828.1.8.2.9.Security audit. 336.3.1.7.1.8.Security Functional Requirements . 33Acronyms . 82Terminology . 83REFERENCES .86- iii -

- List of Figures and Tables Figure 1: General Operational Environment .5Figure 2: MFD Units and TOE Logical Scope .8Figure 3: Authentication Flow for Private Print and Mailbox . 11Figure 4: MFD Units and TOE Physical Scope . 15Figure 5: Assets under and not under Protection . 19Table 1: Function Types and Functions Provided by the TOE .2Table 2: User Role Assumptions .7Table 3: TOE Basic Functions.8Table 4: Categories of TOE Setting Data. 19Table 5: Threats Addressed by the TOE. 20Table 6: Organizational Security Policy. 21Table 7: Assumptions . 21Table 8: Security Objectives for the TOE . 22Table 9: Security Objectives for the Environment . 23Table 10: Assumptions / Threats / Organizational Security Policies and theCorresponding Security Objectives. 23Table 11: Security Objectives Rationale for Security Problem . 24Table 12: Auditable Events of TOE and Individually Defined Auditable Events . 33Table 13: Operations between Subjects and Objects Covered by MFD Access Control SFP. 39Table 14: Rules for Access Control . 40Table 15: Rules for Explicit Access Authorization . 41Table 16: Subjects, Information, and Operations that cause the information to flow . 42Table 17: List of Security Functions . 49Table 18: Security Attributes and Authorized Roles . 50Table 19: Initialization property . 51Table 20: Operation of TSF Data . 52Table 21: Security Management Functions Provided by TSF . 53Table 22: EAL3 Assurance Requirements . 57Table 23: Security Functional Requirements and the Corresponding Security Objectives. 58Table 24: Security Objectives to SFR Rationale . 59Table 25: Dependencies of Functional Security Requirements. 63Table 26: Security Functional Requirements and the Corresponding TOE SecurityFunctions . 67Table 27: Management of security attributes . 71Table 28: Access Control. 72Table 29: Details of Security Audit Log Data . 77- iv -

Xerox WorkCentre 5325/5330/5335 Security Target1.ST INTRODUCTIONThis chapter describes Security Target (ST) Reference, TOE Reference, TOE Overview, and TOEDescription.1.1.ST ReferenceThis section provides information needed to identify this ST.ST Title:Xerox WorkCentre 5325/5330/5335 Security TargetST Version:V 1.0.9Publication Date:November 21, 2011Author:Fuji Xerox Co., Ltd.1.2.TOE ReferenceThis section provides information needed to identify this TOE.The TOE is WorkCentre 5325, WorkCentre 5330, and WorkCentre 5335.The TOE is identified by the following TOE name and ROM .Xerox WorkCentre 5325/5330/5335・Controller ROMVer. 1.202.3・IOT ROMVer. 30.19.0・ADF ROMVer. 7.8.50Fuji Xerox Co., Ltd.TOE Overview1.3.1. TOE Type and Major Security Features1.3.1.1. TOE TypeThis TOE, categorized as an IT product, is the Xerox WorkCentre 5325/5330/5335 (hereinafterreferred to as “MFD”) which has the following functions: copy, print, scan, fax.The TOE is the product which controls the whole MFD and protects the following against threats: thedocument data stored on the internal HDD, the used document data, the security audit log data, thedocument data exists on the internal network between the TOE and the remote, and the TOE settingdata.- 1 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security Target1.3.1.2. Function TypesTable 1 shows the function types and functions provided by the TOE.Table 1: Function Types and Functions Provided by the TOEFunction typesFunctions provided by the TOE- Control Panel- CWIS- Copy- PrintBasic Function- Scan- Network Scan- Fax- Direct Fax (with local authentication only)- Internet Fax- Hard Disk Data Overwrite- Hard Disk Data Encryption- User AuthenticationSecurity Function- Administrator’s Security Management- Customer Engineer Operation Restriction- Security Audit Log- Internal Network Data Protection- Fax Flow Security・ Optional Fax board (out of the TOE boundary) is required to use Fax, Direct Fax, Internet Fax,and Fax Flow Security functions.・ To use print, scan, and Direct Fax functions, the following items shall be installed to the externalclient for general user and that for system administrator: printer driver, Network Scan Utility,and fax driver.・ There are two types of user authentication, local authentication and remote authentication, andthe TOE behaves with either one of the authentication types depending on the setting.In this ST, the difference of the TOE behavior is described if the TOE behaves differentlydepending on the type of authentication being used. Unless specified, the behavior of the TOE isthe same for both authentication types.There are two types of Remote Authentication: LDAP Authentication and KerberosAuthentication. To set SA (system administrator privilege) as user role assumption in Kerberosauthentication, LDAP server is also necessary.1.3.1.3. Usage and Major Security Features of TOEThe TOE is mainly used to perform the following functions:・ Copy function and Control Panel function are to read the original data from IIT and print them- 2 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security Targetout from IOT according to the general user’s instruction from the control panel. When more thanone copy of an original data is ordered, the data read from IIT are first stored into the MFDinternal HDD. Then, the stored data are read out from the internal HDD for the required numberof times so that the required number of copies can be made.・ Print function is to decompose and print out the print data transmitted by a general user client.・ CWIS (CentreWare Internet Service) is to retrieve the document data scanned by MFD fromMailbox.It also enables a system administrator to refer to and rewrite TOE setting data via Web browser.・ Scan function and Control Panel function are to read the original data from IIT and store theminto Mailbox within the MFD internal HDD, according to the general user’s instruction from thecontrol panel.The stored document data can be retrieved via standard Web browser by using CWIS orNetwork Scan Utility (with local authentication only).・ Network Scan function and Control Panel function are to read the original data from IIT andtransmit the document data to FTP server, SMB server, or Mail server, according to theinformation set in the MFD. This function is operated according to the general user’s instructionfrom the control panel.・ Fax function and Control Panel function are to send and receive fax data. According to thegeneral user’s instruction from the control panel to send a fax, the original data are read from IITand then sent to the destination via public telephone line. The document data are received fromthe sender’s machine via public telephone line and then printed out from the recipient’s IOT orstored in Mailbox.・ The Internet Fax function and Control Panel function are to send and receive fax data via theInternet, not public telephone line.・ The Direct Fax function is to send data from a user client to the destination via public telephoneline. The data are first sent to MFD as a print job and then to the destination without beingprinted out (with local authentication only).The TOE provides the following security features:・ Hard Disk Data OverwriteTo completely delete the used document data in the internal HDD, the data are overwritten withnew data after any job of copy, print, scan, etc. is completed.・ Hard Disk Data EncryptionThe document data and the security audit log data are encrypted before being stored into theinternal HDD when using any function of copy, print, scan, etc. or configuring various securityfunction settings.・ User AuthenticationAccess to the TOE functions is restricted to the authorized user and this function identifies andauthenticates users. A user needs to enter his/her ID and password from the fax driver, NetworkScan Utility, or CWIS of the general user client, or MFD control panel.・ System Administrator’s Security ManagementThis function allows only the system administrator identified and authorized from the control- 3 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security Targetpanel or system administrator client to refer to and change the TOE security function settings.・ Customer Engineer Operation RestrictionA system administrator can prohibit CE from referring to and changing the TOE securityfunction settings.・ Security Audit LogThe important events of TOE such as device failure, configuration change, and user operationare traced and recorded based on when and who used what function.・ Internal Network Data ProtectionThis function protects the communication data on the internal network such as document data,security audit log data, and TOE setting data. (The following general encryption communicationprotocols are supported: SSL/TLS, IPSec, SNMP v3, and S/MIME.)・ Fax Flow SecurityThis function prevents unauthorized access to the TOE or the internal network via Fax boardfrom public telephone line.1.3.2. Environment AssumptionsThis TOE is assumed to be used as an IT product at general office and to be connected to publictelephone line, user clients, and the internal network protected from threats on the external network byfirewall etc.Figure 1 shows the general environment for TOE operation.- 4 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security TargetExternalNetworkGeneral User ClientGeneralUserGeneral User-Printer Driver-Fax Driver-Network ScanUtility-Web BrowserGeneral User Client-Printer Driver-Fax DriverFirewallUSBUSB MediaUSBSystem ernalNetwork-Web BrowserUSBFax BoardMail ServerFTP ServerSMB ServerLDAP ServerKerberos ServerPublicTelephoneLineGeneral UserCESystemAdministratorFigure 1: General Operational Environment1.3.3. Required Non-TOE Hardware and SoftwareIn the operational environment shown in Figure 1, the TOE (MFD) and the following non-TOEhardware/software exist.(1) General user client:The hardware is a general-purpose PC. When a client is connected to the MFD via the internalnetwork and when the printer driver, Network Scan Utility, and fax driver are installed to theclient, the general user can request the MFD to print, fax, and retrieve the document data.The user can also request the MFD to retrieve the scanned document data via Web browser byusing scan function of the MFD. Additionally, the general user can change the settings which- 5 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security Targethe/she registered to the MFD: Mailbox name, password, access control, and automatic deletion ofdocument.When the client is connected to the MFD directly via USB and printer/fax driver is installed to theclient, the user can request the MFD to print/fax the document data.(2) System administrator client:The hardware is a general-purpose PC. A system administrator can refer to and change TOEsetting data via Web browser.(3) Mail server:The hardware/OS is a general-purpose PC or server. The MFD sends/receives document datato/from Mail server via mail protocol.(4) FTP server:The hardware/OS is a general-purpose PC or server. The MFD sends document data to FTP servervia FTP.(5) SMB server:The hardware/OS is a general-purpose PC or server. The MFD sends document data to SMBserver via SMB.(6) LDAP serverThe hardware/OS is a general-purpose PC or server. The MFD acquires identification andauthentication information from LDAP server via LDAP. In addition, it acquires SA informationof user role assumptions.(7) Kerberos serverThe hardware/OS is a general-purpose PC or server. The MFD acquires identification andauthentication information from Kerberos server via Kerberos.(8) Fax board:The Fax board is connected to external public telephone line and supports G3 protocols. The Faxboard is connected to the MFD via USB interface to enable sending and receiving of fax.(9) USB MediaThe USB Media is used for printing data stored in the USB Media and for storing scanned data.The OS of (1) general user client and (2) system administrator client are assumed to be Windows XP,Windows Vista, and Windows 7.- 6 –Copyright 2011 by Fuji Xerox Co., Ltd.

Xerox WorkCentre 5325/5330/5335 Security Target1.4.TOE DescriptionThis section describes user assumptions and logical/physical scope of this TOE.1.4.1. User AssumptionsTable 2 specifies the roles of TOE users assumed in this ST.Table 2: User Role AssumptionsUserRole DescriptionAdministrator of theAn administrator or responsible official of the organization whichorganizationowns and uses TOE.General userA user of TOE functions such as copy, print and fax.System administrator(Key operator SystemAdministrator Privilege [SA

ST Title: Xerox WorkCentre 5325/5330/5335 Security Target ST Version: V 1.0.9 Publication Date: November 21, 2011 Author: Fuji Xerox Co., Ltd. 1.2. TOE Reference This section provides information needed to identify this TOE. The TOE is WorkCentre 5325, WorkCentre 5330, and WorkCentre 5335.

Related Documents:

Xerox VersaLink B405 38.51.71 1.57.13 Xerox VersaLink C400 67.51.71 1.57.12 Xerox VersaLink C405 68.51.71 1.57.13 Xerox VersaLink B600/B610 32.51.71 1.57.12 Xerox VersaLink B605/B615 33.51.81 1.57.13 Xerox VersaLink C500/C600 61.51.71 1.57.12 Xerox VersaLink C505/C605 62.51.81 1.57.13 WorkCentre 6515

5890 / 5890i, Xerox WorkCentre 5945 / 5945i / 5955 / 5955i, Xerox WorkCentre 6655 / 6655i, Xerox WorkCentre 7220 / 7220i / 7225 / 7225i, Xerox WorkCentre 7830 / 7830i / 7835 / 7835i / 7845 / 7845i / 7855 / 7855i / EC7836 / EC7856, Xerox WorkCentre 7970 / 7970i 2016 Xerox ConnectKey Technology Purpose and Audience

Xerox Phaser 6600 and Xerox WorkCentre 6605 Detailed Specifications 3 Xerox Mobile Express Driver Makes it easy for mobile users to find, use and manage Xerox and non-Xerox devices in every new location. Plug into a new network, and Xerox Mobile Express Driver automatically discovers available

Xerox Phaser 1235 . IBM InfoPrint 1145L MFP : Xerox Phaser 2135DT . IBM InfoPrint Color 8 : Xerox Phaser 3400 . IBM LaserPrinter 4039 : Xerox Phaser 3450 . IBM Network Printer 12 : Xerox Phaser 3500 . IBN Network Printer 17 : Xerox Phaser 4500DX . Konica KL-3015 : Xerox Phaser 5400 . Kyocera FS-C50 16N :

2019 Xerox Corporation. Todos los derechos reservados. Xerox , Xerox con la marca figurativa , AltaLink , FreeFlow , SMARTsend , Scan to PC Desktop , MeterAssistant , SuppliesAssistant , Xerox Secure Access Uni- fied ID System , Xerox Extensible Interface Platform , Global Print Driver y Mobile Express Driver son marcas comerciales de Xero

Xerox Variable Data Intelligent PostScript Printware (VIPP) is a proprietary page description language developed by Xerox. To print documents in Xerox VIPP format, use a third-party application that is compatible with Xerox VIPP format. Send the Xerox VIPP job or download the Xerox

* Apple AirPrint and Xerox Print Service Plug-in for Android are standard/free of charge protocols for Apple iOS, Android and Xerox ConnectKey -enabled devices. Xerox Mobile Print is an add-on software product that allows users to print to Xerox or non-Xerox print devices. Capture It A scan gets initiated from your

A: Xerox printers and multifunction devices can be remotely connected to Xerox using two main technologies: Device Direct and Xerox Device Agent/Manager (XDA, XDM). Device Direct is a standard feature on most of Xerox newest products — no additional software is required. All you need is a connection for your Xerox product to the external