Specifications
Security Target Version 1.0 9/29/2014
3
8.1.1 Security Objectives Rationale for the TOE and Environment .............................................................. 80
8.2 SECURITY REQUIREMENTS RATIONALE ........................................................................................................ 84
8.2.1 Security Functional Requirements Rationale....................................................................................... 84
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 91
8.4 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 91
8.5 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 92
LIST OF TABLES
Table 1 TOE Security Functional Components ...................................................................................................... 23
Table 2 Audit Events ................................................................................................................................................. 27
Table 3 EAL 1 Assurance Components ................................................................................................................... 55
Table 4 Cryptographic Functions ............................................................................................................................ 64
Table 5 NIST SP800-56A Conformance .................................................................................................................. 64
Table 6 NIST SP800-56B Conformance .................................................................................................................. 65
Table 7 Environment to Objective Correspondence .............................................................................................. 80
Table 8 Objective to Requirement Correspondence ............................................................................................... 85
Table 9 Requirement Dependencies ......................................................................................................................... 92
Table 10 Security Functions vs. Requirements Mapping ....................................................................................... 93