Specifications

Security Target Version 1.0 9/29/2014
84
intruders into the TOE environment, but it does not include physical destructive actions that might be taken
by an individual that is authorized to access the TOE environment.
8.1.1.16 A.TRUSTED_ADMIN
TOE Administrators are trusted to follow and apply all administrator guidance in a trusted manner.
This Assumption is satisfied by ensuring that:
OE.TRUSTED_ADMIN: Ensures the administrators are properly trained and the administrative guidance
instructs the administrator how to properly configure the environment and TOE to avoid mistakes.
8.2 Security Requirements Rationale
This section provides evidence supporting the internal consistency and completeness of the components
(requirements) in the Security Target. Note that Table 8 indicates the requirements that effectively satisfy the
individual objectives. .
8.2.1 Security Functional Requirements Rationale
All Security Functional Requirements (SFR) identified in this Security Target are fully addressed in this section and
each SFR is mapped to the objective for which it is intended to satisfy.
O.AUTH_COMM
O.CRYPTOGRAPHIC_FUNCTIONS
O.DISPLAY_BANNER
O.FAIL_SECURE
O.PROTECTED_COMMUNICATIONS
O.PROTOCOLS
O.REPLAY_DETECT
ION
O.RESIDUAL_INFORMATION_CLEARING
O.RESOURCE_AVAILABILITY
O.ROBUST_TOE_ACCESS
O.SESSION_LOCK
O.SYSTEM_MONITORING
O.TIME_STAMPS
O.TOE_ADMINISTRATION
O.TSF_SELF_TEST
O.VERIFIABLE_UPDATES
O.WIRELESS_CLIENT_ACCESS
FAU_GEN.1
X
FAU_GEN.2
X
FAU_SAR.1
X
FAU_SAR.2
X
FAU_SEL.1
X
FAU_STG.1
X
FAU_STG_EXT.1
X
X
FAU_STG_EXT.3
X
FCS_CKM.1(1)
X
FCS_CKM.1(2)
X
FCS_CKM.2(1)
X
FCS_CKM.2(2)
X
FCS_CKM_EXT.4
X
X
FCS_COP.1(1)
X
FCS_COP.1(2)
X
X
FCS_COP.1(3)
X
X
FCS_COP.1(4)
X
FCS_COP.1(5)
X
FCS_HTTPS_EXT.1
X
X
X
FCS_IPSEC_EXT.1
X
X
X
FCS_RBG_EXT.1
X
FCS_SSH_EXT.1
X
X
X
FCS_TLS_EXT.1
X
X
X
FDP_RIP.2
X