Specifications

Security Target Version 1.0 9/29/2014
93
Security audit
Cryptographic support
User data protection
Identification and authentication
Security
management
Protection of the TSF
Resource utilisation
TOE access
Trusted path/channels
FCS_CKM.2(1)
X
FCS_CKM.2(2)
X
FCS_CKM_EXT.4
X
FCS_COP.1(1)
X
FCS_COP.1(2)
X
FCS_COP.1(3)
X
FCS_COP.1(4)
X
FCS_COP.1(5)
X
FCS_HTTPS_EXT.1
X
FCS_IPSEC_EXT.1
X
FCS_RBG_EXT.1
X
FCS_SSH_EXT.1
X
FCS_TLS_EXT.1
X
FDP_RIP.2
X
FIA_8021X_EXT.1
X
FIA_AFL.1
X
FIA_PMG_EXT.1
X
FIA_PSK_EXT.1
X
FIA_UAU.6
X
FIA_UAU.7
X
FIA_UAU_EXT.5
X
FIA_UIA_EXT.1
X
FIA_X509_EXT.1
X
FMT_MOF.1
X
FMT_MTD.1(1)
X
FMT_MTD.1(2)
X
FMT_MTD.1(3)
X
FMT_SMF.1
X
FMT_SMR.1
X
FPT_FLS.1
X
FPT_ITT.1
X
FPT_RPL.1
X
FPT_STM.1
X
FPT_TST_EXT.1
X
FPT_TUD_EXT.1
X
FRU_RSA.1
X
FTA_SSL.3
X
FTA_SSL.4
X
FTA_SSL_EXT.1
X
FTA_TAB.1
X
FTA_TSE.1
X
FTP_ITC.1
X
FTP_TRP.1
X
Table 10 Security Functions vs. Requirements Mapping