User guide

Aruba Networks Security Target
Page 18 of 67
5 Security Requirements
5.1 Conventions
31 This document uses the following font conventions to identify the operations defined
by the CC:
a) Assignment. Indicated with italicized text.
b) Refinement. Indicated with bold text and strikethroughs.
c) Selection. Indicated with underlined text.
d) Assignment within a Selection: Indicated with italicized and underlined text.
e) Iteration. Indicated by appending the iteration number in parenthesis, e.g.,
(1), (2), (3).
32 Operations specified by the NDPP (that are not specified by CC Part 2) are also
identified using the above convention.
33 Explicitly stated SFRs are identified by having a label ‘EXT’ after the requirement
name for TOE SFRs.
34 Application notes from the NDPP have not been reproduced except where their
inclusion aids the ST reader in understanding the SFRs.
5.2 Extended Components Definition
35 Table 9 identifies the extended components which are incorporated into this ST. All
components are reproduced directly from the NDPP and therefore no further
definition is provided in this document.
Table 9: Extended Components
Component
Title
Source
FAU_STG_EXT.1
External Audit Trail Storage
NDPP
FCS_CKM_EXT.4
Cryptographic Key Zeroization
NDPP
FCS_RBG_EXT.1
Cryptographic Operation (Random Bit Generation)
NDPP
FIA_PMG_EXT.1
Password Management
NDPP
FIA_UIA_EXT.1
User Identification and Authentication
NDPP
FIA_UAU_EXT.2
Password-based Authentication Mechanism
NDPP
FPT_SKP_EXT.1
Protection of TSF Data (for reading of all symmetric keys)
NDPP
FPT_APW_EXT.1
Protection of Administrator Passwords
NDPP
FPT_TUD_EXT.1
Trusted Update
NDPP
FPT_TST_EXT.1
TSF Testing
NDPP