Technical data

Brocade Communications Systems, Inc. Page 15 of 48
3. Security Environment
This section summarizes the threats addressed by the TOE and assumptions about the intended environment of the
TOE. Note that while the identified threats are mitigated by the security functions implemented in the TOE, the
overall assurance level (EAL-4) also serves as an indicator of whether the TOE would be suitable for a given
environment.
3.1 Threats
T.ACCOUNTABILITY: A user may not be held accountable for their actions.
T.ADMIN_ERROR: An authorized administrator may incorrectly install or configure the TOE
resulting in ineffective security mechanisms.
T.MASQUERADE: An unauthorized user, process, or external IT entity may masquerade as an
authorized entity to gain access to data or TOE resources.
T.TSF_COMPROMISE: A malicious user may cause configuration data to be inappropriately accessed
(viewed, modified or deleted).
T.UNAUTH_ACCESS: A user may gain unauthorized access (view, modify, delete) to a storage device.
3.2 Assumptions
A.LOCATE The TOE will be located within controlled access facilities, which will prevent
unauthorized physical access.
A.NETWORK The environment will protect network communication to and from the TOE
from unauthorized disclosure or modification.
A.NO_EVIL The TOE will be installed, configured, managed and maintained in accordance
with its guidance documentation.