Technical data
Brocade Communications Systems, Inc. Page 4 of 48
8.1
SECURITY OBJECTIVES RATIONALE .............................................................................................................. 41
8.1.1 Security Objectives Rationale for the TOE and Environment .............................................................. 41
8.2 SECURITY REQUIREMENTS RATIONALE ........................................................................................................ 43
8.2.1 Security Functional Requirements Rationale....................................................................................... 43
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 46
8.4 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 46
8.5 EXTENDED REQUIREMENTS RATIONALE ...................................................................................................... 47
8.6 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 47
8.7 PP CLAIMS RATIONALE ................................................................................................................................ 48
LIST OF TABLES
Table 1 TOE Security Functional Components ...................................................................................................... 17
Table 2 EAL-4 Assurance Components ................................................................................................................... 23
Table 3 Trusted Path Algorithms, Key Sizes, Standards and Certificate Numbers ........................................... 39
Table 4 Environment to Objective Correspondence .............................................................................................. 41
Table 5 Objective to Requirement Correspondence ............................................................................................... 44
Table 6 CC Dependencies vs. ST Dependencies ...................................................................................................... 47
Table 7 Security Functions vs. Requirements Mapping ......................................................................................... 48
LIST OF FIGURES
Figure 1: Host bus adapters can only access storage devices that are members of the same zone. ...................... 8
Figure 2: Administrators can access the TOE using a serial terminal or across a network. Audit records are
sent to a syslog server. ....................................................................................................................................... 10
Figure 3: TOE and environment components. ........................................................................................................ 11
Figure 4: TOE and environment audit record components. .................................................................................. 30
Figure 5: User Data Encryption .............................................................................................................................. 33
Figure 6: User Data Flow for User Data Encryption SFP ..................................................................................... 34
Figure 7: CryptoTarget Container .......................................................................................................................... 35










