Technical data
Brocade Communications Systems, Inc. Page 42 of 48
This Threat is countered by ensuring that:
• O.AUDIT_GENERATION: The TOE will provide the capability to create records of security relevant
events associated with users.
8.1.1.2 T.ADMIN_ERROR
An authorized administrator may incorrectly install or configure the TOE resulting in ineffective security
mechanisms.
This Threat is countered by ensuring that:
• O.ADMIN_ROLE: The TOE will provide authorized administrator roles to isolate administrative actions
thus limiting the scope of errors that an administrator may cause.
• O.MANAGE: The TOE will allow administrators to effectively manage the TOE and its security functions,
must ensure that only authorized administrators are able to access such functionality, and that
communication between the TOE and the administrator is protected.
8.1.1.3 T.MASQUERADE
An unauthorized user, process, or external IT entity may masquerade as an authorized entity to gain access
to data or TOE resources.
This Threat is countered by ensuring that:
• O.USER_AUTHENTICATION: The TOE will verify the claimed identity of users.
• O.USER_IDENTIFICATION: The TOE will uniquely identify users.
8.1.1.4 T.TSF_COMPROMISE
A malicious user may cause configuration data to be inappropriately accessed (viewed, modified or
deleted).
This Threat is countered by ensuring that:
• O.TOE_PROTECTION: The TOE will protect the TOE and its assets from external interference or
tampering.
8.1.1.5 T.UNAUTH_ACCESS
A user may gain unauthorized access (view, modify, delete) to a storage device.
This Threat is countered by ensuring that:
• O.ACCESS: The TOE will ensure that users gain only authorized access to the TOE and to the resources
that the TOE controls.
8.1.1.6 A.LOCATE
The TOE will be located within controlled access facilities, which will prevent unauthorized physical
access.
This Assumption is satisfied by ensuring that:
• OE.PHYCAL: The TOE will be located within controlled access facilities, which will prevent unauthorized
physical access.
8.1.1.7 A.NETWORK
The Environment will protect network communication to and from the TOE from unauthorized disclosure
or modification.










