Technical data

Brocade Communications Systems, Inc. Page 48 of 48
Security audit
User data protection
Identification a
nd authentication
Security management
Protection of the TSF
TOE Access
Trusted path
FAU_GEN.1
x
FCS_COP.1(1)
x
FCS_COP.1(2)
x
FCS_CKM.1(1)
x
FCS_CKM.1(2)
x
FCS_CKM.4
x
FDP_ACC.1
x
FDP_ACF.1
x
FDP_IFC.1
x
FDP_IFF.1
x
FIA_AFL.1
x
FIA_ATD.1
x
FIA_SOS.1
x
FIA_UAU.2
x
FIA_UAU.5
x
FIA_UID.2
x
FMT_MSA.1(1)
x
FMT_MSA.1(2)
x
FMT_MSA.3(1)
x
FMT_MSA.3(1)
x
FMT_MTD.1
x
FMT_SMF.1
x
FMT_SMR.1
x
FPT_STM.1
x
FTA_MCS.1
x
FTA_TSE.1
x
FTP_TRP.1
x
Table 7 Security Functions vs. Requirements Mapping
8.7 PP Claims Rationale
See Section 7, Protection Profile Claims.