System information
Cisco Cat3K ST 6 June 2012
25
5 SECURITY REQUIREMENTS
This section identifies the Security Functional Requirements for the TOE. The Security
Functional Requirements included in this section are derived from Part 2 of the Common Criteria
for Information Technology Security Evaluation, Version 3.1, Revision 3, dated: July 2009 and all
international interpretations.
5.1 Conventions
The CC defines operations on Security Functional Requirements: assignments, selections,
assignments within selections and refinements. This document uses the following font
conventions to identify the operations defined by the CC:
• Assignment: allows the specification of an identified parameter. Assignments are
indicated using bold and are surrounded by brackets (e.g., [assignment]). Note
that an assignment within a selection would be identified in italics and with
embedded bold brackets (e.g., [[selected-assignment]]).
• Selection: allows the specification of one or more elements from a list. Selections
are indicated using bold italics and are surrounded by brackets (e.g., [selection]).
• Iteration: allows a component to be used more than once with varying operations.
In the ST, iteration is indicated by a number placed at the end of the component.
For example FDP_IFF.1(1) and FDP_IFF.1(2) indicate that the ST includes two
iterations of the FDP_IFF.1 requirement, (1) and (2).
• Refinement: allows the addition of details. Refinements are indicated using bold,
for additions, and strike-through, for deletions (e.g., “… all objects …” or “…
some
big things …”).
• Extended Requirements (i.e., those not found in Part 2 of the CC) are identified
with “_EXT” in of the functional class/name.
• Other sections of the ST use bolding to highlight text of special interest, such as
captions.
5.2 TOE Security Functional Requirements
This section identifies the Security Functional Requirements for the TOE. The TOE
Security Functional Requirements that appear in the following table are described in
more detail in the following subsections.
Table 9 Security Functional Requirements
Functional Component
Requirement Class Requirement Component
FAU: Security audit
FAU_GEN.1: Audit data generation
FAU_GEN.2: User identity association