System information

Cisco Cat3K ST 6 June 2012
4
List of Tables
TABLE 1 ST AND TOE IDENTIFICATION .............................................................................. 6
TABLE 2 ACRONYMS ............................................................................................................ 6
TABLE 3 IT ENVIRONMENT COMPONENTS ........................................................................... 8
TABLE 4 TOE ASSUMPTIONS ............................................................................................. 21
TABLE 5 THREATS ............................................................................................................. 21
TABLE 6 ORGANIZATIONAL SECURITY POLICIES ............................................................... 22
TABLE 7 SECURITY OBJECTIVES FOR THE TOE .................................................................. 23
TABLE 8 SECURITY OBJECTIVES FOR THE ENVIRONMENT .................................................. 24
TABLE 9 SECURITY FUNCTIONAL REQUIREMENTS ............................................................. 25
TABLE 10: AUDITABLE EVENTS ........................................................................................ 27
TABLE 11: SFR DEPENDENCY RATIONALE ........................................................................ 41
TABLE 12: ASSURANCE MEASURES ................................................................................... 43
TABLE 13: ASSURANCE MEASURES ................................................................................... 44
TABLE 14: HOW TOE SFRS ARE MET ............................................................................... 46
TABLE 15: THREAT/TOE OBJECTIVES/ORGANIZATION SECURITY POLICY MAPPINGS ...... 69
TABLE 16: THREAT/ORGANIZING SECURITY POLICY/TOE AND TOE ENVIRONMENT
OBJECTIVES RATIONALE ............................................................................................ 70
TABLE 17: ASSUMPTIONS/THREAT/TOE ENVIRONMENT OBJECTIVES MAPPINGS ............. 72
TABLE 18: ASSUMPTIONS/THREAT/TOE ENVIRONMENT OBJECTIVES RATIONALE ........... 72
TABLE 19: TOE SECURITY OBJECTIVE TO SECURITY FUNCTIONAL REQUIREMENTS
MAPPINGS .................................................................................................................. 74
TABLE 20: TOE SECURITY OBJECTIVE TO SECURITY FUNCTIONAL REQUIREMENTS
RATIONALE ................................................................................................................ 75
TABLE 21: REFERENCES ..................................................................................................... 78