System information
Cisco Cat3K ST 6 June 2012
73
Assumption Rationale
objective ensures that the authorized administrators are trained
to periodically review audit logs to identify sources of concern.
A.LOCATE The processing resources of the TOE will be located within
controlled access facilities, which will prevent unauthorized
physical access. The OE.LOCATE objective ensures the
processing resources of the TOE will be located within
controlled access facilities, which will prevent unauthorized
physical access.
A.CONFIDENTIALITY The hard copy documents and soft-copy representations that
describe the configuration of the TOE, I&A information and
Audit storage will be kept confidential and access will be
limited to authorized administrators.
Audit data transmitted by the TOE and routing table updates
exchanged with neighbor routers, and associated neighbor
router authentication data will be protected from unauthorized
disclosure through isolation of associated network traffic.
The OE.CONFIDENTIALITY objective ensures the
configuration of the TOE, I&A information and Audit storage
will be kept confidential and access will be limited to
authorized administrators, and audit data transmitted by the
TOE and routing table updates exchanged with neighbor
routers, and associated neighbor router authentication data will
be protected from unauthorized disclosure through isolation of
associated network traffic.
A.INTEROPERABILITY The TOE will be able to function with the software and
hardware of other vendors on the network. The
OE.INTEROPERABILITY objective ensures that the TOE will
be able to function with the software and hardware of other
vendors on the network.
A.LOWEXP The threat of malicious attacks aimed at exploiting the TOE is
considered low. The OE.LOWEXP objective ensures that the
threat of a malicious attack in the intended environment is
considered low.
7.3 Rationale for TOE Security Functional Requirements
The security requirements are derived according to the general model presented in Part 1 of
the Common Criteria. Specifically, the tables below illustrate the mapping between the
security requirements and the security objectives and the relationship between the threats,
policies and IT security objectives. The functional and assurance requirements presented in
this Security Target are mutually supportive and their combination meets the stated security
objectives.