Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 16 of 85
O.RESIDUAL_ INFORMATION The TOE will ensure that any information contained in a
protected resource within its Scope of Control is not released
when the resource is reallocated.
O.SELF_PROTECTION The TSF will maintain a domain for its own execution that
protects itself and its resources from external interference,
tampering, or unauthorized disclosure through its own
interfaces.
O.TIME_STAMPS The TOE shall obtain reliable time stamps.
O.TOE_ACCESS The TOE will provide mechanisms that control a user’s
logical access to the TOE.
O.ADMIN_GUIDANCE The TOE will provide administrators with the necessary
information for secure management.
O.CONFIGURATION_
IDENTIFICATION
The configuration of the TOE is fully identified in a manner
that will allow implementation errors to be identified,
corrected with the TOE being redistributed promptly.
O.DOCUMENTED_ DESIGN The design of the TOE is adequately and accurately
documented.
O.PARTIAL_
FUNCTIONAL_TESTING
The TOE will undergo some security functional testing that
demonstrates the TSF satisfies some of its security
functional requirements.
O.VULNERABILITY_ ANALYSIS The TOE will undergo some vulnerability analysis
demonstrate the design and implementation of the TOE does
not contain any obvious flaws.
4.2 Security Objectives for the Environment
The assumptions identified in Section 3.1 are incorporated as security objectives for the
environment and listed below. They levy additional requirements on the environment, which are
largely satisfied through procedural or administrative measures. Table 4-2 Security Objectives for
the IT and Non IT Environment identifies the security objectives for the TOE IT and Non
environment. The objectives are identical to those of WLANAS PP.
Table 4-2 Security Objectives for the IT and Non IT Environment
Name Security Objective