Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 18 of 85
5 IT Security Requirements
This section provides functional and assurance requirements that must be satisfied by the TOE and
the IT environment.
5.1 Strength of Function Claims
The statement of the TOE security requirements must include a minimum strength level for the TOE
security functions realized by a probabilistic or permutational mechanism, except for cryptographic
functions. For this ST, the overall level will be SoF-basic.
In the event that a probabilistic mechanism, such as a password mechanism for user and/or
administrator authentication is used, then the expectation is that for each attempt to use the
authentication mechanism, the probability that a random attempt will succeed is less than one in a
million. FIA_UAU.1 includes the following probabilistic/permutational mechanisms for which specific
SOF metrics are appropriate: password-based authentication.
The strength of function claims in this ST match those of WLANAS PP.
5.2 TOE Security Functional Requirements
The TOE security functional requirements are listed in Table 5-1 Functional Components. The
requirement names ending with _EXP correspond to explicitly stated requirements. All other
requirements are drawn from CC Part 2.
Table 5-1 Functional Components
Component Component Name Dependencies
FAU_GEN.1(1) Audit data generation FPT_STM.1
FAU_GEN.2 User identity association FAU_GEN.1
FIA_UID.1
FAU_SEL.1 Selective audit FAU_GEN.1;
FMT_MTD.1(1)
FCS_BCM_EXP.1 Explicit: baseline cryptographic module None
FCS_CKM.1 Cryptographic key generation [FCS_CKM.2 or
FCS_COP.1]
FCS_CKM.4
FMT_MSA.2
FCS_CKM_EXP.2 Cryptographic key establishment [FTP_ITC.1 or
FCS_CKM.1]
FMT_MSA.2