Installation guide

Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 5 of 85
Table of Tables
Table Page
Table 3-1 TOE Assumptions ...............................................................................................................................................12
Table 3-2 Threats................................................................................................................................................................13
Table 3-3 Organizational Security Policies........................................................................................................................14
Table 4-1 Security Objectives for TOE...............................................................................................................................15
Table 4-2 Security Objectives for the IT and Non IT Environment ....................................................................................16
Table 5-1 Functional Components .....................................................................................................................................18
Table 5-2 TOE Auditable Events ........................................................................................................................................21
Table 5-3 Functional Components .....................................................................................................................................31
Table 5-4 TOE IT Environment Auditable Events ..............................................................................................................32
Table 5-5 Assurance Components ......................................................................................................................................38
Table 6-1 Assurance Measures...........................................................................................................................................43
Table 8-1 Security Objectives to Threats and Policies Mappings ......................................................................................47
Table 8-2 Rationale for TOE Security Requirements .........................................................................................................61
Table 8-3 Rationale for Requirements on the TOE IT Environment ..................................................................................70
Table 8-4 Rationale for Explicit Requirements ..................................................................................................................75
Table 8-5 Mapping of Security Functions to TSFRs...........................................................................................................78
Table 8-6 Suitability of Security Functions to meet TSFRs ................................................................................................80
Table 9-1 Abbreviations and Acronyms..............................................................................................................................84
Table 9-2 References ..........................................................................................................................................................84
Document History
Revision Date Comment
1.0 3/5/2007 Initial Revision
1.1 4/11/2007 Minor improvements
1.2 9/10/2007 Addressed observation reports
1.3 2/5/2008 Addressed validator comments
1.4 04/14/2009 Minor corrections
1.5 05/20/09 Minor improvement