Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 51 of 85
T.POOR_IMPLEMENTATION
Unintentional errors in
implementation of the TOE
design may occur, leading to
flaws that may be exploited by a
casually mischievous user or
program.
O.CONFIGURATION_
IDENTIFICATION
The configuration of the TOE
is fully identified in a manner
that will allow implementation
errors to be identified,
corrected with the TOE being
redistributed promptly.
O.PARTIAL_FUNCTIONAL_
TESTING
The TOE will undergo some
security functional testing that
demonstrates the TSF
satisfies some of its security
functional requirements.
O.VULNERABILITY_
ANALYSIS
The TOE will undergo
vulnerability analysis to
demonstrate the design and
implementation of the TOE
does not contain any obvious
flaws.
O.CONFIGURATION_IDENTIF
ICATION plays a role in
countering this threat by
requiring the developer to
provide control of the changes
made to the TOE’s design.
This ensures that changes to
the TOE are performed in
structure manner and tracked.
O.PARTIAL_FUNCTIONAL_T
ESTING ensures that the
developers provide evidence
and demonstration that all
security functions perform as
specified through independent
sample testing.
O.VULNERABILITY_ANALYSI
S_TEST ensures that the TOE
has been analyzed and tested
to demonstrate that it is
resistant to obvious
vulnerabilities.
T.POOR_TEST
The developer or tester performs
insufficient tests to demonstrate
that all TOE security functions
operate correctly (including in a
fielded TOE) may occur, resulting
in incorrect TOE behavior being
undiscovered leading to flaws that
may be exploited by a
mischievous user or program.
O.CORRECT_
TSF_OPERATION
The TOE will provide the
capability to test the TSF to
ensure the correct operation
of the TSF at a customer’s
site.
O.PARTIAL_FUNCTIONAL_
TESTING
The TOE will undergo some
security functional testing that
demonstrates the TSF
satisfies some of its security
functional requirements.
O.VULNERABILITY_
ANALYSIS
The TOE will undergo some
vulnerability analysis
demonstrate the design and
implementation of the TOE
does not contain any obvious
flaws.
O.CORRECT_
TSF_OPERATION provides
assurance that the TSF
continues to operate as
expected in the field.
O.PARTIAL_FUNCTIONAL_T
ESTING increases the
likelihood that any errors that
do exist in the implementation
will be discovered through
testing.
O.VULNERABILITY_ANALYSI
S_TEST addresses this
concern by requiring a
vulnerability analysis be
performed in conjunction with
testing that goes beyond
functional testing. This
objective provides a measure
of confidence that the TOE
does not contain security flaws
that may not be identified
through functional testing.