Specifications
CRP-C0239-01
22
a. Test configuration
The test configuration which the evaluators implemented is shown in Figure 2-1.
The evaluator testing is implemented in the environment to be considered as
covering the TOE configuration identified in ST.
b. Testing Approach
The testing was implemented in the same way as the developer testing.
c. Scope of Testing Performed
The testing which the evaluators independently created was created by 40 items
from the following perspectives:
- For the purpose of increasing the testing strictness, conduct the testing which
the developers implemented to change the parameters and the conditions.
- Considering SSL, IPSec, S/MIME which is the function to protect the
communications as the characteristic security functions, complement the
testing to ensure that there are no conditions to disable these functions.
Sampling of the developer testing was selected by 192 items after covering the
security functions and interfaces for testing and considering the following
perspectives:
- Regarding as the important behaviors to ensure that the following security
functions correctly operate, the followings must be selected clearly:
> Combination of each condition in the access control function to stored
documents
> Combination of the authorized operator and the authorized operation in the
security management function
> Combination of each condition in the action for authentication failure
> Checking of operating the functions to verify software validity
> Function of checking password strength
> Encryption function for stored documents
> Self-Test function for encrypting the TOE initiation
> Protection function for network communication data
- It is intended to include the completeness of audit log event and the testing to
check the contents of the obtained audit log records.
- It is intended to include all types of the interface (Classification of the
Operation Panel, Web interface, etc.).
The evaluators searched for the potential vulnerability from the provided
evidence materials and the public-known information, and they identified the
following vulnerabilities needed for the intrusion testing.
1. The existing unintentional network port interface makes it possible to access
the TOE.
2. Direct access to the designated URL from Web interface makes it possible to
bypass the Identification and Authentication function and the access control
function.
3. There is the possibility of the existing measures to bypass the Identification
and Authentication function in the Operation Panel and Web interface and to
operate the TOE.
4. The vulnerability which the diagnostic tool cannot detect for Web application
used by the developer testing could exist in Web interface.
The evaluators implemented the following intrusion tests to determine if the
potential vulnerability can be misused.