Specifications
Samsung MFP Security Kit Type_B V1.5 Security Target
3
Copyright
2010 Samsung Electronics Co., Ltd., All rights reserved
Contents
Document History .......................................................................... 2
Contents ........................................................................................ 3
List of Figures ................................................................................ 5
List of Tables ................................................................................. 6
1 Security Target Introduction ..................................................... 7
1.1 SECURITY TARGET REFERENCES ....................................................... 7
1.2 TOE REFERENCES ....................................................................... 7
1.3 TOE OVERVIEW .......................................................................... 8
1.4 TOE DESCRIPTION .................................................................... 18
1.4.1 Physical Scope ................................................................. 18
1.4.2 Logical Scope ................................................................... 20
1.5 CONVENTIONS .......................................................................... 25
1.6 TERMS AND DEFINITIONS ............................................................. 26
1.7 ACRONYMS.............................................................................. 34
1.8 ORGANIZATION ........................................................................ 35
2 Conformance Claims ............................................................... 36
2.1 COMMON CRITERIA CONFORMANCE ................................................. 36
2.2 CONFORMANCE OF PROTECTION PROFILE ........................................... 36
2.3 CONFORMANCE OF PACKAGE ......................................................... 36
2.4 CONFORMANCE CLAIMS RATIONALE ................................................. 36
3 Definition of Security Problems............................................... 37
3.1 THREATS ................................................................................ 37
3.2 ORGANIZATIONAL SECURITY POLICY ................................................ 38
3.3 ASSUMPTION ........................................................................... 38
4 Security Objectives ................................................................. 40
4.1 SECURITY OBJECTIVES FOR THE TOE ............................................... 40
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT .................................... 41
4.3 SECURITY OBJECTIVES RATIONALE .................................................. 42
4.3.1 Rationale for the TOE Security Objectives ............................ 43
4.3.2 Rationale for Security Requirements for the Environment ...... 45
5 Security Requirements ............................................................ 46
5.1 SECURITY FUNCTIONAL REQUIREMENT (SFR) ..................................... 46
5.1.1 Class FAU: Security Audit .................................................. 47
5.1.2 Class FCS: Cryptographic support ....................................... 49
5.1.3 Class FDP: User data protection .......................................... 50
5.1.4 Class FIA: Identification and authentication ......................... 53
5.1.5 Class FMT: Security Management ....................................... 55
5.1.6 Class FPT: Protection of the TSF ......................................... 57
5.2 SECURITY ASSURANCE REQUIREMENTS (SAR) .................................... 58
5.2.1 Class ASE: Security Target evaluation ................................. 59
5.2.2 Class ADV: Development ................................................... 64










