Specifications

Samsung MFP Security Kit Type_B V1.5 Security Target
63
Copyright
2010 Samsung Electronics Co., Ltd., All rights reserved
ASE_REQ.2.2D The developer shall provide security requirements’
rationale.
Content and presentation elements:
ASE_REQ.2.1C The statement of security requirements shall
describe the SFRs and the SARs.
ASE_REQ.2.2C All subjects, objects, operations, security
attributes, external entities and other terms that
are used in the SFRs and the SARs shall be
defined.
ASE_REQ.2.3C The statement of security requirements shall
identify all operations on the security
requirements.
ASE_REQ.2.4C All operations shall be performed correctly.
ASE_REQ.2.5C Each dependency of the security requirements
shall either be satisfied, or the security
requirements rationale shall justify the
dependency not being satisfied.
ASE_REQ.2.6C The security requirements’ rationale shall trace
each SFR back to the security objectives for the
TOE.
ASE_REQ.2.7C The security requirements’ rationale shall
demonstrate that the SFRs meet all security
objectives for the TOE.
ASE_REQ.2.8C The security requirements’ rationale shall explain
why the SARs were chosen.
ASE_REQ.2.9C The statement of security requirements shall be
internally consistent.
Evaluator action elements:
ASE_REQ.2.1E The evaluator shall confirm that the information
provided meets all of the requirements for content
and presentation of evidence.
5.2.1.6 ASE_SPD.1 Security problem definition
Dependencies: No dependencies.
Developer action elements:
ASE_SPD.1.1D The developer shall provide a security problem
definition.
Content and presentation elements: