Specifications

Samsung MFP Security Kit Type_B V1.5 Security Target
78
Copyright
2010 Samsung Electronics Co., Ltd., All rights reserved
This component is required to ensure the ability to protect the security
audit log in storage from unauthorized users. Therefore, it satisfies
security object O.AUDITS.
FAU_STG.4 (Prevention of audit data loss)
This component is required to ensure the ability to overwrite the security
audit log when storage is full of log data, and also to prevent
unauthorized changes to the audit log. Therefore, it satisfies security
object O.AUDITS.
FCS_CKM.1 (Cryptographic key generation)
This component is required to ensure the ability to generate cryptographic
keys in accordance with a random key generation method and 256-bit
cryptographic key sizes that meet the IEEE 802.11i standard. Therefore, it
satisfies security object O.STORAGE_DATA_ENCRYPTION.
FCS_CKM.4 (Cryptographic key destruction)
This component is required to ensure the ability to destroy cryptographic
keys in accordance with a key destruction method that overwrites used
cryptographic keys using a newly generated cryptographic key. Therefore,
it satisfies security object O.STORAGE_DATA_ENCRYPTION.
FCS_COP.1 (Cryptographic operation)
This component is required to ensure the ability to perform cryptographic
operation of data in HDD in accordance with a AES cryptographic
algorithm and 256-bit key sizes that meet FIPS PUB 197. Therefore, it
satisfies security object O.STORAGE_DATA_ENCRYPTION.
FDP_IFC.2(1) (Complete information flow control)
This component is required to ensure the ability to enforce the fax flow
control policy on Fax image user, Fax image and all operations. Therefore,
it satisfies security object O.FAXLINE.
FDP_IFF.1(1) (Simple security attributes)
This component is required to ensure the ability to define roles for fax
flow control policy and enforce the fax flow control policy based on roles
defined. Therefore, it satisfies security object O.FAXLINE.
FDP_IFC.2(2) (Complete information flow control)
This component is required to ensure the ability to enforce the network
access control policy on network users and all operations that cause that
information to flow from network user to MFP. Therefore, it satisfies
security object O.NETWORK_ACCESS_CONTROL.
FDP_IFF.1(2) (Simple security attributes)