
Page 31 of 83
O.LINE_PROTECT (Prevention of Intrusion from Telephone Line)
The TOE shall prevent unauthorised access to the TOE from a telephone line connected
to the Fax Unit.
4.2 Security Objectives for Operational Environment
This chapter describes the security objectives for the operational environment.
OE.ADMIN (Trusted Administrator)
The Responsible Manager for MFP shall select trusted persons as Administrators, and
provide them with the education programmes according to their Administrator Roles.
The educated Administrators shall instruct General Users to be familiar with the
compliance rules for secure operation for General Users, as explicitly stated in
Administrator guidance for the TOE.
OE.SUPERVISOR (Trusted Supervisor)
The Responsible Manager for MFP shall select a trusted person as the Supervisor and
provide the Supervisor with the education programmes according to the role of
Supervisor.
OE.NETWORK (Network Environment for TOE Connection)
When connecting the Internal Networks, to which the TOE is connected, to the External
Networks such as the Internet, the organisation that manages the operation of the
Internal Networks shall close the unnecessary ports between the External and Internal
Networks. (E.g., Firewall set up.)
4.3 Security Objectives Rationale
This chapter describes the security objectives rationale.
By the following description, if all security objectives are achieved, the security problems as defined in "
3
Security Problem Definition" are solved: all threats are countered, all organisational security policies are
achieved, and all assumptions are accomplished.
4.3.1 Tracing
This chapter describes the correspondence relation between the previously described "3.1 Threats", "3.2
Organisational Security Policies" and "3.3 Assumptions", and either "4.1 Security Objectives for TOE" or
"4.2 Security Objectives for Operational Environment" with Table 4. The "X" in the table indicates that each
of the following TOE Security Environments and the security objectives correspond.
As Table 4 shows, it is obvious that each security objective corresponds to one or more threats,
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Comentarios a estos manuales