
CRP-C0266-01
13
fax data, transfers the received data from fax process of the fax unit to fax reception process
of the controller board.
Also, recording implemented actions of intrusion prevention via telephone lines in audit logs
enables re-detection of security breaches if the intrusion prevention via telephone lines is not
correctly performed.
Therefore, T.FAX_LINE, by which attackers may illegally gain access to the TOE through
telephone lines, is countered by the intrusion prevention via telephone lines and the audit.
3.1.2 Organisational Security Policy and Security Function Policies
3.1.2.1 Organisational Security Policy
Organisational security policy required in use of the TOE is shown in Table 3-3.
Table 3-3 Organisational Security Policy
Identifier Organisational Security Policy
P.SOFTWARE In order to prove the trusted MFP Control Software for
consumers, measures are provided for verifying the
integrity of MFP Control Software, which is installed in
the FlashROM of the TOE.
3.1.2.2 Security Function Policies to Organisational Security Policy
The TOE provides the Security Functions to fill the Organisational Security Policy shown in
Table 3-3.
(1) Countermeasures against Organisational Security Policy, "P.SOFTWARE".
By verifying the e-signature added to the executable codes of the MFP control software
installed in FlashROM the TOE can confirm that these executable codes are
manufacturer-genuine and officially supplied by RICOH COMPANY, LTD.
Considering the function of verifying the integrity of this software, and checking the version
information outputted from the TOE, it is confirmed that the software is a correct version and
officially supplied by RICOH COMPANY, LTD.
Comentarios a estos manuales