
CRP-C0266-01
14
4. Assumptions and Clarification of Scope
In this chapter, it describes the assumptions and the operational environment to operate the
TOE as useful information for the judgment before the assumed reader uses the TOE.
4.1 Usage Assumptions
Table 4-1 shows assumptions to operate the TOE.
The effective performance of the TOE Security Functions are not assured unless these
assumptions are satisfied.
Table 4-1 Assumptions in Use of the TOE
Identifier Assumptions
A.ADMIN
Administrators of this TOE shall have sufficient knowledge to
securely operate the TOE, and shall securely keep the TOE
and the operational environment for the TOE. Administrators
shall not abuse their permission maliciously, and they also
shall not illegally act such as leakage or tampering of the
document data as protected assets, and deactivating the
Security Functions of the TOE. And provide the necessary
advice and attentions for general users who use MFP in order
to securely operate the TOE. The sufficient knowledge to
securely operate the TOE includes the following:
No use of the following functions and the settings:
- Backup/Restore Address Book
- Service Mode Lock set to "Off"
- Use of the IPv6 protocol
- Use of IP-Fax or Internet Fax Function
- Use of Authentication method except for Basic
Authentication
A.SUPERVISOR
Supervisor shall have sufficient knowledge to securely operate
the TOE, and shall not abuse their permission maliciously.
Also, they shall not illegally act such as leakage or tampering
of the document data as protected assets, and deactivating the
Security Functions of the TOE.
A.NETWORK
When the TOE is connected to the internal network connected
to an external network such as the Internet, not for attacking
in the TOE by the communication via the external network,
install firewalls in the boundaries of the external network and
the internal network to protect the internal network and the
TOE.
Comentarios a estos manuales