Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
84
Environment Objective
Rationale
the assumption A.TRUSTED_ADMIN by
ensuring the administrators are non-hostile and
follow all administrator guidance.
7.3
Rationale for TOE Security Functional Requirements
The security requirements are derived according to the general model presented in Part 1
of the Common Criteria. Specifically, the tables below illustrate the mapping between the
security requirements and the security objectives and the relationship between the threats,
policies and IT security objectives. The functional and assurance requirements presented
in this Security Target are mutually supportive and their combination meets the stated
security objectives.
Table 25: Security Objective to Security Requirements Mappings
O
.PR
O
TE
C
TE
D
_C
O
MM
U
N
IC
A
TION
S
O
.V
ER
IFIAB
LE
_U
PD
A
TE
S
O
.SY
ST
EM_MON
ITO
R
IN
G
O
.D
ISP
LA
Y
_B
A
N
N
ER
O
.TO
E_A
D
MI
N
IST
R
A
TI
O
N
O
.R
ES
ID
U
A
L_INF
O
R
MAT
IO
N
_C
LE
A
R
IN
G
O
.R
ES
O
U
R
C
E_A
V
A
ILA
B
ILITY
O
.SE
SS
IO
N
_LO
C
K
O
.TS
F_S
EL
F_T
ES
T
FAU_GEN.1
X
FAU_GEN.2
X
FAU_STG_EXT.1
X
FAU_STG_EXT.3
X
X
FCS_CKM.1
X
FCS_CKM_EXT.4
X
FCS_COP.1(1)
X
FCS_COP.1(2)
X
X
FCS_COP.1(3)
X
X
FCS_COP.1(4)
X