Xerox D110/D125 Copier/Printer
セキュリティターゲット
- 46 –
Copyright
2012 by Fuji Xerox Co., Ltd
Hierarchical to:
FAU_STG.3 Action in case of possible audit data loss
Dependencies:
FAU_STG.1 Protected audit trail storage
FAU_STG.4.1
The TSF shall [selection, choose one of: “ignore audited
events”, “prevent audited events, except those taken by the
authorized user with special rights”, “overwrite the oldest
stored audit records”] and [assignment: other actions to be
taken in case of audit storage failure] if the audit trail is full.
[selection, choose one of: “ignore audited events”, “prevent
audited events, except those taken by the authorized user
with special rights”, “overwrite the oldest stored audit
records”]
- overwrite the oldest stored audit records
[assignment: other actions to be taken in case of audit storage
failure]
- no other actions to be taken
6.1.2.
Class FCS:
Cryptographic Support
FCS_CKM.1
Cryptographic key generation
Hierarchical to:
No other components
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1
TSF shall generate cryptographic keys in accordance with a
specified cryptographic key generation algorithm
[assignment: cryptographic key generation algorithm] and
specified cryptographic key sizes [assignment: cryptographic
key sizes] that meet the following: [assignment: list of
standards].
[assignment: list of standards]
- none
[assignment: cryptographic key generation algorithm]
- the Fuji Xerox’s standard method, FXOSENC
[assignment: cryptographic key sizes]
- 256bits
FCS_COP.1 Cryptographic
operation