- 3 -
-Contents-
1. ST Introduction .................................................................... 5
1.1. ST Identification.............................................................................................................................................................................................................5
1.2. ST Overview....................................................................................................................................................................................................................5
1.3. Evaluation Assurance Level ...................................................................................................................................................................................2
1.4. Applicable PP..................................................................................................................................................................................................................2
1.5. Related ST........................................................................................................................................................................................................................2
1.6. CC Conformance..........................................................................................................................................................................................................2
1.7. Abbreviated Terms.......................................................................................................................................................................................................2
1.8. Terms...................................................................................................................................................................................................................................2
1.9. Reference..........................................................................................................................................................................................................................7
2. TOE Description ................................................................... 7
2.1. Type of TOE.....................................................................................................................................................................................................................7
2.2. Usage Environment of TOE....................................................................................................................................................................................8
2.3. Purpose of Using TOE...............................................................................................................................................................................................9
2.4. Configuration of TOE..................................................................................................................................................................................................9
2.4.1. Physical Configuration.......................................................................................................................................................................................9
2.4.2. Logical Configuration ...................................................................................................................................................................................... 10
2.5. Persons Related to TOE........................................................................................................................................................................................ 15
2.6. Assets protected by TOE ...................................................................................................................................................................................... 16
2.7. Functions of TOE....................................................................................................................................................................................................... 17
2.7.1. Security Functions of TOE .......................................................................................................................................................................... 17
2.7.2. Non-Security Function of TOE..................................................................................................................................................................18
2.8. How to Use TOE ........................................................................................................................................................................................................ 18
3. TOE Security Environment ......................................................... 21
3.1. Assumptions................................................................................................................................................................................................................. 21
3.2. Threats............................................................................................................................................................................................................................. 21
3.3. Organizational Security Policies ....................................................................................................................................................................... 21
4. Security Objectives ............................................................... 22
4.1. Security Objectives for the TOE........................................................................................................................................................................ 22
4.2. Security Objectives for the Environment...................................................................................................................................................... 22
4.2.1. Security Objectives for IT Environment ................................................................................................................................................ 22
4.2.2. Security Objectives for Operation and Management....................................................................................................................... 22
5. IT Security Requirements .......................................................... 23
5.1. TOE Security Functional Requirements....................................................................................................................................................... 23
5.1.1. Class FCS: Cryptographic Support .......................................................................................................................................................... 23
5.1.2. Class FDP: User Data Protection............................................................................................................................................................. 24
Komentáře k této Příručce