Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

1. Security Target Introduction
1.1 Security Target, TOE and CC Identification
1.2 Conformance Claims
1.3 Conventions, Terminology and Acronyms
1.3.1 Conventions
1.3.2 Operations
1.3.3 Naming Conventions
2. TOE Description
2.1 Product Type
2.2 Product Description
2.3 Product Security Features
2.4 Security Environment TOE Boundary
2.4.1 Physical Boundaries
2.4.2 Logical Boundaries
3. Security Environment
3.1 Threats to Security
3.2 Organizational Security Policies
3.3 Secure Usage Assumptions
3.3.1 Physical Assumptions
3.3.2 Personnel Assumptions
3.3.3 System Assumptions
4. Security Objectives
4.1 IT Security Objectives for the TOE
4.2 IT Security Objectives for the Environment
4.3 Security Objectives of the Non-IT Environment
5. IT Security Requirements
5.1 TOE Security Functional Requirements
5.1.1 Security Audit (FAU)
5.1.2 Cryptographic support (FCS)
5.1.3 User Data Protection (FDP)
5.1.4 Identification and Authentication (FIA)
5.1.5 Security management (FMT)
5.1.6 TOE access (FTA)
5.1.7 Trusted Path/Channels
5.2 Security Functional Requirements for the IT Environment
Identification and Authentication (FIA)
5.2.1 User Data Protection (FDP)
5.2.2 Identification and Authentication (FIA)
5.2.3 Protection of the TSF (FPT)
5.3 TOE Security Assurance Requirements
5.3.1 Configuration Management (ACM)
5.3.2 Delivery and Operation (ADO)
5.3.3 Development (ADV)
5.3.4 Guidance Documents (AGD)
5.3.5 Life Cycle Support (ALC)
5.3.6 Security Testing (ATE)
5.3.7 Vulnerability Assessment (VLA)
6. TOE Summary Specification
6.1 TOE Security Functions
6.1.1 Cryptographic Support
6.1.2 Security Audit
6.1.3 User Data Protection
6.1.4 Identification and Authentication
6.1.5 Security Management
6.1.6 TOE Access
6.1.7 Trusted Path/Channel
6.2 TOE Security Assurance Measures
6.2.1 Process Assurance
6.2.2 Delivery and Operation
6.2.3 Design Documentation
6.2.4 Guidance Documentation
6.2.5 Test Documentation
6.2.6 Vulnerability Assessment
7. Protection Profile Claims
8. Rationale
8.1 Security Objectives Rationale
8.1.1 Security Objective for the TOE Rationale
8.1.2 Security Objectives for Environment Rationale
8.1.2.1 Security Objectives for the IT Environment Rationale
8.2 Security Requirements Rationale
8.2.1 Security Functional Requirements Rationale
8.3 Security Assurance Requirements Rationale
8.4 Security Requirements Dependencies Rationale
8.5 TOE Summary Specification Rationale
8.6 Internal Consistency and Support Rationale
8.7 Strength of Function (SOF) Rationale
0 of .
Results for:
No results containing your search query
P. 1
Marimba Book

Marimba Book

Ratings: (0)|Views: 285|Likes:
Published by willie2222

More info:

Published by: willie2222 on Oct 25, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/28/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 6 are not shown in this preview.
You're Reading a Free Preview
Pages 10 to 67 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->