c0720 Est
c0720 Est
c0720 Est
This document is a translation of the evaluated and certified security target written in Japanese.
Version 1.17
2021/04/02
<Update History>
Date Ver Department in charge Appr Confirme Author Updated contents
over d by
2020/11/04 1.00 PP Service Development Dept. 1 Haga Yoshino Yasukaga First edition
2020/11/20 1.01 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2020/11/27 1.02 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2020/12/08 1.03 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2020/12/22 1.04 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2020/12/24 1.05 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/01/06 1.06 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/01/18 1.07 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/01/25 1.08 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/02 1.09 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/04 1.10 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/08 1.11 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/10 1.12 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/17 1.13 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/02/26 1.14 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/03/08 1.15 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/03/18 1.16 PP Service Development Dept. 1 Haga Yoshino Yasukaga Correction of errors
2021/04/02 1.17 PP system control development Haga Yoshino Yasukaga Correction of errors
department
Table of Contents
1. ST introduction ........................................................................................................................................ 6
ST reference ............................................................................................................................................................ 6
TOE reference ......................................................................................................................................................... 6
TOE overview ......................................................................................................................................................... 6
1.3.1. Type of TOE ..........................................................................................................................................................................6
1.3.2. Usage and key security features ...........................................................................................................................................6
1.3.3. Operating environment .........................................................................................................................................................7
1.3.4. Non-TOE hardware/software required for TOE ...................................................................................................................8
TOE description ...................................................................................................................................................... 8
1.4.1. Physical scope of the TOE ....................................................................................................................................................8
1.4.2. Logical scope of the TOE ...................................................................................................................................................10
Term ....................................................................................................................................................................... 12
2. Conformance claims .............................................................................................................................. 15
CC Conformance claims ....................................................................................................................................... 15
PP claim ................................................................................................................................................................. 15
PP Conformance rationale ..................................................................................................................................... 15
3. Security Problem Definition ................................................................................................................. 16
Users ...................................................................................................................................................................... 16
Assets ..................................................................................................................................................................... 16
3.2.1. User Data ...........................................................................................................................................................................16
3.2.2. TSF Data ............................................................................................................................................................................16
Threats ................................................................................................................................................................... 17
Organizational Security Policies ........................................................................................................................... 17
Assumptions .......................................................................................................................................................... 17
4. Security Objectives ................................................................................................................................ 19
Security Objectives for the Operational environment ........................................................................................... 19
5. Extended components definition .......................................................................................................... 20
FAU_STG_EXT Extended: External Audit Trail Storage .................................................................................... 20
FCS_CKM_EXT Extended: Cryptographic Key Management ............................................................................ 20
FCS_IPSEC_EXT Extended: IPsec selected ........................................................................................................ 21
FCS_KYC_EXT Extended: Cryptographic Operation (Key Chaining) ............................................................... 23
FCS_KDF_EXT Extended: Cryptographic Key Derivation ................................................................................. 24
FCS_PCC_EXT Extended: Cryptographic Password Construction and Conditioning ........................................ 25
FCS_RBG_EXT Extended: Cryptographic Operation (Random Bit Generation)................................................ 25
FCS_SNI_EXT Extended: Cryptographic Operation (Salt, Nonce, and Initialization Vector Generation ........... 26
FDP_DSK_EXT Extended: Protection of Data on Disk ....................................................................................... 27
FIA_PMG_EXT Extended: Password Management ........................................................................................... 28
FIA_PSK_EXT Extended: Pre-Shared Key Composition .................................................................................. 29
FPT_KYP_EXT Extended: Protection of Key and Key Material....................................................................... 30
FPT_SKP_EXT Extended: Protection of TSF Data............................................................................................ 31
FPT_TST_EXT Extended: TSF testing .............................................................................................................. 31
FPT_TUD_EXT Extended: Trusted Update ....................................................................................................... 32
6. Security Requirements .......................................................................................................................... 34
Security functional requirements .......................................................................................................................... 34
6.1.1. Class FAU: Security audit ..................................................................................................................................................34
6.1.2. Class FCS: Cryptographic support ....................................................................................................................................35
Table of figures
Figure 1-1 Use of TOE .............................................................................................................................................. 7
Figure 1-2 Physical scope of TOE ............................................................................................................................. 8
Figure 1-3 Logical scope of TOE ............................................................................................................................. 11
Table of Contents
Table 1-1 Evaluated Configuration ............................................................................................................................ 8
Table 1-2 configuration .............................................................................................................................................. 9
Table 1-3 TOE firmware configuration ...................................................................................................................... 9
Table 1-4 Guidance List ........................................................................................................................................... 10
Table 1-5 Components of TOE ................................................................................................................................. 10
Table 1-6 Basic functions of TOE ............................................................................................................................ 11
Table 1-7 Security function of TOE ......................................................................................................................... 12
Table 1-8 Terms ........................................................................................................................................................ 13
Table 3-1 User Categories ........................................................................................................................................ 16
Table 3-2 Asset categories ........................................................................................................................................ 16
Table 3-3 User Data Type ......................................................................................................................................... 16
Table 3-4 TSF Data .................................................................................................................................................. 16
Table 3-5 Threats for the TOE .................................................................................................................................. 17
1. ST introduction
ST reference
- ST name : KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint
C4065 with UK-112 Security Target
- ST version : 1.17
- Creation date : April 02, 2021
- Author : Konica Minolta Co., Ltd.
TOE reference
- TOE name : KONICA MINOLTA AccurioPress C4080 / AccurioPress C4070 / AccurioPrint
C4065 with UK-112
- Version : GM2-20
The TOE above consists of the main unit (KONICA MINOLTA Accurio Press C4080, KONICA MINOLTA Accurio
Press C4070, KONICA MINOLTA Accurio Print C4065, or firmware version GM2-20) and the mandatory HDD unit
(product name: UK-112). The TOE version GM2-20 consists of a combination of the firmware type and version name
described in Table 1-3, which is information for identifying firmware. KONICA MINOLTA Accurio Print C4065 is not
sold in Japan (KONICA MINOLTA Accurio Press C4080/Accurio Press C4070 can be purchased in Japan and overseas).
TOE overview
This TOE is a digital multifunction device (hereinafter referred to as MFP) used in a commercial information processing
environment where medium document security, network security, and information assurance are basically required. This
environment typically handles confidential and non-confidential information that is handled in day-to-day business
operations.
Internet
Firewall
Client PC TOE
(2) LAN
The network used in the TOE installation environment.
(3) Firewall
Device to prevent network attacks from the Internet to the in-office LAN.
(4) Client PC
The web browser software can be used to access TOE from the client PC and perform the following operations.
Web Connection (after administrator authentication, TOE's firmware version can be viewed on the
browser)
TOE description
This chapter outlines the physical and logical scope of the TOE.
TOE
Operation Scanner
Printer unit
panel unit
Control board
HDD SSD
RS-232C USB I/F Network I/F
LAN
1.4.1.3. Guidance
The following is a list of guidance. Guidance for general users (User's Guide) is provided by the dealer to the user in the
form of html file by contacting the URL to which the manual should be referred. In addition, guidance on security
functions (User's Guide Security Function) is provided by the dealer to the user using portable storage media in the
format of an exe file.
The Japanese version of the guidance will be distributed only in Japan, and the English version will be distributed only
overseas (outside Japan). KONICA MINOLTA Accurio Print C4065 will not be sold in Japan (KONICA MINOLTA
Accurio Press C4080/Accurio Press C4070 can be purchased in Japan and overseas).
User
TOE
Operation panel
Client PC
Audit log server External IT device
(to which electronic documents are sent)
Term
The following abbreviations and terms are used in this ST.
Designation Definition
TOE environment is only enabled when the security enhancement setting is enabled.
User ID Identifier assigned to the general user. The TOE identifies the user by its identifier.
Admin ID Identifier assigned to the administrator. The TOE identifies the user by its identifier.
User management This function registers, changes, and deletes users.
Authenticating user Function to authenticate TOE users. There are three types of authentication: main unit
identities authentication, intermediate authentication, and external authentication. Only main unit
authentication can be used when the security enhancement setting is valid.
Login Execute identification and authentication in TOE using the username and login password.
Encryption password Data used in the generation of encryption keys used in the encryption of HDDs and SSDs.
TOE generates the encryption key using the string set in the encryption password.
Audit function This function generates and records an audit log for the event to be audited and sends the
log to the log server.
Trusted communications A function to encrypt and protect data to be exchanged via a LAN.
function
Firmware This software has the function of basic control of TOE and its peripheral equipment
(finisher), and TOE consists of multiple firmware. This control firmware and controller
firmware are used to realize the TSF function.
Firmware update A function to update firmware using update data obtained through a network or USB
memory. Only updates using USB memory can be performed when the security
enhancement setting is enabled. Also called ISW.
2. Conformance claims
CC Conformance claims
This ST conforms to the following Common Criteria (hereinafter referred to as CC).
PP claim
This ST conforms to the following PP.
PP identification :
PP Title : Protection Profile for Hardcopy Devices
PP registration :
PP version : 1.0 dated September 10, 2015
Date : September 10, 2015
Errata : Protection Profile for Hardcopy Devices - v1.0 Errata #1, June 2017
PP Conformance rationale
The following conditions requested by PP are met and "Exact Conformance" is as requested by PP. Therefore, the TOE
type is consistent with PP.
⚫ Required Uses
Printing, Scanning, Copying, Network communications, Administration
⚫ Conditionally Mandatory Uses
Storage and retrieval, Field-Replaceable Nonvolatile Storage
⚫ Optional Uses
None
Users
TOE users are classified as follows.
Assets
Protected assets are User Data, TSF Data. Each asset is defined as follows:
TOE
Threats
This section describes threats to assets described in clause in 3.2.
Assumptions
The Security Objectives and Security Functional Requirements defined in subsequent sections of this Protection Profile
are based on the condition that all of the assumptions described in this section are satisfied.
4. Security Objectives
Component leveling:
FAU_STG_EXT.1 External Audit Trail Storage requires the TSF to use a trusted channel implementing a secure
protocol.
Management:
The following actions could be considered for the management functions in FMT:
▪ The TSF shall have the ability to configure the cryptographic functionality.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
The TSF is required that the transmission of generated audit data to an External IT Entity which relies on a non-TOE
audit server for storage and review of audit records. The storage of these audit records and the ability to allow the
administrator to review these audit records is provided by the Operational Environment in that case. The Common
Criteria does not provide a suitable SFR for the transmission of audit data to an External IT Entity.
This extended component protects the audit records, and it is therefore placed in the FAU class with a single component.
Component leveling:
FCS_CKM_EXT.4 Cryptographic Key Material Destruction ensures not only keys but also key materials that
are no longer needed are destroyed by using an approved method.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Cryptographic Key Material Destruction is to ensure the keys and key materials that are no longer needed are destroyed
by using an approved method, and the Common Criteria does not provide a suitable SFR for the Cryptographic Key
Material Destruction.
This extended component protects the cryptographic key and key materials against exposure, and it is therefore placed
in the FCS class with a single component.
Component leveling:
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ Failure to establish an IPsec SA
DH groups].
FCS_IPSEC_EXT.1.10 The TSF shall ensure that all IKE protocols perform Peer Authentication using the [selection: RSA,
ECDSA] algorithm and Pre-shared Keys.
Rationale:
IPsec is one of the secure communication protocols, and the Common Criteria does not provide a suitable SFR for the
communication protocols using cryptographic algorithms.
This extended component protects the communication data using cryptographic algorithms, and it is therefore placed in
the FCS class with a single component.
Component leveling:
FCS_KYC_EXT Key Chaining, requires the TSF to maintain a key chain and specifies the characteristics of that
chain.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Key Chaining ensures that the TSF maintains the key chain, and also specifies the characteristics of that chain.However,
the Common Criteria does not provide a suitable SFR for the management of multiple layers of encryption key to protect
encrypted data.
This extended component protects the TSF data using cryptographic algorithms, and it is therefore placed in the FCS
class with a single component.
Component leveling:
FCS_KDF_EXT.1 Cryptographic Key Derivation requires the TSF to derive intermediate keys from submasks
using the specified hash functions.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
The TSF is required to specify the means by which an intermediate key is derived from a specified set of submasks using
the specified hash functions.
This extended component protects the Data Encryption Keys using cryptographic algorithms in the maintained key
chains, and it is therefore placed in the FCS class with a single component.
Component leveling:
FCS_PCC_EXT.1 Cryptographic Password Construction and Conditioning, requires the TSF to accept
passwords of a certain composition and condition them appropriately.
Management:
No specific management functions are identified
Audit:
There are no auditable events foreseen.
Rationale:
The TSF is required to ensure that passwords used to produce the BEV are robust (in terms of their composition) and
are conditioned to provide an appropriate-length bit string.
This extended component protects the Data Encryption Keys using cryptographic algorithms and Robust BEV in the
maintained key chains, and it is therefore placed in the FCS class with a single component.
Component leveling:
FCS_RBG_EXT.1 Random Bit Generation requires random bit generation to be performed in accordance with
selected standards and seeded by an entropy source.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Random bits/number will be used by the SFRs for key generation and destruction, and the Common Criteria does not
provide a suitable SFR for the random bit generation.
This extended component ensures the strength of encryption keys, and it is therefore placed in the FCS class with a
single component.
Component leveling:
FCS_SNI_EXT.1 Cryptographic Operation (Salt, Nonce, and Initialization Vector Generation), requires the
generation of salts, nonces, and IVs to be used by the cryptographic components of the TOE to be performed in
the specified manner.
Management:
No specific management functions are identified
Audit:
There are no auditable events foreseen.
FCS_SNI_EXT.1 Extended: Cryptographic Operation (Salt, Nonce, and Initialization Vector Generation)
Hierarchical to : No other components
Dependencies : FCS_RBG_EXT.1 Extended: Cryptographic Operation (Random Bit
Generation)
FCS_SNI_EXT.1.1 The TSF shall only use salts that are generated by a RNG as specified in FCS_RBG_EXT.1.
FCS_SNI_EXT.1.2 The TSF shall only use unique nonces with a minimum size of [64] bits.
FCS_SNI_EXT.1.3 The TSF shall create IVs in the following manner: [
- CBC: IVs shall be non-repeating,
- CCM: Nonce shall be non-repeating.
- XTS: No IV. Tweak values shall be non-negative integers, assigned consecutively, and starting at an
arbitrary non-negative integer,
- GCM: IV shall be non-repeating. The number of invocations of GCM shall not exceed 2^32 for a given
secret key.
].
Rationale:
The TSF is required to ensure that the generation of salts, nonces, and IVs to be used by the cryptographic components
of the TOE to be performed in the specified manner.
This extended component protects the communication data and storage data using cryptographic algorithms with
specified Salt, Nonce and Initialization Vector Generation, and it is therefore placed in the FCS class with a single
component.
Component leveling:
FDP_DSK_EXT.1 Extended:Protection of Data on Disk, requires the TSF to encrypt all the Confidential TSF and
User Data stored on the Field-Replaceable Nonvolatile Storage Devices in order to avoid storing these data in
plaintext on the devices.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Extended: Protection of Data on Disk is to specify that encryption of any confidential data without user intervention,
and the Common Criteria does not provide a suitable SFR for the Protection of Data on Disk.
This extended component protects the Data on Disk, and it is therefore placed in the FDP class with a single component.
Component leveling:
FIA_PMG_EXT.1 Password management requires the TSF to support passwords with varying composition
requirements, minimum lengths, maximum lifetime, and similarity constraints.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Password Management is to ensure the strong authentication between the endpoints of communication, and the Common
Criteria does not provide a suitable SFR for the Password Management.
This extended component protects the TOE by means of password management, and it is therefore placed in the FIA
class with a single component.
Component leveling:
FIA_PSK_EXT.1 Pre-Shared Key Composition, ensures authenticity and access control for updates.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
include: "!", "@", "#", "$", "%", "^", "&", "*", "(", and ")").
FIA_PSK_EXT.1.3 The TSF shall condition the text-based pre-shared keys by using [selection: SHA-1, SHA-256, SHA-
512, [assignment: method of conditioning text string]] and be able to [selection: use no other pre-
shared keys; accept bit-based pre-shared keys; generate bit-based pre-shared keys using the random
bit generator specified in FCS_RBG_EXT.1].
Rationale:
Pre-shared Key Composition is to ensure the strong authentication between the endpoints of communications, and the
Common Criteria does not provide a suitable SFR for the Pre-shared Key Composition.
This extended component protects the TOE by means of strong authentication, and it is therefore placed in the FIA class
with a single component.
Component leveling:
FPT_ KYP _EXT.1 Extended: Protection of key and key material, requires the TSF to ensure that no plaintext
key or key materials are written to nonvolatile storage.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Protection of Key and Key Material is to ensure that no plaintext key or key material are written to nonvolatile storage,
and the Common Criteria does not provide a suitable SFR for the protection of key and key material.
This extended component protects the TSF data, and it is therefore placed in the FPT class with a single component.
Component leveling:
FPT_SKP_EXT.1 Protection of TSF Data (for reading all symmetric keys), requires preventing symmetric keys
from being read by any user or subject.It is the only component of this family.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
Protection of TSF Data is to ensure the pre-shared keys, symmetric keys and private keys are protected securely, and the
Common Criteria does not provide a suitable SFR for the protection of such TSF data.
This extended component protects the TOE by means of strong authentication using Preshared Key, and it is therefore
placed in the FPT class with a single component.
Component leveling:
FPT_TST_EXT.1 TSF testing requires a suite of self-testing to be run during initial start-up in order to
demonstrate correct operation of the TSF.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
Rationale:
TSF testing is to ensure the TSF can be operated correctly, and the Common Criteria does not provide a suitable SFR
for the TSF testing.In particular, there is no SFR defined for TSF testing.
This extended component protects the TOE, and it is therefore placed in the FPT class with a single component.
Component leveling:
FPT_TUD_EXT.1 Trusted Update, ensures authenticity and access control for updates.
Management:
The following actions could be considered for the management functions in FMT:
▪ There are no management actions foreseen.
Audit:
The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:
▪ There are no auditable events foreseen.
generation/verification),
FCS_COP.1(c) Cryptographic operation (Hash Algorithm).
FPT_TUD_EXT.1.1 The TSF shall provide authorized administrators the ability to query the current version of the TOE
firmware/software.
FPT_TUD_EXT.1.2 The TSF shall provide authorized administrators the ability to initiate updates to TOE
firmware/software.
FPT_TUD_EXT.1.3 The TSF shall provide a means to verify firmware/software updates to the TOE using a digital signature
mechanism and [selection: published hash, no other functions] prior to installing those updates.
Rationale:
Firmware/software is a form of TSF Data, and the Common Criteria does not provide a suitable SFR for the management
of firmware/software.In particular, there is no SFR defined for importing TSF Data.
This extended component protects the TOE, and it is therefore placed in the FPT class with a single component.
6. Security Requirements
This chapter describes the security requirements.
Mandatory SFR
Information
Job completion FDP_ACF.1 Type of job - Completion of copying
- Completion of scanning
- Saving a copy job
- Read out a saved job
- Print the saved job
- File output of saved jobs
- Deleting a saved job
- Duplicating a saved job
- Modifying a saved job
Unsuccessful User authentication FIA_UAU.1 None Successful login
Login failures
Unsuccessful User identification FIA_UID.1 None Successful login
Login failures
Use of management functions FMT_SMF.1 None - Using Security Management
Functions
Modification to the group of Users that FMT_SMR.1 None Do not record because user role change
are part of a role function does not exist.
Changes to the time FPT_STM.1 None - Change in the time
Failure to establish session FTP_ITC.1, Reason for - Reasons for Failure to Establish
FTP_TRP.1(a) failure Communication
Refinement [assignment: rules that do not conflict with the User Data Access Control SFP, based on security
attributes, that explicitly authorise access of subjects to objects].
[assignment: rules that do not conflict with the User Data Access Control SFP, based on security
attributes, that explicitly authorise access of subjects to objects]
▪ None
FDP_ACF.1.4 The TSF shall explicitly deny access of subjects to objects based on the following additional rules:
Refinement [assignment: rules that do not conflict with the User Data Access Control SFP, based on security
attributes, that explicitly deny access of subjects to objects].
[assignment: rules that do not conflict with the User Data Access Control SFP, based on security
attributes, that explicitly deny access of subjects to objects]
▪ None
Note 1: Job Owner is identified by a credential or assigned to an authorized User as part of the process of submitting a
print or storage Job.
Note 2: Job Owner is assigned to an authorized User as part of the process of initiating a scan, copy or retrieval Job.
▪ 1
[assignment: list of authentication events]
▪ Refer to Table 6-4
FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has been [selection: met,
surpassed], the TSF shall [assignment: list of actions].
[selection: met, surpassed]
▪ Refer to Table 6-4
[assignment: list of actions]
▪ Refer to Table 6-4
(for O.USER_I&A)
Hierarchical to : No other components
Dependencies : FIA_UID.1 Timing of identification
FIA_UAU.1.1 The TSF shall allow [assignment: list of TSF mediated actions that do not conflict with the User Data
Refinement Access Control SFP, and do not provide access to D.TSF.CONF, and do not change any TSF data]
on behalf of the user to be performed before the user is authenticated.
[assignment: list of TSF mediated actions that do not conflict with the User Data Access Control
SFP, and do not provide access to D.TSF.CONF, and do not change any TSF data]
▪ Confirmation of TOE status and display settings
▪ Viewing the transmission history of scan data by scan operation, output history by copy
operation, unoutput history that is the history of the job whose output was canceled, and output
reservation for a job whose output was not completed
FIA_UAU.1.2 The TSF shall require each user to be successfully authenticated before allowing any other TSF-
mediated actions on behalf of that user.
➢ For general users, the time determined by the auto-reset time after the last operation and
the completion of processing by the last operation (1 minute when the auto-reset function
is disabled).
➢ For administrators, 30 minutes from the completion of processing by the last operation.
▪ For Web Connection, there is no interactive session
communicated data from disclosure and detection of modification of the communicated data.
[selection, choose at least one of: IPsec, SSH, TLS, TLS/HTTPS]
▪ IPsec
FTP_TRP.1.2(a)
Refinement The TSF shall permit remote administrators to initiate communication via the trusted path.
FTP_TRP.1.3(a) The TSF shall require the use of the trusted path for initial administrator authentication and all
Refinement remote administration actions.
< Appendix B: Conditionally Mandatory Requirements (Confidential Data on Field-Replaceable Nonvolatile Storage
Devices) >
< Appendix D: Selection-based Requirements (Confidential Data on Field-Replaceable Nonvolatile Storage Devices) >
[selection: the cryptographic algorithms AES-CBC-128 (as specified by RFC 3602) together with a
Secure Hash Algorithm (SHA)-based HMAC, AES-CBC-256 (as specified by RFC 3602) together with
a Secure Hash Algorithm (SHA)-based HMAC, AES-GCM-128 as specified in RFC 4106, AES-GCM-
256 as specified in RFC 4106]
▪ the cryptographic algorithms AES-CBC-128 (as specified by RFC 3602) together with a Secure
Hash Algorithm (SHA)-based HMAC
▪ AES-CBC-256 (as specified by RFC 3602) together with a Secure Hash Algorithm (SHA)-based
HMAC
FCS_IPSEC_EXT.1.5 The TSF shall implement the protocol: [selection: IKEv1, using Main Mode for Phase 1 exchanges,
as defined in RFCs 2407, 2408, 2409, RFC 4109, [selection: no other RFCs for extended sequence
numbers, RFC 4304 for extended sequence numbers], and [selection: no other RFCs for hash
functions, RFC 4868 for hash functions]; IKEv2 as defined in RFCs 5996 (with mandatory support
for NAT traversal as specified in section 2.23), 4307 [selection: with no support for NAT traversal,
with mandatory support for NAT traversal as specified in section 2.23], and [selection: no other RFCs
for hash functions, RFC 4868 for hash functions]].
[selection: IKEv1 as defined ...; IKEv2 as defined]
▪ IKEv1 as defined in RFCs 2407, 2408, 2409, RFC 4109, [selection: no other RFCs for extended
sequence numbers, RFC 4304 for extended sequence numbers], and [selection: no other RFCs
for hash functions, RFC 4868 for hash functions]
[selection: no other RFCs for extended sequence numbers, RFC 4304 for extended sequence numbers]
▪ RFC 4304 for extended sequence numbers
[selection: no other RFCs for hash functions, RFC 4868 for hash functions]
▪ RFC 4868 for hash functions
FCS_IPSEC_EXT.1.6 The TSF shall ensure the encrypted payload in the [selection: IKEv1, IKEv2] protocol uses the
cryptographic algorithms AES-CBC-128, AES-CBC-256 as specified in RFC 3602 and [selection:
AES-GCM-128, AES-GCM-256 as specified in RFC 5282, no other algorithm].
[selection: IKEv1, IKEv2]
▪ IKEv1
[selection: AES-GCM-128, AES-GCM-256 as specified in RFC 5282, no other algorithm]
▪ no other algorithm
FCS_IPSEC_EXT.1.7 The TSF shall ensure that IKEv1 Phase 1 exchanges use only main mode.
FCS_IPSEC_EXT.1.8 The TSF shall ensure that [selection: IKEv2 SA lifetimes can be established based on [selection:
number of packets/number of bytes; length of time, where the time values can be limited to: 24 hours
for Phase 1 SAs and 8 hours for Phase 2 SAs]; IKEv1 SA lifetimes can be established based on
[selection: number of packets/number of bytes ; length of time, where the time values can be limited
to: 24 hours for Phase 1 SAs and 8 hours for Phase 2 SAs]].
[selection: IKEv2 SA lifetimes can be established based on [selection: number of packets/number of
bytes; length of time, where the time values can be limited to: 24 hours for Phase 1 SAs and 8 hours
for Phase 2 SAs]; IKEv1 SA lifetimes can be established based on [selection: number of
packets/number of bytes ; length of time, where the time values can be limited to: 24 hours for Phase
1 SAs and 8 hours for Phase 2 SAs]]
▪ IKEv1 SA lifetimes can be ...
[selection: number of packets/number of bytes; length of time, where the time values can be limited
to: 24 hours for Phase 1 SAs and 8 hours for Phase 2 SAs]
▪ length of time, where the time values can be limited to: 24 hours for Phase 1 SAs and 8 hours
for Phase 2 SAs
FCS_IPSEC_EXT.1.9 The TSF shall ensure that all IKE protocols implement DH Groups 14 (2048-bit MODP), and
[selection: 24 (2048-bit MODP with 256-bit POS), 19 (256-bit Random ECP), 20 (384-bit Random
ECP, 5 (1536-bit MODP)), [assignment: other DH groups that are implemented by the TOE], no other
DH groups].
[selection: 24 (2048-bit MODP with 256-bit POS), 19 (256-bit Random ECP), 20 (384-bit Random
ECP), 5 (1536-bit MODP), [assignment: other DH groups that are implemented by the TOE], no other
DH groups]
▪ no other DH groups
[assignment: other DH groups that are implemented by the TOE]
▪ none
FCS_IPSEC_EXT.1.10 The TSF shall ensure that all IKE protocols perform Peer Authentication using the [selection: RSA,
ECDSA] algorithm and Pre-shared Keys.
[selection: RSA, ECDSA]
▪ RSA
FCS_SNI_EXT.1 Extended: Cryptographic Operation (Salt, Nonce, and Initialization Vector Generation)
(selected with FCS_PCC_EXT.1, FCS_KDF_EXT.1.1)
Hierarchical to : No other components
Dependencies : FCS_RBG_EXT.1 Extended: Cryptographic Operation (Random Bit
Generation)
FCS_SNI_EXT.1.1 The TSF shall only use salts that are generated by a RNG as specified in FCS_RBG_EXT.1.
FCS_SNI_EXT.1.2 The TSF shall only use unique nonces with a minimum size of [64] bits.
FCS_SNI_EXT.1.3 The TSF shall create IVs in the following manner: [
- CBC: IVs shall be non-repeating,
- CCM: Nonce shall be non-repeating.
- XTS: No IV. Tweak values shall be non-negative integers, assigned consecutively, and starting at an
arbitrary non-negative integer,
- GCM: IV shall be non-repeating. The number of invocations of GCM shall not exceed 2^32 for a given
secret key.
].
using the operation panel or the web browser (when using Web Connection). TOE confirms that the registered
administrator password matches. No management function can be performed prior to the execution of identification and
authentication.
In addition, when the user is allowed to use the management function, the identification and authentication operation
cannot be performed as a general user (no means exists).
FIA_AFL.1
If authentication fails (once) for administrator and user authentication in the operation panel and administrator
identification and authentication in the Web Connection, TOE will not perform the next authentication attempt on the
user for five seconds.
FIA_PMG_EXT.1
TOE can set the following user password to combine uppercase and lowercase alphabetic characters, numbers, and the
following special characters.
Special characters (32 characters) that can be used for general user passwords
! @ # $ % ^ & * ( ) - ¥
[ ] : ; , . / Space ' = ~ |
` { } + < > ? _
When a user sets or changes the user password listed below, TOE checks whether the number of characters of the new
password is equal to or greater than the minimum number of characters for password (the minimum number of characters
for password is set by the administrator to a range of 8 to 64 characters). If the condition is not met, the setting is not
reflected and a message requesting reset is displayed.
▪ Administrator password
▪ User password
FIA_USB.1
The TOE is associated with the user identifier (User ID) and role U.NORMAL with the task to be executed on behalf of
the user after user identification and authentication. After the administrator's identity is authenticated, the Admin ID and
the role U.ADMIN are associated with the task to be performed on behalf of the user. Since tasks on behalf of users are
associated with each interface, identification and authentication of general users and administrators can be performed
from the operation panel during administrator identification and authentication in the Web Connection (only the
firmware version can be confirmed in the Web Connection).
FIA_UAU.7
When a user enters a password for authentication from the operation panel or web browser, TOE displays dummy
characters (*) corresponding to the number of input characters instead of the entered characters.
FTA_SSL.3
The TOE terminates the session when a user who has been identified and authenticated in the operation panel or Web
Connection meets the following conditions.
▪ In the case of the operation panel, general users will be logged out one minute after the completion of processing
by the last operation is completed (when the auto-reset function is disabled) or after the set auto-reset time (can be
set between 1 and 9 minutes). The administrator will also be logged out 30 minutes after the completion of
processing by the last operation is completed, and will be required to re-authenticate.
▪ For Web Connection, identification and authentication is successful and logs out immediately after the browser
displays the firmware version.
FIA_ATD.1
The TOE defines the task attributes (User ID, Admin ID) and roles (U.NORMAL, U.ADMIN) of the tasks on behalf of
the user as attributes.Task attribute and role allocation timing are as follows.
▪ General User: When an administrator registers a user from the operation panel, U.NORMAL is assigned a unique
User ID as a user attribute and a fixed role
▪ Administrator: Administrator has only one Admin ID and cannot be added or deleted. U.ADMIN is assigned as a
fixed role
TOE implements cryptographic algorithms in accordance with the following standards. When executing the random
bit generation process using CTR_DRBG, a bit string of 1024 bits is generated from the software entropy source, and
the random number is generated by inputting the bit string into the random bit generation function of the library software
(GUARD FIPS Security Toolkit) in the firmware.
TOE generates the encryption keys described in Table 7-4 to achieve storage encryption.
When using TOE, administrators are guided to register and generate KEK by executing "Encryption password Setting
Function". This function can also be used to regenerate KEK. In this function, the following processing is performed by
the administrator by resetting the encryption password.
(1) A key derivation function is used to generate a KEK from the key material stored in QSPI Flash.
(2) Read encrypted DEK from QSPI Flash, decrypt it with the above key, and expand it to RAM.
(3) Based on the password set by the user, a new 256-bit KEK is generated by the password-based key derivation
function (PBKDF2) of the encryption library incorporated into this control firmware. The parameters at the time
of derivation are as follows.
Table 7-5 Special characters (32 characters) that can be used for the password
Special characters (32 characters) that can be used for encryption passwords
! @ # $ % ^ & * ( ) - ¥
[ ] : ; , . / " ' = ~ |
` { } + < > ? _
The encryption key generated by the above-mentioned means is used in the initialization process at TOE startup as
follows.
(1) When the TOE's sub power supply is turned on, the bootloader starts and reads and executes each firmware from
the SSD's firmware storage area.
(2) The TOE firmware reads the key material (password and Salt) from the QSPI Flash and derives the key using the
password-based key derivation function (PBKDF2).
(3) Read the encrypted DEK from the QSPI Flash, decrypt it with the re-derived KEK, and expand it to RAM.
(4) The TOE firmware decrypts the setup information stored in SSD and NVRAM using the decrypted DEK, initializes
all functions including the TOE security functions, and displays the basic screen on the operation panel after
completion to make the TOE functions available to users.
As shown above
▪ KEK keys are not stored on media corresponding to NVRAM, QSPI Flash, or portable storage media, but are stored
only in RAM. The key material is stored on a QSPI Flash on the substrate, but not on a medium that corresponds
to a portable storage medium.
▪ The DEK key is stored in the encrypted state in the QSPI Flash on the TOE board, but is not stored in the medium
corresponding to the portable storage medium. There is no key material.
▪ The decrypted DEK key is stored in RAM only. It is not stored on media that corresponds to portable storage media.
▪ There is no external interface to access both the key and the key material of KEK/DEK.
Thus, the encryption key is considered to be protected.
FDP_DSK_EXT.1
TOE encrypts data using the encryption key described in Table 7-4.
In TOE, the device capable of holding encrypted user document data and confidential TSF data is an SSD/HDD that
is a portable storage medium and an NVRAM/QSPI Flash that is not a portable storage medium (TSF data on RAM is
erased with sub power off). Only the devices listed here are not subject to encryption because they do not handle TSF
information or do not have the ability to hold TSF data when the sub power is OFF. Table 7-6 and Table 7-7 show the
data to be encrypted for each device.
Table 7-6 Data to be encrypted for each device (portable storage medium)
Storage Contents and areas Encryption support Encryption Algorithm Encryption
method key conditions
SSD SSD system area (partition table, No encryption - - -
etc.) target
Storage of firmware No encryption - - -
target
TOE Setting Information Storage Encrypted file DEK AES(CBC) Every minute
Area (Set value saved by system
administrator)
SWAP area (disabled) Not used - - -
Controller area (TOE network Encrypted file DEK AES(CBC) Every minute
setting, destination server address, system
password)
Control area (authentication data) Encrypted file DEK AES(CBC) Every minute
system
Audit log information Encrypted file DEK AES(CBC) Every minute
system
HDD Job storage area (job management Proprietary DEK AES(CBC) Every minute
(RAID 0) data/job blog) implementation
Job storage area (image data, Proprietary DEK AES(CBC) Every minute
thumbnails) implementation
Table 7-7 Data to be encrypted for each device (other than portable storage media)
Device Contents and areas Encryption support Encryption Algorithm Encryption
method key conditions
NVRAM TOE setting information storage Encrypt and save DEK AES(CBC) Every minute
area (password information password
excluding user authentication, information
scan function destination/audit log (Plaintext if the area
destination setting) does not fall under
the above)
QSPI Flash DEK Encrypted and KEK AES(CBC) Every minute
saved
KEK key material As plaintext - - -
The items described in Table 7-6 and Table 7-7 are described.
▪ The encrypted file system is a file system software that manages the read/write of all files of the partition (area)
described as "encrypted file system" in the encryption support method column and performs encryption and
decryption processing without fail. There is no interface that can avoid encryption and decryption processing.
Encryption by the encrypted file system is enabled in the TOE manufacturing process at Konica Minolta's plant
(DEK keys are generated and used in the encrypted file system). Therefore, the administrator does not need to
FCS_RBG_EXT.1
TOE implements a CTR DRBG (AES-256) conforming to NIST SP 800-90A and an RBG consisting of a single
software noise source. The above CTR DRBG uses the Derivation Function and Reseed,, but the Prediction Resistance
function does not work. The software noise source implements a condition branch code or the like that affects the internal
state of the CPU and a clock counter value acquisition process in the loop process. The variation of the loop processing
execution time is acquired through the clock counter to obtain the raw data. Conditioning is performed to agitate and
compress the entropy included in the raw data into the entire bit using shift operations and XOR, and after increasing
the entropy rate of the entire bit, it is output as an entropy value.
TOE uses this RBG to generate a random number and uses it to generate the key material of the encryption key KEK
and the key key DEK (key length: 256 bits). When the TOE generates a random number, if the CTR DRBG requires a
seed material (Entropy Input and Nonce), start the software to be used as the noise source and obtain and use the required
size entropy value. This entropy value satisfies the minimum amount of entropy required for Instantiate and Reseed (in
the case of TOE, 256 bits equal to the security strength) shown in 10.2.1 of NIST SP800-90A and contains sufficient
entropy.
FCS_CKM.4, FCS_CKM_EXT.4
In TOE, the key material of the cryptographic key KEK used for the storage encryption function is stored in the QSPI
Flash, which cannot be exchanged locally, and used to protect each data including setting information related to the basic
control of TOE regardless of the security enhancement settings. Table 7-8 shows KEK and DEK key storage locations
and the timing of their destruction.
The administrator is advised to perform the all data overwrite and delete function when the TOE is discarded with
guidance.
FCS_CKM.1(a)
TOE generates an RSA asymmetric key with a key length of 2048 bits in the method described in the rsakpg1-crt
method described in Section 6.3.1.3 of NIST SP800-56B, Revision 2 in the generation of IPsec certificates used for key
establishment of IPsec communication by PKI setting of Web Connection. Also, in the key establishment for IPsec
communication (see FTP_ITC.1), an asymmetric key is generated by Diffie-Hellman Group 14 as described in the Using
the Approved Safe-Prime Groups described in Section 5.6.1.1.1 of NIST SP800-56A, Revision 3.
FCS_CKM.1(b)
The TOE generates a random number using the RBG described in FCS_RBG_EXT.1 and generates a 128-bit or 256-
bit symmetric encryption key at the start of IPsec communication (see FTP_ITC.1) or at the key establishment after the
SA lifetime. TOE invokes the above RBG by calling the DRBG function (CTR DRBG (AES-256)) and generates a
random number.
FCS_RBG_EXT.1
TOE implements a CTR DRBG (AES-256) conforming to NIST SP 800-90A and an RBG consisting of a single
software noise source. The above CTR DRBG uses the Derivation Function and Reseed,, but the Prediction Resistance
function does not work. The software noise source implements a condition branch code or the like that affects the internal
state of the CPU and a clock counter value acquisition process in the loop process. The variation of the loop processing
execution time is acquired through the clock counter to obtain the raw data. Conditioning is performed to agitate and
compress the entropy included in the raw data into the entire bit using shift operations and XOR, and after increasing
the entropy rate of the entire bit, it is output as an entropy value.
If the CTR DRBG requires a seed material (Entropy Input and Nonce) when the TOE generates a random number,
start the software to be used as the noise source and obtain and use the required size entropy value. This entropy value
satisfies the minimum amount of entropy required for Instantiate and Reseed (in the case of TOE, 256 bits equal to the
security strength) shown in 10.2.1 of NIST SP800-90A and contains sufficient entropy.
FCS_COP.1(a)
TOE uses an AES-CBC with a key length of 128 bits and 256 bits conforming to FIPS PUB 197 and NIST SP 800-
38A as an ESP cryptographic algorithm for IPsec communication. The IKEv1 cryptographic algorithm uses an AES-
CBC with a key length of 128 bits and 256 bits that conform to FIPS PUB 197 and NIST SP 800-38A.
FTP_TRP.1(a)
TOE performs encrypted communication in communication with other reliable IT devices. The following functions are
subject to encryption communication.
Table 7-9 Reliable path (FTP_TRP.1(a)) available to the administrator
Recipient of communication Contents and functions of the communication to be Protocol
encrypted
Client PC Use of Web Connection by browser IPsec
FTP_ITC.1
TOE performs encrypted communication with IT devices. The encrypted communication provided by TOE is as follows.
(When security enhancement setting is enabled)
Table 7-10 Encrypted communication provided by TOE
Recipient of communication Protocol Cryptographic algorithms Associated interface
IPsec AES(128bits、256bits) Execute scan function from the operation
File server (FTP)
panel
IPsec AES(128bits、256bits) Execute scan function from the operation
File server (WebDAV)
panel
IPsec AES(128bits、256bits) Execute scan function from the operation
File server (SMB)
panel
Audit log server (syslog) IPsec AES(128bits、256bits) See Table 7-14
The TOE implements the IPsec Security Policy Database (SPD) and the following settings can be made by the
administrator.
▪ IPsec Policy: Allows administrator to specify the conditions of IP packets and select the action to be taken (protect,
pass, or discard) for IP packets that meet each condition. IPsec policy can be set up to 10 groups (IP policy group
1-10), and is applied to both sending and receiving packets. When multiple IPsec policies are set for one
communication partner, regardless of the registration order of IPsec policy groups 1-10, the operation is applied in
the following priority order.
Priority: High protection > Discard > Passage priority: Low
▪ Default Action: Select from the following options what to do if there are no settings that match IPsec policy.
(Guidance is given to the administrator to choose to destroy this setting.)
- Discard: Discard IP packets that do not match the IPsec policy setting
- Passing: Passing IP packets that do not match the IPsec policy setting
FIA_PSK_EXT.1
The TOE uses the following text-based pre-shared key as the pre-shared key for IPsec. The text-based prior shared
key is converted into a bit string using the hash algorithm described below.
▪ Text-based pre-shared key
- Length: 22 characters
- Available Characters: strings of ASCII characters (combining uppercase and lowercase alphabetic characters,
numeric characters, and special characters ("!", "@", "#", "$", "%"%", "&", "*", "(", ")")")), or HEX Values
- Conditioning Methods: SHA-1, SHA-256, SHA-384, and SHA-512
FCS_CKM.4, FCS_CKM_EXT.4
In TOE, the encryption keys used for the trusted communications function and their key materials are stored in the
controller area of the SSD or in the RAM, and are used for key exchange, authentication, or encryption of
communications at the time of establishing the secure communication. Table 7-11 shows the storage destination of keys
and keys used for IPsec communication and the method of destruction. The pre-shared key set by the administrator and
the private key of the IPsec certificate are stored on the SSD, and the timing when it becomes unnecessary is limited to
when the TOE is discarded. Guidance indicates that all data overwrite and delete function should be performed by the
administrator when the TOE is discarded. In the all data overwrite and delete function, the encryption key and the key
material storage area are overwritten once with a fixed value (0). Session keys (temporary encryption keys) used in
IPSec etc. are stored in RAM. These items are deleted because they are no longer needed when the TOE sub power is
turned off.
Audit function
TOE generates and records an audit log for the event being audited and sends it to the log server.
FAU_GEN.1, FAU_GEN.2
The TOE defines the following events as the event to be audited and records the event occurrence time (month, day,
hour, second), event type, subject identification information, and event results.
Table 7-14 List of Audited Events
ID (Subject Identification Associated interface
Event to be audited Results
Information *1)
FIA_UAU.1,
Executing administrator authentication Admin ID OK/NG
See FIA_UID.1
Changing/registering administrator password Admin ID OK See Table 7-12
FIA_UAU.1,
Executing user authentication User ID/unregistered ID OK/NG
See FIA_UID.1
Creation of users by administrators Admin ID OK See Table 7-12
Changing/registering user passwords by See Table 7-12
Admin ID OK
administrator
Deleting a user by administrator Admin ID OK See Table 7-12
Changing user attributes by administrator Admin ID OK See Table 7-12
FAU_STG_EXT.1
Recorded audit log information is retained in the TOE and then log files are transmitted according to the external audit
server (syslog) set by the administrator. See Table 7-15 for the log transmission timing.
When log information cannot be sent to the log server due to network failure, etc., it is
temporarily saved in SSD (*1). Up to 10,000 cases. The subsequent information is
Processing in case of
discarded when the log information reaches 10,000. The temporarily saved information
transmission failure
is transmitted when communicating with the server, and the information on the SSD is
deleted.
It is temporarily stored in the log storage area on the SSD shown in (*1) Table 7-6. The stored information is protected
from unauthorized access by encrypting it in the file system. For details, refer to TSS of FDP_DSK_EXT.1. In addition,
the TOE does not provide a user interface for accessing the storage area of log information, so there is no means for
reading out log information.
FPT_STM.1
TOE has a clock function and provides only the administrator with the function to change the time of TOE. Time
information to be recorded in the audit log is provided by the clock function.
FCS_COP.1(b), FCS_COP.1(c)
TOE verifies firmware files using digital signature verification as follows.
1. Firmware files include digital signature data and firmware data. Digital signature data conform to RSA digital
signature algorithm (rDSA) 2048 bit, FIPS PUB 186-4, "Digital Signature Standard".
2. Decrypts the digital signature data with the public key of TOE.
3. The data decrypted above is compared with the firmware data calculated by SHA-256 in accordance with ISO/IEC
10118-3:2004. The firmware data is judged to be normal if it matches.
Self-testing function
FPT_TST_EXT.1
When TOE is sub powered on, firstly, firmware self-test is performed in the order of main control firmware and
network control firmware, and then FW is read. The hash value of the main control firmware and the network control
firmware, which control security functions, is calculated, and the existence of falsification is detected by checking the
match with the hash value data recorded on the SSD during the firmware verification, and the integrity of the TSF
execution code is verified. Since the encryption library used in TOE at this time is also subject to hash value verification,
integrity is also verified. If the verification fails, the TOE displays a warning (SC code) on the operation panel and stops
the operation and moves to the state where the operation is not accepted. Firmware other than the above is excluded
from the firmware verification function because they do not have access to TSF data and security function execution
capability and do not have access to TSF data.
If the verification fails, the TOE displays a warning (SC code) on the operation panel and stops the operation and moves
to the state where the operation is not accepted.
This is sufficient to demonstrate that the TSF is operating correctly because the above process can confirm the integrity
of the firmware that determines the behavior of the TSF.