Security Requirements for the IT EnvironmentAppendix A Common Criteria Environment: Security Requirements 707FMT_MTD.1.1 The IT environment shall restrict the ability to view (read) ordelete the audit logs to Auditors.FMT_SMR.2 Restrictions on security rolesFMT_SMR.2.1 The IT environment shall maintain the roles: Administrator,Auditor, and Officer.FMT_SMR.2.2 The IT environment shall be able to associate users with roles.FMT_SMR.2.3 The IT environment shall ensure that:1. no identity is authorized to assume both an Administrator and an Officer role;2. no identity is authorized to assume both an Auditor and an Officer role; and3. no identity is authorized to assume both an Administrator and an Auditor role.Protection of the TSF (FPT)FPT_AMT.1 Abstract machine testingFPT_AMT.1.1 The IT environment shall run a suite of tests [other conditions:during initial start-up, periodically during normal operation, or at the request ofan authorized user] to demonstrate the correct operation of the securityassumptions provided by the abstract machine that underlies the IT environment.FPT_ITC.1 Inter-TSF confidentiality during transmission (iteration 1)FPT_ITC.1.1 The IT environment shall protect confidential IT environment datatransmitted from theIT environment to a remote trusted IT product from unauthorized disclosureduring transmission.NOTE The role definitions are listed below:1. Administrator – role authorized to install, configure, andmaintain the CIMC; establish and maintain user accounts;configure profiles and audit parameters; and generateComponent keys.2. Officer – role authorized to request or approve certificates orcertificate revocations.3. Auditor – role authorized to view and maintain audit logs.