Xerox Multi-Function Device Security Target4Copyright 2013 Xerox Corporation. All rights reserved.6.3.4. Class FDP: User data protection ..................................................................................... 456.3.5. Class FIA: Identification and authentication .................................................................. 486.3.6. Class FMT: Security management .................................................................................. 506.3.7. Class FPR: Privacy ........................................................................................................... 546.3.8. Class FPT: Protection of the TSF ..................................................................................... 546.3.9. Class FTA: TOE access ..................................................................................................... 556.3.10. Class FTP: Trusted paths/channels ............................................................................ 556.4. EXPLICITLY STATED REQUIREMENTS FOR THE TOE .......................................................................... 566.4.1. FPT_FDI_EXP.1 Restricted forwarding of data to external interfaces ............................ 566.5. TOE SECURITY ASSURANCE REQUIREMENTS ................................................................................. 566.6. RATIONALE FOR SECURITY FUNCTIONAL REQUIREMENTS ................................................................. 576.7. RATIONALE FOR SECURITY ASSURANCE REQUIREMENTS................................................................... 646.8. RATIONALE FOR DEPENDENCIES .................................................................................................. 656.8.1. Security Functional Requirement Dependencies ............................................................ 656.8.2. Security Assurance Requirement Dependencies ............................................................ 677. TOE SUMMARY SPECIFICATION .......................................................................... 697.1. TOE SECURITY FUNCTIONS ........................................................................................................ 697.1.1. Image Overwrite (TSF_IOW) .......................................................................................... 697.1.2. Information Flow Security (TSF_FLOW) .......................................................................... 707.1.3. Authentication (TSF_ AUT) ............................................................................................. 717.1.4. Network Identification (TSF_NET_ID) ............................................................................. 717.1.5. Security Audit (TSF_FAU) ................................................................................................ 727.1.6. Cryptographic Operations (TSF_FCS) ............................................................................. 727.1.7. User Data Protection – Disk Encryption (TSF_FDP_UDE) ............................................... 737.1.8. User Data Protection – IP Filtering (TSF_FDP_FILTER) ................................................... 737.1.9. Network Security (TSF_NET_SEC) ................................................................................... 737.1.10. Security Management (TSF_FMT) ............................................................................. 738. GLOSSARY.............................................................................................................. 779. ACRONYMS ............................................................................................................. 8110. BIBLIOGRAPHY ...................................................................................................... 83