
Security Target Version 1.02, 08/16/2013
8.1.1 Security Objectives Rationale for the TOE and Environment .............................................................. 54
8.2 SECURITY REQUIREMENTS RATIONALE ........................................................................................................ 56
8.2.1 Security Functional Requirements Rationale....................................................................................... 56
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 60
8.4 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 60
8.5 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 61
APPENDIX A: DOCUMENTATION FOR A SERIES SWITCHES ................................................................... 63
LIST OF TABLES
Table 1 TOE Series and Devices ................................................................................................................................. 5
Table 2 TOE Security Functional Components ...................................................................................................... 20
Table 3 Auditable Events .......................................................................................................................................... 22
Table 4 Assurance Components ............................................................................................................................... 27
Table 5 NDPP Security Functional Requirement Assurance Activities ................................................................ 39
Table 6 NDPP Assurance Family Assurance Activities .......................................................................................... 41
Table 7 Cryptographic Functions ............................................................................................................................ 43
Table 8 NIST SP800-56B Conformance .................................................................................................................. 43
Table 9 Key/CSP Zeroization Summary ................................................................................................................. 46
Table 10 SFR Protection Profile Sources................................................................................................................. 53
Table 11 Environment to Objective Correspondence ............................................................................................ 54
Table 12 Objective to Requirement Correspondence ............................................................................................. 57
Table 13 Requirement Dependencies ....................................................................................................................... 61
Table 14 Security Functions vs. Requirements Mapping ....................................................................................... 62
Comentários a estes Manuais