Certified/Validated Products List

TASKalfa 3511i, TASKalfa 3011i,
TASKalfa 3011iG(KYOCERA),
3561i, 3061i(TA Triumph-Adler/UTAX)
all of the above with Data Security Kit (E),
FAX System 12
System: 2RH_20IS.C01.010S
Panel: 2ND_70IS.CT1.010
FAX: 3R2_5100.002.005

KYOCERA Document Solutions Inc.
Last Updated 2017-03-21
Product Name :
TASKalfa 3511i, TASKalfa 3011i, TASKalfa 3011iG(KYOCERA), 3561i, 3061i(TA Triumph-Adler/UTAX)
all of the above with Data Security Kit (E), FAX System 12
Version of TOE :
System: 2RH_20IS.C01.010S
Panel: 2ND_70IS.CT1.010
FAX: 3R2_5100.002.005
Product Type :
Multi-Function Printer
Certification No. :
C0543
Date :
2017-02-27
Version of Common Criteria:
3.1 Release4
Conformance Claim :
EAL2
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is a Multi-Function Printer, which has Copy, Scan, Print, FAX and Document Box functionality.
This TOE provides security functionalities to prevent unauthorized disclosure and alteration of user data.

 

TOE security functionality

This TOE provides the following security functionalities.

- User Authentication:
The functionality that performs user identification and authentication.
- Document Access Control:
The functionality that restricts access to user data to authorized users only.
- SSD Data Encryption:
The functionality that encrypts data stored in SSD.
- Audit Logs:
The functionality that records audit logs relevant to the security functionalities.
- Security Management:
The functionality that restricts management of the security functionalities to authorized users only.
- Self Test:
The functionality that verifies the integrity of executable codes of security functionality and setting data.
- Network Data Protection:
The functionality that encrypts communication data.
- FAX Data Flow Control:
The functionality that controls transmission of FAX data received from public lines.

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels