Certified/Validated Products List

ECOSYS M3660idn, ECOSYS M3655idn,
ECOSYS M3645idn, ECOSYS M3660idnG,
ECOSYS M3655idnG, ECOSYS M3645idnG(KYOCERA), P-6036i MFP, P-5536i MFP,
P-4536i MFP(TA Triumph-Adler/UTAX)
all of the above with Data Security Kit and SSD
System: 2TA_S0IS.C01.010

KYOCERA Document Solutions Inc.
Last Updated 2019-07-09
Product Name :
ECOSYS M3660idn, ECOSYS M3655idn,
ECOSYS M3645idn, ECOSYS M3660idnG,
ECOSYS M3655idnG, ECOSYS M3645idnG(KYOCERA), P-6036i MFP,
P-5536i MFP,P-4536i MFP(TA Triumph-Adler/UTAX)
all of the above with Data Security Kit and SSD
Version of TOE :
System: 2TA_S0IS.C01.010
Product Type :
Multi-Function Printer
Certification No. :
C0641
Date :
2019-06-07
Version of Common Criteria:
3.1 Release5
Conformance Claim :
EAL2
PP Identifier :
None

PRODUCT DESCRIPTION

Description of TOE

The TOE is a Multi-Function Printer, which has Copy, Scan, Print, FAX and Document Box functionality. This TOE provides security functionalities to prevent unauthorized disclosure and alteration of user data.

 

TOE security functionality

This TOE provides the following security functionalities.

- User Authentication
The functionality that performs user identification and authentication.
- Document Access Control
The functionality that restricts access to user data to authorized users only.
- SSD Data Encryption
The functionality that encrypts data stored in SSD.
- Security Management
The functionality that restricts management of the security functionalities to authorized users only.
- Network Data Protection
The functionality that encrypts communication data.
- FAX Data Flow Control
The functionality that does not transfer FAX data received from public lines to the internal network.

 

Security functional requirements

This TOE implements the following security functional requirements.

Security audit Non-repudiation of origin/receipt Cryptographic functionality Access control
Data authentication Export data protection Information flow control Import data protection
Internal transfer data protection Residual information protection Rollback Stored data integrity
Transfer data confidentiality Transfer data integrity Identification and authentication Security management
Privacy Control Security functionality protection Resource utilisation management TOE access control
Trusted path/channels Random number generation