- Product Name :
- ECOSYS M3660idn, ECOSYS M3655idn,
ECOSYS M3645idn, ECOSYS M3660idnG,
ECOSYS M3655idnG, ECOSYS M3645idnG(KYOCERA), P-6036i MFP,
P-5536i MFP,P-4536i MFP(TA Triumph-Adler/UTAX)
all of the above with Data Security Kit and SSD
- Version of TOE :
- System: 2TA_S0IS.C01.010
- Product Type :
- Multi-Function Printer
- Certification No. :
- Date :
- Version of Common Criteria:
- 3.1 Release5
- Conformance Claim :
- PP Identifier :
- Vendor :
- KYOCERA Document Solutions Inc.
- POC :
- Masaki Sone
- Division :
- Corporate R＆D Division
- Phone :
- E-mail :
- Evaluation Facility :
- Information Technology Security Center
Certificate Image :
Description of TOE
The TOE is a Multi-Function Printer, which has Copy, Scan, Print, FAX and Document Box functionality. This TOE provides security functionalities to prevent unauthorized disclosure and alteration of user data.
TOE security functionality
This TOE provides the following security functionalities.
The functionality that performs user identification and authentication.
|-||Document Access Control
The functionality that restricts access to user data to authorized users only.
|-||SSD Data Encryption
The functionality that encrypts data stored in SSD.
The functionality that restricts management of the security functionalities to authorized users only.
|-||Network Data Protection
The functionality that encrypts communication data.
|-||FAX Data Flow Control
The functionality that does not transfer FAX data received from public lines to the internal network.
Security functional requirements
This TOE implements the following security functional requirements.
|Security audit||Non-repudiation of origin/receipt||Cryptographic functionality||Access control|
|Data authentication||Export data protection||Information flow control||Import data protection|
|Internal transfer data protection||Residual information protection||Rollback||Stored data integrity|
|Transfer data confidentiality||Transfer data integrity||Identification and authentication||Security management|
|Privacy Control||Security functionality protection||Resource utilisation management||TOE access control|
|Trusted path/channels||Random number generation|