Table 8.2 Correspondence between Security Objectives Policies and IT Security Functional
Requirements
Security objectives policy
IT security functional requirement
O
I
A
O
M
A
N
A
G
E
O
C
E
O
D
A
T
A
A
C
C
E
S
S
O
A
U
D
I
T
O
E
H
D
D
FIA_UID.2 ✔
FIA_UAU.2 ✔
FIA_UAU.7 ✔
FIA_AFL.1 ✔
FIA_SOS.1[1] ✔ ✔
FIA_SOS.1[2] ✔ ✔
FDP_SOS.1 ✔
FDP_ACC.1[1] ✔
FDP_ACC.1[2] ✔
FDP_ACF.1[1] ✔
FDP_ACF.1[2] ✔
FAU_GEN.1 ✔
FAU_STG .1 ✔
FAU_STG .4 ✔
FAU_SAR.1 ✔
FAU_SAR.2 ✔
FMT_MTD.1[1] ✔
FMT_MTD.1[2] ✔
FMT_MTD.1[3] ✔
FMT_MTD.1[4] ✔
TOE
security
functional
requirement
FMT_MTD.1[5] ✔
Copyright© 2005 KONICA MINOLTA BUSINESS TECHNOLOGIES, INC., All Rights Reserved