Nortel Networks 7.11, 7.05 manual Security Functional Requirements on the IT Environment

Models: 7.11 7.05

1 67
Download 67 pages 33.01 Kb
Page 39
Image 39
5.2 Security Functional Requirements on the IT Environment

Security Target, Version 3.9

March 18, 2008

 

 

5.2 Security Functional Requirements on the IT Environment

The TOE has the following security requirement for its IT environment. Table 5 identifies all SFRs implemented by the IT Environment and indicates the ST operations performed on each requirement.

Table 5 - IT Environment Security Functional Requirements

 

 

ST Operation

SFR ID

Description

Selection

Assignment

Refinement

Iteration

 

 

 

 

FPT_RVM.1

Non-bypassability of the TSP

 

 

 

 

 

 

 

FPT_SEP.1

TSF domain separation

 

 

 

 

 

 

 

FPT_STM.1

Reliable time stamps

 

 

 

 

 

 

 

FPT_RVM.1 Non-bypassability of the TSP

Hierarchical to: No other components.

FPT_RVM.1.1

The TSF IT Environment shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed.

Dependencies: No dependencies

FPT_SEP.1 TSF domain separation

Hierarchical to: No other components.

FPT_SEP.1.1

The TSF IT Environment shall maintain a security domain for its own the TOE’s execution that protects it the TOE from interference and tampering by untrusted subjects.

FPT_SEP.1.2

The TSF shall enforce separation between the security domains of subjects in the TSC.

Dependencies: No dependencies

FPT_STM.1 Reliable time stamps

Hierarchical to: No other components.

FPT_STM.1.1

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 39 of 67

© 2008 Nortel Networks

Page 39
Image 39
Nortel Networks 7.11, 7.05 Security Functional Requirements on the IT Environment, FPTRVM.1 Non-bypassability of the TSP