Security Target, Version 3.9 | March 18, 2008 |
|
|
5.2 Security Functional Requirements on the IT Environment
The TOE has the following security requirement for its IT environment. Table 5 identifies all SFRs implemented by the IT Environment and indicates the ST operations performed on each requirement.
Table 5 - IT Environment Security Functional Requirements
|
| ST Operation | |||
SFR ID | Description | Selection | Assignment | Refinement | Iteration |
|
|
|
| ||
FPT_RVM.1 |
|
| |
| |
|
|
|
| ||
FPT_SEP.1 | TSF domain separation |
|
| |
|
|
|
|
| ||
FPT_STM.1 | Reliable time stamps |
|
| |
|
|
|
|
|
FPT_RVM.1 Non-bypassability of the TSP
Hierarchical to: No other components.
FPT_RVM.1.1
The TSF IT Environment shall ensure that TSP enforcement functions are invoked and succeed before each function within the TSC is allowed to proceed.
Dependencies: No dependencies
FPT_SEP.1 TSF domain separation
Hierarchical to: No other components.
FPT_SEP.1.1
The TSF IT Environment shall maintain a security domain for its own the TOE’s execution that protects it the TOE from interference and tampering by untrusted subjects.
FPT_SEP.1.2
The TSF shall enforce separation between the security domains of subjects in the TSC.
Dependencies: No dependencies
FPT_STM.1 Reliable time stamps
Hierarchical to: No other components.
FPT_STM.1.1
Nortel VPN Router v7.05 and Client Workstation v7.11 | Page 39 of 67 |
© 2008 Nortel Networks