
Security Target, Version 3.9
Nortel VPN Router v7.05 and Client Workstation v7.11
8.6 TOE Summary Specification Rationale
8.6.1 TOE Summary Specification Rationale for the Security Functional
Requirements
Each subsection in the TOE Summary Specification (Section 6) describes a security function of the TOE. Each
description is organized by a set of requirements with rationale that indicates how these requirements are satisfied by
aspects of the corresponding security function. The set of security functions work together to satisfy all of the
security functions and assurance requirements. Furthermore, all of the security functions are necessary in order for
the TSF to provide the required security functionality. This section, in conjunction with the TOE Summary
Specification section, provides evidence that the security functions are suitable to fulfill the TOE security
requirements. Please see Section 6 - TOE Summary Specification for more details.
Table 14 identifies the relationship between security requirements and security functions, showing that all security
requirements are addressed and all security functions are necessary (i.e., they correspond to at least one security
requirement).
The only security mechanism that is realized by a probabilistic or permutational implementation is the password
mechanism. Refer to Section 8.7 for Strength of Function.
Table 14 - Mapping of Security Functional Requirements to TOE Security Functions
FCS_CKM.1(a)
FCS.CKM.4
FCS_COP.1
FDP_ACC.2
FDP_ACF.1
FDP_IFC.2
FDP_IFF.1
FDP_UCT.1
FDP_UIT.1
Identification and
Authentication
FIA_UAU.1
FIA_UAU.5
FIA_UID.2
FMT_MOF.1
FMT_MSA.1
FMT_MSA.2
FMT_MSA.3
FMT_SMF.1
FMT_SMR.1
FPT_AMT.1
FPT_RPL.1
FPT_TST.1
Kommentare zu diesen Handbüchern