• There are no items in your cart

IEEE 2600.1 : 2009

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

PROTECTION PROFILE IN OPERATIONAL ENVIRONMENT A

Withdrawn date

10-17-2023

Published date

01-01-2009

1 Overview
   1.1 Scope
   1.2 Purpose
   1.3 Application notes
   1.4 Notational conventions
2 Normative references
3 Protection Profile introduction (APE_INT)
   3.1 Protection Profile usage
   3.2 Protection Profile reference
4 Hardcopy Device overview (APE_INT)
   4.1 Typical products
   4.2 Typical usage
5 TOE overview (APE_INT)
   5.1 TOE functions
   5.2 TOE model
   5.3 Entity definitions
   5.4 TOE operational model
6 Conformance claims (APE_CCL)
   6.1 Conformance to Common Criteria
   6.2 Conformance to other Protection Profiles
   6.3 Conformance to Packages
   6.4 Conformance to this Protection Profile
7 Security Problem Definition (APE_SPD)
   7.1 Threats agents
   7.2 Threats to TOE Assets
   7.3 Organizational Security Policies for the TOE
   7.4 Assumptions
8 Security Objectives (APE_OBJ)
   8.1 Security Objectives for the TOE
   8.2 Security Objectives for the IT environment
   8.3 Security Objectives for the non-IT environment
   8.4 Security Objectives rationale
9 Extended components definition (APE_ECD)
   9.1 FPT_CIP_EXP Confidentiality and integrity of stored data
   9.2 FPT_FDI_EXP Restricted forwarding of data to external
        interfaces
10 Common Security Functional Requirements (APE_REQ)
   10.1 Class FAU: Security audit
   10.2 Class FCO: Communication
   10.3 Class FCS: Cryptographic support
   10.4 Class FDP: User data protection
   10.5 Class FIA: Identification and authentication
   10.6 Class FMT: Security management
   10.7 Class FPR: Privacy
   10.8 Class FPT: Protection of the TSF
   10.9 Class FRU: Resource utilization
   10.10 Class FTA: TOE access
   10.11 Class FTP: Trusted paths/channels
   10.12 Common security requirements rationale
11 Security assurance requirements (APE_REQ)
12 SFR Packages introduction
   12.1 SFR Packages usage
   12.2 SFR Packages reference
   12.3 SFR Package functions
   12.4 SFR Package attributes
13 2600.1-PRT SFR Package for Hardcopy Device Print Functions,
   Operational Environment A
   13.1 PRT SFR Package introduction
   13.2 Class FDP: User data protection
   13.3 PRT security requirements rationale
14 2600.1-SCN SFR Package for Hardcopy Device Scan Functions,
   Operational Environment A
   14.1 SCN SFR package introduction
   14.2 Class FDP: User data protection
   14.3 SCN security requirements rationale
15 2600.1-CPY SFR Package for Hardcopy Device Copy Functions,
   Operational Environment A
   15.1 CPY SFR package introduction
   15.2 Class FDP: User data protection
   15.3 CPY security requirements rationale
16 2600.1-FAX SFR Package for Hardcopy Device Fax Functions,
   Operational Environment A
   16.1 FAX SFR package introduction
   16.2 Class FDP: User data protection
   16.3 FAX security requirements rationale
17 2600.1-DSR SFR Package for Hardcopy Device Document Storage
   and Retrieval Functions, Operational Environment A
   17.1 DSR SFR package introduction
   17.2 Class FDP: User data protection
   17.3 DSR security requirements rationale
18 2600.1-NVS SFR Package for Hardcopy Device Nonvolatile
   Storage Functions, Operational Environment A
   18.1 NVS SFR package introduction
   18.2 Class FPT: Protection of the TSF
   18.3 NVS security requirements rationale
19 2600.1-SMI SFR Package for Hardcopy Device Shared-medium
   Interface Functions, Operational Environment A
   19.1 SMI SFR package introduction
   19.2 Class FAU: Security audit
   19.3 Class FPT: Protection of the TSF
   19.4 Class FTP: Trusted paths/channels
   19.5 SMI security requirements rationale
Annex A (normative) Glossary
Annex B (normative) Acronyms
Annex C (informative) Bibliography

Presents a Protection Profile for Hardcopy Devices in a restrictive commercial information processing environment in which a relatively high level of document security, operational accountability, and information assurance are required.

DocumentType
Standard
PublisherName
Institute of Electrical & Electronics Engineers
Status
Withdrawn

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.