
Security Target, Version 3.9
Nortel VPN Router v7.05 and Client Workstation v7.11
5.2 Security Functional Requirements on the IT Environment
The TOE has the following security requirement for its IT environment. Table 5 identifies all SFRs implemented by
the IT Environment and indicates the ST operations performed on each requirement.
Table 5 - IT Environment Security Functional Requirements
Non-bypassability of the TSP
FPT_RVM.1 Non-bypassability of the TSP
Hierarchical to: No other components.
FPT_RVM.1.1
The TSF IT Environment shall ensure that TSP enforcement functions are invoked and succeed before
each function within the TSC is allowed to proceed.
Dependencies: No dependencies
FPT_SEP.1 TSF domain separation
Hierarchical to: No other components.
FPT_SEP.1.1
The TSF IT Environment shall maintain a security domain for its own the TOE’s execution that protects
it the TOE from interference and tampering by untrusted subjects.
FPT_SEP.1.2
The TSF shall enforce separation between the security domains of subjects in the TSC.
Dependencies: No dependencies
FPT_STM.1 Reliable time stamps
Hierarchical to: No other components.
FPT_STM.1.1
Komentarze do niniejszej Instrukcji