ST Engineering Data Diode Security Target i
ST Engineering Data Diode Model 5282 and 5283
Security Target
Contents
Preliminary Pages Page
Contents ...................................................................................................................................... i
List of Illustrations ................................................................................................................... iii
Chapter 1 – ST Introduction ................................................................................................ 1-1
1.1 ST Reference .................................................................................................... 1-1
1.2 TOE Reference................................................................................................. 1-1
1.3 TOE Overview ................................................................................................. 1-1
1.3.1 TOE Type ............................................................................................... 1-3
1.4 TOE Description .............................................................................................. 1-3
1.4.1 Physical Scope ........................................................................................ 1-3
1.4.2 Logical Scope of the TOE ...................................................................... 1-5
Chapter 2 – Conformance Claims ....................................................................................... 2-1
2.1 Conformance Claims ....................................................................................... 2-1
2.2 Conformance Rationale ................................................................................... 2-1
Chapter 3 – Security Problem Definition ........................................................................... 3-2
3.1 Threats.............................................................................................................. 3-2
3.2 Organizational Security Policies ...................................................................... 3-2
3.3 Assumptions ..................................................................................................... 3-2
Chapter 4 Security Objectives ............................................................................................. 4-3
4.1 Security Objectives for the TOE ...................................................................... 4-3
4.2 Security Objectives for the Operational Environment ..................................... 4-3
4.3 Security Objectives Rationale .......................................................................... 4-3
4.3.1 T. RCVDATALEAK .............................................................................. 4-4
4.3.2 A.PHYSICAL ......................................................................................... 4-4
4.3.3 A.USER .................................................................................................. 4-4
4.3.4 A.NETWORK ........................................................................................ 4-4
Chapter 5 Security Requirement ......................................................................................... 5-5