
Cisco Intrusion Prevention System Security Target
4.2 Security Objectives for the Environment
All of the assumptions stated in section 3.1 are considered to be security objectives for the
environment. The following are the Protection Profile non-IT security objectives, which, in
addition to those assumptions, are to be satisfied without imposing technical requirements on the
TOE. That is, they will not require the implementation of functions in the TOE hardware and/or
software. Thus, they will be satisfied largely through application of procedural or administrative
measures.
Table 12: Security Objectives for the Environment
Environment Security
Objective
Operational Environment Security Objective Definition
Reproduced from the U.S. Government Protection Profile for Security Requirements for Network Devices
There are no general-purpose computing capabilities (e.g., compilers or user
applications) available on the TOE, other than those services necessary for the
operation, administration and support of the TOE.
Physical security, commensurate with the value of the TOE and the data it
contains, is provided by the environment.
TOE Administrators are trusted to follow and apply all administrator guidance
in a trusted manner.
4.3 Security objectives rationale
The security objectives rationale shows how the security objectives correspond to assumptions,
threats, and organizational security policies and provide a justification of that tracing.
4.3.1 Tracing of security objectives to SPD
The tracing shows how the security objectives O.* and OE.* trace back to assumptions A.*,
threats T.*, and organizational security policies OSP.* defined by the SPD.
Table 13: Tracing of security objectives to SPD
O.PROTECTED_COMMUNICATIONS
O.RESIDUAL_INFORMATION_CLEARING
Kommentare zu diesen Handbüchern