Xerox Multi-Function Device Security Target28Copyright 2013 Xerox Corporation. All rights reserved.Table 19: Completeness of security objectivesObjectivesO.DOC.NO_DISO.DOC.NO_ALTO.FUNC.NO_ALTO.PROT.NO_ALTO.CONF.NO_DISO.CONF.NO_ALTO.USER.AUTHORIZEDOE.USER.AUTHORIZEDO.SOFTWARE.VERIFIEDO.AUDIT.LOGGEDO.AUDIT_STORAGE.PROTECTEDOE.AUDIT_STORAGE.PROTECTEDOE.AUDIT_ACCESS.AUTHORIZEDOE.AUDIT.REVIEWEDOE.INTERFACE.MANAGEDOE.USER.AUTHENTICATEDOE.PHYISCAL.MANAGEDOE.INTERFACE.MANAGEDOE.ADMIN.TRAINEDOE.ADMIN.TRUSTEDOE.USER.TRAINEDThreats, policies andassumptionsT.DOC.DIS X X X XT.DOC.ALT X X X XT.FUNC.ALT X X X XT.PROT.ALT X X X XT.CONF.DIS X X X XT.CONF.ALT X X X XP.USER.AUTHORIZATION X X XP.SOFTWARE.VERIFICATION XP.AUDIT.LOGGING X X X X XP.INTERFACE.MANAGEMENT X XA.ACCESS.MANAGED XA.ADMIN.TRAINING XA.ADMIN.TRUST XA.USER.TRAINING XTable 20: Sufficiency of security objectivesThreats. Policies, andAssumptionsSummary Objectives and rationaleT.DOC.DIS User Document Datamay be disclosed tounauthorized personsO.DOC.NO_DIS protects D.DOCfrom unauthorized disclosureO.USER.AUTHORIZEDestablishes user identification andauthentication as the basis forauthorizationOE.USER.AUTHORIZEDestablishes responsibility of theTOE Owner to appropriately grantauthorization