
Cisco ISR-800 Security Target
5.3.7 Protection of the TSF (FPT) ................................................................................... 43
5.3.8 TOE Access (FTA) ................................................................................................. 44
5.3.9 Trusted Path/Channels (FTP) .................................................................................. 45
5.4 TOE SFR Dependencies Rationale for SFRs ................................................................. 45
5.5 Security Assurance Requirements .................................................................................. 46
5.5.1 SAR Requirements.................................................................................................. 46
5.5.2 Security Assurance Requirements Rationale .......................................................... 46
5.6 Assurance Measures ....................................................................................................... 47
6 TOE Summary Specification ................................................................................................ 48
6.1 TOE Security Functional Requirement Measures .......................................................... 48
7 Annex A: Key Zeroization .................................................................................................... 62
7.1 Key Zeroization .............................................................................................................. 62
8 Annex B: References ............................................................................................................. 64
Comentarios a estos manuales