
Cisco Intrusion Prevention System Security Target
3 SECURITY PROBLEM DEFINITION
This chapter identifies the following:
Significant assumptions about the TOE’s operational environment.
IT related threats to the organization countered by the TOE.
Environmental threats requiring controls to provide sufficient protection.
Organizational security policies for the TOE as appropriate.
This document identifies assumptions as A.assumption with “assumption” specifying a unique
name. Threats are identified as T.threat with “threat” specifying a unique name.
3.1 Assumptions
The specific conditions listed in the following subsections are assumed to exist in the TOE’s
environment. These assumptions include both practical realities in the development of the TOE
security requirements and the essential environmental conditions on the use of the TOE.
Table 8: TOE Assumptions
Reproduced from the U.S. Government Protection Profile for Security Requirements for Network Devices
It is assumed that there are no general-purpose computing capabilities
(e.g., compilers or user applications) available on the TOE, other than
those services necessary for the operation, administration and support of
the TOE.
Physical security, commensurate with the value of the TOE and the data
it contains, is assumed to be provided by the environment.
TOE Administrators are trusted to follow and apply all administrator
guidance in a trusted manner.
Comentarios a estos manuales