
Cisco Intrusion Prevention System Security Target
4.3.2 Justification of tracing
The justification demonstrates that the tracing of the security objectives to assumptions, threats,
and OSPs is effective and all the given assumptions are upheld, all the given threats are
countered, and all the given OSPs are enforced.
4.3.2.1 Tracing of assumptions
Table 14: Assumption Rationale
This security objective is necessary to address the assumption
A.NO_GENERAL_PURPOSE by ensuring there are no general-purpose
computing capabilities (e.g., the ability to execute arbitrary code or
applications) capabilities on the TOE.
This security objective is necessary to address the assumption
A.PHYSICAL by ensuring the TOE and the data it contains is physically
protected from unauthorized access.
This security objective is necessary to address the assumption
A.TRUSTED_ADMIN by ensuring the administrators are non-hostile and
follow all administrator guidance
4.3.2.2 Tracing of threats and OSPs
Table 15: Threat and OSP Rationale
Security Objectives Drawn from NDPP
O.PROTECTED_COMMUNICA
TIONS
This security objective is necessary to counter the threat: T.TRANSMIT to
ensure the communications with the TOE is not compromised
Comentarios a estos manuales