
Aruba Networks Security Target
Page 18 of 67
5 Security Requirements
5.1 Conventions
31 This document uses the following font conventions to identify the operations defined
by the CC:
a) Assignment. Indicated with italicized text.
b) Refinement. Indicated with bold text and strikethroughs.
c) Selection. Indicated with underlined text.
d) Assignment within a Selection: Indicated with italicized and underlined text.
e) Iteration. Indicated by appending the iteration number in parenthesis, e.g.,
(1), (2), (3).
32 Operations specified by the NDPP (that are not specified by CC Part 2) are also
identified using the above convention.
33 Explicitly stated SFRs are identified by having a label ‘EXT’ after the requirement
name for TOE SFRs.
34 Application notes from the NDPP have not been reproduced except where their
inclusion aids the ST reader in understanding the SFRs.
5.2 Extended Components Definition
35 Table 9 identifies the extended components which are incorporated into this ST. All
components are reproduced directly from the NDPP and therefore no further
definition is provided in this document.
Table 9: Extended Components
External Audit Trail Storage
Cryptographic Key Zeroization
Cryptographic Operation (Random Bit Generation)
User Identification and Authentication
Password-based Authentication Mechanism
Protection of TSF Data (for reading of all symmetric keys)
Protection of Administrator Passwords
Commenti su questo manuale