Cisco Cat4K NDPP ST
EDCS-1228241
Asset
The data which is provided by the TOE during security audit
logging.
Security properties to be maintained by the TOE: confidentiality,
availability, integrity.
3.3.2 Secondary Assets
The owner of the TOE presumably places value upon the following secondary entities.
All these secondary assets represent user data in the sense of the CC.
Asset
Auth data
Secondary asset, TSF data
The data which is used by the TOE to identify and authenticate the
external entities which interact with the TOE.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Crypto data
Secondary asset, TSF data
The data which is used by the TOE for digital signature handling and
encryption/decryption purposes.
Security properties to be maintained by the TOE: confidentiality,
integrity, authenticity.
Ctrl data
Secondary asset, TSF data
The data which is used by the TOE for firmware updates, firmware
registration, and firmware identity checking purposes.
Security properties to be maintained by the TOE: availability,
integrity.
3.4 Assumptions
The specific conditions listed in the following subsections are assumed to exist in the
TOE's environment. These assumptions include both practical realities in the
development of the TOE security requirements and the essential environmental
conditions on the use of the TOE.
Assumption
A.NO_GENERAL_PURPOSE It is assumed that there are no general-purpose
Asset Description
Table 9 Secondary assets to be protected
Asset Description
Table 10 Operational Assumptions
computing capabilities (e.g., compilers or user
applications) available on the TOE, other than
33
Assumption Definition
11 March 2014