Belkin F1DN108U - OmniView Secure KVM Switch Instrukcja Użytkownika Strona 11

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 14
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 10
11
7.6 Security Target
Document
Revision
Date
Belkin® OmniView™ Secure KVM Models: F1DN102U,
F1DN104U F1DN108U Security Target EAL4 augmented
ALC_FLR.3
1.1
February 17, 2009
7.7 Site Audit
Document
Revision
Date
Belkin Site Audit Master Checklist
1.0
February 2, 2009
This document was used to ascertain the details needed from the previous Site Audit and corresponding
checklists completed for VID 10183 in 2007.
8 IT Product Testing
This section describes the testing efforts of the Developer and the evaluation team.
8.1 Developer Testing
The test procedures were written by the Developer and designed to be conducted using manual
interaction with the TOE interfaces.
The Developer tested the TOE consistent with the Common Criteria evaluated configuration
identified in the ST. The Developer’s approach to testing is defined in the TOE Test Plan. The
expected and actual test results (ATRs) are also included in the TOE Test Plan. Each test case
was identified by a number that correlates to the expected test results in the TOE Test Plan.
The evaluation team analyzed the Developer’s testing to ensure adequate coverage for EAL 4.
The evaluation team determined that the Developer’s actual test results matched the Developer’s
expected test results.
8.2 Evaluation Team Independent Testing
Testing was not required for this re-evaluation. The Independent Test Plan and results from the
original evaluation were included in the re-evaluation.
The evaluation team used the Developer’s Test Plan as a basis for creating the Independent Test
Plan. The evaluation team analyzed the Developer’s test procedures to determine their relevance
and adequacy to test the security function under test. The following items represent a subset of
the factors considered in selecting the functional tests to be conducted:
Security functions that implement critical security features
Security functions critical to the TOE’s security objectives
Security functions that gave rise to suspicion regarding the behavior of the security
features during the documentation evidence evaluation
Security functions not tested adequately in the vendor’s test plan and procedures
Przeglądanie stron 10
1 2 ... 6 7 8 9 10 11 12 13 14

Komentarze do niniejszej Instrukcji

Brak uwag