Compliant Product - Xerox® AltaLink™ C8130, C8135, C8145, C8155, C8170 & B8145, B8155, B8170 with SSD
Certificate Date: 2021.08.20CC Certificate Security Target * Validation Report
Validation Report Number: CCEVS-VR-VID11149-2021
Product Type: Multi Function Device
Conformance Claim: Protection Profile Compliant
PP Identifier: Protection Profile for Hardcopy Devices Version 1.0
CC Testing Lab: Lightship Security USA, Inc.
* This is the Security Target (ST) associated with the latest Maintenance Release. To view previous STs for this TOE, click here.
Product is a multi-function device that copies and prints with scan and fax capabilities.
TOE evaluated configuration includes the Xerox® AltaLink™ C8030 / C8035 / C8045 / C8055 / C8075 with SSD running system software version: 111.011.000.27020 and 111.013.000.27020.
Security Evaluation Summary
The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the product meets the security requirements contained in the Security Target. The criteria against which the Xerox HCD was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1, Revision 5. Lightship Security USA determined that the product is conformant to requirements for Protection Profile for Hardcopy Devices, Version 1.0. The product satisfies all of the security functional requirements stated in the Security Target. Two validators, on behalf of the CCEVS Validation Body, monitored the evaluation carried out by Lightship Security USA. The evaluation was completed in August 2021 in Austin, Texas. Results of the evaluation can be found in the Xerox® AltaLinkTM C8130/C8135/C8145/C8155/C8170 & B8145/B8155/B8170 Assurance Activity Report, v0.4 prepared by Lightship Security USA.
The TOE logical boundary is comprised of the following security functions:
· Identification and Authentication
· Security Audit
· Access Control
· Security Management
· Trusted Operation
· Trusted Communication
· PSTN Fax-Network Separation
· Data Clearing and Purging