Workcentre 58Xxi-58XX Connectkey
Total Page:16
File Type:pdf, Size:1020Kb
ConnectKey 2.0 WorkCentre 5865i/5875i/5890i 5845/5855/5865/5875/5890 Information Assurance Disclosure Version 1.0 ©2016 Xerox Corporation. All rights reserved. Xerox and the sphere of connectivity design are trademarks of Xerox Corporation in the United States and/or other counties. Other company trademarks are also acknowledged. Document Version: 1.0 (April 2016) ConnectKey 2.0 WorkCentre 58XXi/58XX Information Assurance Disclosure 1. INTRODUCTION ..................................................................................................... 4 1.1. Purpose ........................................................................................................................................................ 4 1.2. Target Audience ......................................................................................................................................... 4 1.3. Disclaimer .................................................................................................................................................... 4 2. DEVICE DESCRIPTION .......................................................................................... 5 2.1. Security-relevant Subsystems ............................................................................................................... 6 2.1.1. Physical Partitioning .................................................................................................................................... 6 2.1.2. Security Functions allocated to Subsystems ........................................................................................... 7 2.2. Controller ..................................................................................................................................................... 7 2.2.1. Purpose ......................................................................................................................................................... 7 2.2.2. Memory Components .................................................................................................................................. 8 2.2.3. External Connections ................................................................................................................................ 10 2.2.4. USB Ports .................................................................................................................................................... 11 2.3. Fax Module ................................................................................................................................................ 12 2.3.1. Purpose ....................................................................................................................................................... 12 2.3.2. Hardware ..................................................................................................................................................... 12 2.4. Scanner ...................................................................................................................................................... 13 2.4.1. Purpose ....................................................................................................................................................... 13 2.4.2. Hardware ..................................................................................................................................................... 13 2.5. Graphical User Interface (GUI) ............................................................................................................. 13 2.5.1. Purpose ....................................................................................................................................................... 13 2.6. Marking Engine (Image Output Terminal or IOT) ............................................................................. 13 2.6.1. Purpose ....................................................................................................................................................... 13 2.6.2. Hardware ..................................................................................................................................................... 13 2.7. System Software Structure ................................................................................................................... 14 2.7.1. Open-source components ........................................................................................................................ 14 2.7.2. Operating System Layer in the Controller .............................................................................................. 15 2.7.3. Network Protocols ...................................................................................................................................... 16 2.8. Logical Access ......................................................................................................................................... 17 2.8.1. Network Security ........................................................................................................................................ 17 2.8.2. Ports ............................................................................................................................................................. 18 3. SYSTEM ACCESS ................................................................................................ 25 3.1. Authentication Model .............................................................................................................................. 25 3.2. Login and Authentication Methods ..................................................................................................... 27 3.2.1. System Administrator Login [All product configurations] ...................................................................... 27 3.2.2. User authentication .................................................................................................................................... 27 3.3. System Accounts ..................................................................................................................................... 32 Ver. 1.0, April 2016 Page 2 of 62 ConnectKey 2.0 WorkCentre 58XXi/58XX Information Assurance Disclosure 3.3.1. Printing ......................................................................................................................................................... 32 3.3.2. Network Scanning ...................................................................................................................................... 32 4. SECURITY ASPECTS OF SELECTED FEATURES ............................................ 34 4.1. McAfee Enhanced Security / Integrity Control ................................................................................. 34 4.1.1 Enhanced Security ..................................................................................................................................... 34 4.1.2 Integrity Control (Optional Feature) ......................................................................................................... 34 4.1.3 ePolicy Orchestrator .................................................................................................................................. 35 4.2. Audit Log .................................................................................................................................................... 36 4.2.1 Device Audit Log ........................................................................................................................................... 36 4.2.2 Device Protocol Log ....................................................................................................................................... 36 4.2.3 Audit Log file format ...................................................................................................................................... 36 4.3. Xerox Standard Accounting .................................................................................................................. 47 4.4. User Permissions Role Based Access Control (RBAC) ................................................................ 49 4.5. SMart eSolutions ...................................................................................................................................... 50 4.6. Encrypted Partitions ............................................................................................................................... 50 4.7. Image Overwrite ....................................................................................................................................... 51 4.7.1. Algorithm ..................................................................................................................................................... 51 4.7.2. User Behavior ............................................................................................................................................. 51 4.7.3. Overwrite Timing ........................................................................................................................................ 52 4.7.4. Overwrite Completion Reporting .............................................................................................................. 52 4.8. FIPS ............................................................................................................................................................