Contents
November 2022 CC:2022 Page v of 297
11.4 Data authentication (FDP_DAU)............................................................................................ 64
11.4.1 Family behaviour .................................................................................................................................................. 64
11.4.2 Components leveling and description ......................................................................................................... 64
11.4.3 Management of FDP_DAU.1, FDP_DAU.2 .................................................................................................... 65
11.4.4 Audit of FDP_DAU.1 .............................................................................................................................................. 65
11.4.5 Audit of FDP_DAU.2 .............................................................................................................................................. 65
11.4.6 FDP_DAU.1 Basic Data Authentication ........................................................................................................ 65
11.4.7 FDP_DAU.2 Data Authentication with Identity of Guarantor ............................................................ 65
11.5 Export from the TOE (FDP_ETC) ........................................................................................... 66
11.5.1 Family behaviour .................................................................................................................................................. 66
11.5.2 Components leveling and description ......................................................................................................... 66
11.5.3 Management of FDP_ETC.1 ............................................................................................................................... 66
11.5.4 Management of FDP_ETC.2 ............................................................................................................................... 66
11.5.5 Audit of FDP_ETC.1, FDP_ETC.2 ...................................................................................................................... 66
11.5.6 FDP_ETC.1 Export of user data without security attributes .............................................................. 66
11.5.7 FDP_ETC.2 Export of user data with security attributes ..................................................................... 67
11.6 Information flow control policy (FDP_IFC) ....................................................................... 67
11.6.1 Family behaviour .................................................................................................................................................. 67
11.6.2 Components leveling and description ......................................................................................................... 68
11.6.3 Management of FDP_IFC.1, FDP_IFC.2 ......................................................................................................... 68
11.6.4 Audit of FDP_IFC.1, FDP_IFC.2 ......................................................................................................................... 68
11.6.5 FDP_IFC.1 Subset information flow control .............................................................................................. 68
11.6.6 FDP_IFC.2 Complete information flow control ........................................................................................ 68
11.7 Information flow control functions (FDP_IFF) ................................................................ 69
11.7.1 Family behaviour .................................................................................................................................................. 69
11.7.2 Components leveling and description ......................................................................................................... 69
11.7.3 Management of FDP_IFF.1, FDP_IFF.2.......................................................................................................... 69
11.7.4 Management of FDP_IFF.3, FDP_IFF.4, FDP_IFF.5 .................................................................................. 70
11.7.5 Management of FDP_IFF.6 ................................................................................................................................. 70
11.7.6 Audit of FDP_IFF.1, FDP_IFF.2, FDP_IFF.5 .................................................................................................. 70
11.7.7 Audit of FDP_IFF.3, FDP_IFF.4, FDP_IFF.6 .................................................................................................. 70
11.7.8 FDP_IFF.1 Simple security attributes ........................................................................................................... 70
11.7.9 FDP_IFF.2 Hierarchical security attributes ................................................................................................ 71
11.7.10 FDP_IFF.3 Limited illicit information flows ............................................................................................... 72
11.7.11 FDP_IFF.4 Partial elimination of illicit information flows ................................................................... 72
11.7.12 FDP_IFF.5 No illicit information flows ......................................................................................................... 72
11.7.13 FDP_IFF.6 Illicit information flow monitoring ......................................................................................... 72
11.8 Information Retention Control (FDP_IRC) ........................................................................ 73
11.8.1 Family behaviour .................................................................................................................................................. 73
11.8.2 Components leveling and description ......................................................................................................... 73
11.8.3 Management of FDP_IRC.1 ................................................................................................................................ 74
11.8.4 Audit of FDP_IRC.1 ................................................................................................................................................ 74
11.8.5 FDP_IRC.1 Information retention control .................................................................................................. 74
11.9 Import from outside of the TOE (FDP_ITC) ....................................................................... 74
11.9.1 Family behaviour .................................................................................................................................................. 74
11.9.2 Components leveling and description ......................................................................................................... 74
11.9.3 Management of FDP_ITC.1, FDP_ITC.2 ......................................................................................................... 75
11.9.4 Audit of FDP_ITC.1, FDP_ITC.2 ........................................................................................................................ 75
11.9.5 FDP_ITC.1 Import of user data without security attributes ............................................................... 75
11.9.6 FDP_ITC.2 Import of user data with security attributes ...................................................................... 75
11.10 Internal TOE transfer (FDP_ITT) .......................................................................................... 76
11.10.1 Family behaviour .................................................................................................................................................. 76
11.10.2 Components leveling and description ......................................................................................................... 76
11.10.3 Management of FDP_ITT.1, FDP_ITT.2 ........................................................................................................ 76