
McAfee Email Gateway
Security Target
Page 21 of 61
3 TOE Security Problem Definition
The TOE is intended to be used either in environments in which, at most, sensitive but unclassified
information is processed, or the sensitivity level of information in both the internal and external networks is
equivalent.
This section contains assumptions regarding the security environment and the intended usage of the TOE
and threats on the TOE and the IT environment.
3.1 Assumptions
The assumptions are taken from [NDPP].
Short name Assumption
A.NO_GENERAL_PURPOSE It is assumed that there are no general-purpose
computing capabilities (e.g., compilers or user
applications) available on the TOE, other than
those services necessary for the operation,
administration and support of the TOE.
A.PHYSICAL Physical security, commensurate with the value
of the TOE and the data it contains, is assumed
to be provided by the environment.
A.TRUSTED_ADMIN TOE Administrators are trusted to follow and
apply all administrator guidance in a trusted
manner.
Table 6 - Assumptions
3.2 Threats
The TOE or environment addresses the threats identified in this section. The primary assets to be
protected are the integrity and availability of the resources and traffic on a network. There is also the
concept of the network resources being used in line with organizational policy. The threat agents are
authorized persons/processes, unauthorized persons/processes, or external IT entities not authorized to
use the TOE itself. The threats identified assume that the threat agent is a person with a basic attack
potential who possesses an average expertise, few resources, and low to moderate motivation.
The threats are taken from [NDPP].
Threat Name Threat Definition
T.ADMIN_ERROR An administrator may unintentionally install or
configure the TOE incorrectly, resulting in ineffective
Kommentare zu diesen Handbüchern