HCD PP security requirements | Machine functions meeting the requirements |
Preventing unauthorized access using user authentication and user information management | Authentication Application (User Authentication) User authentication is performed using the user name and password registered for each user, and the privileges (roles) and other user information are managed. Authenticating Users and Managing Groups |
Management of accessed content and restriction of operations for individual users | ACCESS MANAGEMENT SYSTEM Access to functions is controlled on an individual basis by assigning usable functions to each user. For details, see the manual of ACCESS MANAGEMENT SYSTEM at the online manual site. |
Logging and monitoring security-related user operations with an audit log*1 | Generating and Exporting Audit Log The machine records a user authentication log and job log. These logs can be exported and sent to an SIEM system. Management of Logs |
Protection of data and confidential information stored in storage*2 | Storage Data Encryption Data in the storage space such as Mail Box, registered data in the Address Book, password information, and other storage data are encrypted and saved. Protecting Data on the Machine |
Protection of network data using encrypted communication | IPSec The data portion of IP packets is encrypted to protect the data sent and received over IP networks from threats. Using IPSec |
Self-verification of security functions | IPSec The encryption module is self-tested when the machine is started. |