Xerox Versant 180 Press Manual Keamanan - Halaman 22
Jelajahi secara online atau unduh pdf Manual Keamanan untuk Printer Xerox Versant 180 Press. Xerox Versant 180 Press 45 halaman. Quick reference for printing extra large sheets (xls) on the ex 180 and ex-i 180 print servers, powered by fiery
Juga untuk Xerox Versant 180 Press: Referensi Cepat (6 halaman), Referensi Cepat (2 halaman)
Xerox® Security Guide for Entry Production Color Class Products
Pre-Boot Security
BIOS
The BIOS used in Versant® and ColorPress® products is embedded and cannot be accessed directly.
Unlike devices such as Desktop and Laptop computers that have a BIOS that can be accessed via a
keystroke on startup, the BIOS of Versant® and ColorPress® products is not accessible.
Many devices can be cleared to factory defaults (including passwords and security settings) by
depressing a reset button using a paperclip or similar method. For security reasons, ColorPress® and
Versant® products do not offer such a method to clear or reset the BIOS. Note that configuration settings
may be reset to factory defaults by an authorized administrator, however this does not impact BIOS
settings.
BIOS updates are applied by device firmware updates. Firmware is protected from tampering by use of
digital signatures (discussed later in this section).
The BIOS is designed to fail secure. An integrity check is performed immediately when power is applied.
If verification is successful, the system proceeds with OS kernel boot. If the integrity check fails, the
system will fail secure.
Embedded Encryption
AES encryption is used to protect the system, user data, and configuration (including security settings)
from being retrieved or modified. Each device uses its own unique key that is securely generated.
Encryption is enabled by default. Media encryption and sanitization are discussed in Section
Protection.
Boot Process Security
Firmware Integrity
Unlike open operating systems such as servers and user workstations in which software may be installed
by users, Xerox products are based on embedded systems and the contents are managed by Xerox. The
only means of modifying the contents of a device is by applying a firmware update package.
Firmware updates use a special format and each firmware update is digitally signed to protect the
integrity of the contents. Firmware that is corrupt or has been illicitly modified will be rejected. This
security control cannot be disabled.
ColorPress® and Versant® products include a built-in firmware software validation. This is a file integrity
monitor that compares the security hashes of currently installed firmware to a secured whitelist that was
installed when the signed firmware was installed.
Event Monitoring & Logging
Audit Log
The Audit Log feature records security-related events. The Audit Log contains the following information:
Field
Description
Index
A unique value that identifies the event.
Date
The date that the event happened in mm/dd/yy format.
March 2019
2 User Data
Page 4-20