Commit 457cb660 authored by Cesare Marzo's avatar Cesare Marzo
Browse files

Update file EN-304-618.md

parent 963a26c0
Loading
Loading
Loading
Loading
+2 −31
Original line number Diff line number Diff line
@@ -2083,35 +2083,6 @@ Unprotected or unreliable time source mechanisms.
-   **R19.3**: SHALL maintain monotonic clock for security events
-   **R19.4**: SHALL implement time synchronization monitoring

### Capability

Cryptographically secure random password generation with configurable
parameters.

### Condition

Password generator using predictable or weak randomness sources.

### Threat

-   **T7.1**: Predictable password generation enabling pre-computation attacks
-   **T7.2**: Insufficient entropy in generated passwords
-   **T7.3**: Side-channel leakage of generation parameters
-   **T7.4**: Compromise of random number generator state

### Risk

**MEDIUM** - Weak password generation undermines security premise. Likelihood
depends on implementation quality.

### Requirement

-   **R7.1**: SHALL use cryptographically secure random number generator (CSRNG)
-   **R7.2**: SHALL provide minimum 128 bits of entropy for generated passwords
-   **R7.3**: SHALL allow user-defined generation parameters
-   **R7.4**: SHALL implement secure random seed initialization
-   **R7.5**: SHALL NOT store or log generated passwords before user acceptance

# Annex A: Risk Assessment for Deployment Models

## Annex A.1: Local Password Manager Risk Assessment
@@ -2758,7 +2729,7 @@ purpose of this is to help identify missing technical security requirements.*
| Secure by default configuration         | R18.1a; R18.2; R18.3;                                   |
| Secure updates                          |   R16.1a; R16.1b; R16.2; R16.3; R16.4;                                 |
| Authentication and access control mechanisms       |   R1.1; R1.5a; R11.1;  R11.2;	 R11.3;	 R11.4a;	 R12.1;	 R12.2a;	 R12.2b;                                  |
| Confidentiality protection              |       |
| Confidentiality protection              | R2.1a;   R2.5;	 R13.1;	 R13.2;	 R13.3;  |
| Integrity protection for data and configuration | 
| Data minimization                       |                                    |
| Availability protection                 |                                    |