# Annex ZA (informative): Mapping between the present document and CRA requirements
*Table mapping technical security requirements from Section 5 of the present
document to essential cybersecurity requirements in Annex I of the CRA. The
purpose of this is to help identify missing technical security requirements.*
@@ -2749,6 +2748,25 @@ purpose of this is to help identify missing technical security requirements.*
| Audit Logging | Part I, 2(a) - Security event logging | HIGH |
| Update Mechanism | Part I, 2(b) - Security updates | HIGH |
| Vulnerability Management | Part II, 1 - Vulnerability handling | MEDIUM : :
# Annex ZB (informative:Mapping between the present document and the Standardisation Request C(2025)618 under the Cyber Resilience Act)
*Table mapping technical security requirements from Section 5 of the present document to the essential cybersecurity requirements listed in the Standardisation Request C(2025)618, Annex II. This mapping supports the demonstration of alignment with the requirements set out in Annex I of the Cyber Resilience Act.*