Loading EN-304-618.md +8 −8 Original line number Diff line number Diff line Loading @@ -2730,14 +2730,14 @@ purpose of this is to help identify missing technical security requirements.* | Secure updates | R16.1a; R16.1b; R16.2; R16.3; R16.4; | | Authentication and access control mechanisms | R1.1; R1.5a; R11.1; R11.2; R11.3; R11.4a; R12.1; R12.2a; R12.2b; | | Confidentiality protection | R2.1a; R2.5; R13.1; R13.2; R13.3; | | Integrity protection for data and configuration | | Data minimization | | | Availability protection | | | Minimize impact on other devices or services | | | Limit attack surface | | | Exploit mitigation by limiting incident impact | | Logging and monitoring mechanisms | | | Secure deletion and data transfer | | | Integrity protection for data and configuration | R2.2b; R9.1b; R9.4; R17.3; R17.4; | Data minimization | R13.4c; | | Availability protection | R14.1; R14.2a; R14.3; R14.4; | | Minimize impact on other devices or services | R8.1b; R8.3b; | | Limit attack surface | R3.4; R5.1; R18.2; | | Exploit mitigation by limiting incident impact | R4.2a; R4.2b; R5.2b; R6.5; R9.2; R9.3; | Logging and monitoring mechanisms | R4.5; R5.3; R15.1; R15.2; R15.3a; R15.3b; R15.4a; | | Secure deletion and data transfer | R4.3; R13.4a; R13.4b; R13.4c; | ## Compliance Mapping to CRA Annex I (Daniel's sketch with commentary) Loading Loading
EN-304-618.md +8 −8 Original line number Diff line number Diff line Loading @@ -2730,14 +2730,14 @@ purpose of this is to help identify missing technical security requirements.* | Secure updates | R16.1a; R16.1b; R16.2; R16.3; R16.4; | | Authentication and access control mechanisms | R1.1; R1.5a; R11.1; R11.2; R11.3; R11.4a; R12.1; R12.2a; R12.2b; | | Confidentiality protection | R2.1a; R2.5; R13.1; R13.2; R13.3; | | Integrity protection for data and configuration | | Data minimization | | | Availability protection | | | Minimize impact on other devices or services | | | Limit attack surface | | | Exploit mitigation by limiting incident impact | | Logging and monitoring mechanisms | | | Secure deletion and data transfer | | | Integrity protection for data and configuration | R2.2b; R9.1b; R9.4; R17.3; R17.4; | Data minimization | R13.4c; | | Availability protection | R14.1; R14.2a; R14.3; R14.4; | | Minimize impact on other devices or services | R8.1b; R8.3b; | | Limit attack surface | R3.4; R5.1; R18.2; | | Exploit mitigation by limiting incident impact | R4.2a; R4.2b; R5.2b; R6.5; R9.2; R9.3; | Logging and monitoring mechanisms | R4.5; R5.3; R15.1; R15.2; R15.3a; R15.3b; R15.4a; | | Secure deletion and data transfer | R4.3; R13.4a; R13.4b; R13.4c; | ## Compliance Mapping to CRA Annex I (Daniel's sketch with commentary) Loading