Commit c3ba8c37 authored by Cesare Marzo's avatar Cesare Marzo
Browse files

Update file EN-304-618.md

parent b96a3219
Loading
Loading
Loading
Loading
+5 −1
Original line number Diff line number Diff line
@@ -2748,6 +2748,8 @@ purpose of this is to help identify missing technical security requirements.*
| Audit Logging        | Part I, 2(a) - Security event logging     | HIGH                    |
| Update Mechanism     | Part I, 2(b) - Security updates   | HIGH                    |
| Vulnerability Management       | Part II, 1 - Vulnerability handling | MEDIUM                  :                         :


# Annex ZB (informative:  Mapping between the present document and the Standardisation Request C(2025)618 under the Cyber Resilience Act) 

*Table mapping technical security requirements from Section 5 of the present document to the essential cybersecurity requirements listed in the Standardisation Request C(2025)618, Annex II. This mapping supports the demonstration of alignment with the requirements set out in Annex I of the Cyber Resilience Act.*
@@ -2768,6 +2770,8 @@ purpose of this is to help identify missing technical security requirements.*
|   Logging and monitoring (CRA Annex I §2(l))               |    R4.5; R5.3; R15.1; R15.2; R15.3a; R15.3b; R15.4a                      |
|    Secure deletion and data transfer (CRA Annex I §2(m))               |  R4.3; R13.4a; R13.4b; R13.4c                        |



# Annex C (informative): Relationship between the present document and any related ETSI standards (if any)

*List any related ETSI standards and how they interact with the present