@@ -2748,6 +2748,8 @@ purpose of this is to help identify missing technical security requirements.*
| Audit Logging | Part I, 2(a) - Security event logging | HIGH |
| Update Mechanism | Part I, 2(b) - Security updates | HIGH |
| Vulnerability Management | Part II, 1 - Vulnerability handling | MEDIUM : :
# Annex ZB (informative: Mapping between the present document and the Standardisation Request C(2025)618 under the Cyber Resilience Act)
*Table mapping technical security requirements from Section 5 of the present document to the essential cybersecurity requirements listed in the Standardisation Request C(2025)618, Annex II. This mapping supports the demonstration of alignment with the requirements set out in Annex I of the Cyber Resilience Act.*
@@ -2768,6 +2770,8 @@ purpose of this is to help identify missing technical security requirements.*
| Logging and monitoring (CRA Annex I §2(l)) | R4.5; R5.3; R15.1; R15.2; R15.3a; R15.3b; R15.4a |
| Secure deletion and data transfer (CRA Annex I §2(m)) | R4.3; R13.4a; R13.4b; R13.4c |
# Annex C (informative): Relationship between the present document and any related ETSI standards (if any)
*List any related ETSI standards and how they interact with the present