Unverified Commit 9c912e87 authored by Aki Braun's avatar Aki Braun
Browse files

Reformat hanging paragraphs in clause 5

also deleted some old boilerplate from the main document
parent abe169b2
Loading
Loading
Loading
Loading
+22 −45
Original line number Diff line number Diff line
@@ -623,13 +623,8 @@ The different user types have varying needs that correspond directly to the secu

_Table C.1 — Security profiles mapped to risk factors_


Security profiles will be mapped to the security requirements necessary to mitigate them in a future draft.

### 4.6.3 Mapping of security profile to technical requirements and mitigations

| Mitigation            | SP-1 | SP-2 | SP-3 | SP-4 |
|---------------------|------|------|------|------|
|-----------------------|------|------|------|------|
| ROUT-1                | Y    | Y    | Y    | Y    |
| CONF-1                | Y    | Y    | Y    | Y    |
| CONF-2                | Y    | Y    | Y    | Y    |
@@ -651,25 +646,7 @@ Security profiles will be mapped to the security requirements necessary to mitig
| TRAF-1                | N    | N    | Y    | N    |
| TRAF-(1 or 2 & 3 & 4) | Y    | Y    | N    | Y    |

_Table 3 — Security profiles mapped to mitigations_

# Annex D (informative): Risk evaluation guidance

## D.1 Mapping of risks to requirements

> Table mapping the identified risks to requirements

## D.2 Risks not treated by the requirements

> If any risks are not treated by the normative requirements, describe non-normative suggestions to mitigate them.

## D.3 Risk acceptance criteria

> Describe how to decide if residual risks are tolerable.

## D.4 Residual risks

> Describe how to treat any residual risks, for example by documenting them or informing the user.
_Table C.2 — Security profiles mapped to mitigations_

# Annex L (informative): Relationship between the present document and the requirements of EU Regulation 2024/2847

+82 −48

File changed.

Preview size limit exceeded, changes collapsed.