Loading EN-304-620-1.md +22 −45 Original line number Diff line number Diff line Loading @@ -623,13 +623,8 @@ The different user types have varying needs that correspond directly to the secu _Table C.1 — Security profiles mapped to risk factors_ Security profiles will be mapped to the security requirements necessary to mitigate them in a future draft. ### 4.6.3 Mapping of security profile to technical requirements and mitigations | Mitigation | SP-1 | SP-2 | SP-3 | SP-4 | |---------------------|------|------|------|------| |-----------------------|------|------|------|------| | ROUT-1 | Y | Y | Y | Y | | CONF-1 | Y | Y | Y | Y | | CONF-2 | Y | Y | Y | Y | Loading @@ -651,25 +646,7 @@ Security profiles will be mapped to the security requirements necessary to mitig | TRAF-1 | N | N | Y | N | | TRAF-(1 or 2 & 3 & 4) | Y | Y | N | Y | _Table 3 — Security profiles mapped to mitigations_ # Annex D (informative): Risk evaluation guidance ## D.1 Mapping of risks to requirements > Table mapping the identified risks to requirements ## D.2 Risks not treated by the requirements > If any risks are not treated by the normative requirements, describe non-normative suggestions to mitigate them. ## D.3 Risk acceptance criteria > Describe how to decide if residual risks are tolerable. ## D.4 Residual risks > Describe how to treat any residual risks, for example by documenting them or informing the user. _Table C.2 — Security profiles mapped to mitigations_ # Annex L (informative): Relationship between the present document and the requirements of EU Regulation 2024/2847 Loading clauses/5.Requirements.md +82 −48 File changed.Preview size limit exceeded, changes collapsed. Show changes Loading
EN-304-620-1.md +22 −45 Original line number Diff line number Diff line Loading @@ -623,13 +623,8 @@ The different user types have varying needs that correspond directly to the secu _Table C.1 — Security profiles mapped to risk factors_ Security profiles will be mapped to the security requirements necessary to mitigate them in a future draft. ### 4.6.3 Mapping of security profile to technical requirements and mitigations | Mitigation | SP-1 | SP-2 | SP-3 | SP-4 | |---------------------|------|------|------|------| |-----------------------|------|------|------|------| | ROUT-1 | Y | Y | Y | Y | | CONF-1 | Y | Y | Y | Y | | CONF-2 | Y | Y | Y | Y | Loading @@ -651,25 +646,7 @@ Security profiles will be mapped to the security requirements necessary to mitig | TRAF-1 | N | N | Y | N | | TRAF-(1 or 2 & 3 & 4) | Y | Y | N | Y | _Table 3 — Security profiles mapped to mitigations_ # Annex D (informative): Risk evaluation guidance ## D.1 Mapping of risks to requirements > Table mapping the identified risks to requirements ## D.2 Risks not treated by the requirements > If any risks are not treated by the normative requirements, describe non-normative suggestions to mitigate them. ## D.3 Risk acceptance criteria > Describe how to decide if residual risks are tolerable. ## D.4 Residual risks > Describe how to treat any residual risks, for example by documenting them or informing the user. _Table C.2 — Security profiles mapped to mitigations_ # Annex L (informative): Relationship between the present document and the requirements of EU Regulation 2024/2847 Loading
clauses/5.Requirements.md +82 −48 File changed.Preview size limit exceeded, changes collapsed. Show changes