Commit 691285c6 authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Reference operational environment

parent 9ce42a58
Loading
Loading
Loading
Loading
+2 −3
Original line number Diff line number Diff line
@@ -831,9 +831,8 @@ Both natural users, machine users, or equivalent structures shall be assigned ro

The product can serve traffic that is not meant to be identified.
For example, an in-home router often trusts that the physical access to its port is enough to identify the subscriber line.
In addition, the managed device can have a configuration port, management API, firmware update channel, or debugging access, which are classified as privileged. [NOTE: Repeats above]

[NOTE: I am unsure is the above text should be here at all - while useful it is descriptive of the nature of identity managment practices rather then providing requirements for products? Should this be in another section e.g. functions or architecture?]
In addition, the managed device can have a configuration port, management API, firmware update channel, or debugging access, which are classified as privileged.
The operative context is described in more datail in the section [4.8 Operational Environment](#48-operational-environment).

- **[REQ-AUTH-3]:** When a user or system identity has been authenticated, the product shall apply authorisation controls based on assigned roles or equivalent access-control attributes.
- **[REQ-AUTH-4]:** The authorisation model shall enforce separation of privileges appropriate to the intended and reasonably foreseeable use of the product.