Loading EN-304-621.md +10 −9 Original line number Diff line number Diff line Loading @@ -524,6 +524,8 @@ General requirements: - **[REQ-TECH-2]** Administrative actions shall be traced. - **[REQ-TECH-3]** A secure channel is used in transport. - **[REQ-TECH-4]** Cryptographic keys can be changed. - **[REQ-TECH-5]** All system components are synchronized to the same time. - **[REQ-TECH-6]** All system clocks are monitored. | Requirement | Assesment | | ---------------- | ------------------------------------------------------------------------------------------------------------ | Loading @@ -532,6 +534,8 @@ General requirements: | **[REQ-TECH-2]** | Actions are recorded and can not be modified later. | | **[REQ-TECH-3]** | See [5.2.1 Secure channel definition](#521-secure-channel-definition). | | **[REQ-TECH-4]** | See [5.2.2 Cryptographic key intialization and rotation](#522-cryptographic-key-intialization-and-rotation). | | **[REQ-TECH-5]** | | | **[REQ-TECH-6]** | | ### 5.2.1 Secure channel definition Loading Loading @@ -669,13 +673,11 @@ Unwanted traffic in the interfaces can cause a denial of service from the manage <mark>AMS: Luka and Bruno are working on this. Skip for now.</mark> - **[REQ-LOG-0]** All system components are synchronized to a same time. - **[REQ-LOG-1]** From the system perspective, logs and traces are stored into a write only service or endpoint. - **[REQ-LOG-2]** The write only log or tracing storage is deployed outside of the system deployment context. - **[REQ-LOG-3]** NMS emits SIEM events from relevant changes. - **[REQ-LOG-4]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation. - **[REQ-LOG-5]** All system clocks are monitored. - **[REQ-LOG-6]** Deviation in clock consistency is reported forward as a SIEM event. - **[REQ-LOG-0]** From the system perspective, logs and traces are stored into a write only service or endpoint. - **[REQ-LOG-1]** The write only log or tracing storage is deployed outside of the system deployment context. - **[REQ-LOG-2]** NMS emits SIEM events from relevant changes. - **[REQ-LOG-3]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation. - **[REQ-LOG-4]** Deviation in clock consistency is reported forward as a SIEM event. <mark>Should this be in monitoring?</mark> Manfacturer shall implement logging system features listed in the table below. Loading @@ -687,8 +689,7 @@ Manfacturer shall implement logging system features listed in the table below. | [REQ-LOG-2] | Not required | Required | | [REQ-LOG-3] | Not required | Required | | [REQ-LOG-4] | Not required | Required | | [REQ-LOG-5] | Not required | Required | | [REQ-LOG-6] | Not required | Required | ### 5.3.x Monitoring Loading Loading
EN-304-621.md +10 −9 Original line number Diff line number Diff line Loading @@ -524,6 +524,8 @@ General requirements: - **[REQ-TECH-2]** Administrative actions shall be traced. - **[REQ-TECH-3]** A secure channel is used in transport. - **[REQ-TECH-4]** Cryptographic keys can be changed. - **[REQ-TECH-5]** All system components are synchronized to the same time. - **[REQ-TECH-6]** All system clocks are monitored. | Requirement | Assesment | | ---------------- | ------------------------------------------------------------------------------------------------------------ | Loading @@ -532,6 +534,8 @@ General requirements: | **[REQ-TECH-2]** | Actions are recorded and can not be modified later. | | **[REQ-TECH-3]** | See [5.2.1 Secure channel definition](#521-secure-channel-definition). | | **[REQ-TECH-4]** | See [5.2.2 Cryptographic key intialization and rotation](#522-cryptographic-key-intialization-and-rotation). | | **[REQ-TECH-5]** | | | **[REQ-TECH-6]** | | ### 5.2.1 Secure channel definition Loading Loading @@ -669,13 +673,11 @@ Unwanted traffic in the interfaces can cause a denial of service from the manage <mark>AMS: Luka and Bruno are working on this. Skip for now.</mark> - **[REQ-LOG-0]** All system components are synchronized to a same time. - **[REQ-LOG-1]** From the system perspective, logs and traces are stored into a write only service or endpoint. - **[REQ-LOG-2]** The write only log or tracing storage is deployed outside of the system deployment context. - **[REQ-LOG-3]** NMS emits SIEM events from relevant changes. - **[REQ-LOG-4]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation. - **[REQ-LOG-5]** All system clocks are monitored. - **[REQ-LOG-6]** Deviation in clock consistency is reported forward as a SIEM event. - **[REQ-LOG-0]** From the system perspective, logs and traces are stored into a write only service or endpoint. - **[REQ-LOG-1]** The write only log or tracing storage is deployed outside of the system deployment context. - **[REQ-LOG-2]** NMS emits SIEM events from relevant changes. - **[REQ-LOG-3]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation. - **[REQ-LOG-4]** Deviation in clock consistency is reported forward as a SIEM event. <mark>Should this be in monitoring?</mark> Manfacturer shall implement logging system features listed in the table below. Loading @@ -687,8 +689,7 @@ Manfacturer shall implement logging system features listed in the table below. | [REQ-LOG-2] | Not required | Required | | [REQ-LOG-3] | Not required | Required | | [REQ-LOG-4] | Not required | Required | | [REQ-LOG-5] | Not required | Required | | [REQ-LOG-6] | Not required | Required | ### 5.3.x Monitoring Loading