Commit b1913a70 authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Changes from the meeting

parent c95656d5
Loading
Loading
Loading
Loading
+10 −9
Original line number Diff line number Diff line
@@ -524,6 +524,8 @@ General requirements:
-   **[REQ-TECH-2]** Administrative actions shall be traced.
-   **[REQ-TECH-3]** A secure channel is used in transport.
-   **[REQ-TECH-4]** Cryptographic keys can be changed.
-   **[REQ-TECH-5]** All system components are synchronized to the same time.
-   **[REQ-TECH-6]** All system clocks are monitored.

| Requirement      | Assesment                                                                                                    |
| ---------------- | ------------------------------------------------------------------------------------------------------------ |
@@ -532,6 +534,8 @@ General requirements:
| **[REQ-TECH-2]** | Actions are recorded and can not be modified later.                                                          |
| **[REQ-TECH-3]** | See [5.2.1 Secure channel definition](#521-secure-channel-definition).                                       |
| **[REQ-TECH-4]** | See [5.2.2 Cryptographic key intialization and rotation](#522-cryptographic-key-intialization-and-rotation). |
| **[REQ-TECH-5]** |                                                                                                              |
| **[REQ-TECH-6]** |                                                                                                              |

### 5.2.1 Secure channel definition

@@ -669,13 +673,11 @@ Unwanted traffic in the interfaces can cause a denial of service from the manage

<mark>AMS: Luka and Bruno are working on this. Skip for now.</mark>

-   **[REQ-LOG-0]** All system components are synchronized to a same time.
-   **[REQ-LOG-1]** From the system perspective, logs and traces are stored into a write only service or endpoint.
-   **[REQ-LOG-2]** The write only log or tracing storage is deployed outside of the system deployment context.
-   **[REQ-LOG-3]** NMS emits SIEM events from relevant changes.
-   **[REQ-LOG-4]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation.
-   **[REQ-LOG-5]** All system clocks are monitored.
-   **[REQ-LOG-6]** Deviation in clock consistency is reported forward as a SIEM event.
-   **[REQ-LOG-0]** From the system perspective, logs and traces are stored into a write only service or endpoint.
-   **[REQ-LOG-1]** The write only log or tracing storage is deployed outside of the system deployment context.
-   **[REQ-LOG-2]** NMS emits SIEM events from relevant changes.
-   **[REQ-LOG-3]** SIEM transfer format, field attributes and event descriptions are available as part of the technical documentation.
-   **[REQ-LOG-4]** Deviation in clock consistency is reported forward as a SIEM event. <mark>Should this be in monitoring?</mark>

Manfacturer shall implement logging system features listed in the table below.

@@ -687,8 +689,7 @@ Manfacturer shall implement logging system features listed in the table below.
| [REQ-LOG-2]           | Not required  | Required    |
| [REQ-LOG-3]           | Not required  | Required    |
| [REQ-LOG-4]           | Not required  | Required    |
| [REQ-LOG-5]           | Not required  | Required    |
| [REQ-LOG-6]           | Not required  | Required    |


### 5.3.x Monitoring