Commit d26cc597 authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Elaborated credential rotation

parent ee4407f7
Loading
Loading
Loading
Loading
+7 −2
Original line number Original line Diff line number Diff line
@@ -849,10 +849,15 @@ The operative context is described in more datail in the section [4.8 Operationa


#### Machine users
#### Machine users


Credential rotation addressed by [REQ-AUTH-11], is one of the key elements, that enable organisation to build resilience in a compromised network.
The rotation can replace keys or tokens to limit exposure from compromised credentials.
It can built on top of existing authority structures, or it can re-run some parts of the device initialisation procedures.
How the retake of the authority is implemented is between the product and the device.

- **[REQ-AUTH-10]:** The product shall not implement a design where default machine user credentials are used.
- **[REQ-AUTH-10]:** The product shall not implement a design where default machine user credentials are used.
- **[REQ-AUTH-11]:** The product shall support machine credential rotation or comparable structure.
- **[REQ-AUTH-11]:** The product shall support machine credential rotation or comparable structure.
- **[REQ-AUTH-12]:** The product shall implement passwordless authentication for machine users such as certificates or tokens.
- **[REQ-AUTH-12]:** The product shall provide passwordless authentication for machine users such as certificates or tokens.
- **[REQ-AUTH-13]:** The served API desing shall support minimal access grants for the machine user.
- **[REQ-AUTH-13]:** The privileged interfaces like APIs shall support minimal access grants for the machine user.




### 5.2.7 Remote Data Processing Systems
### 5.2.7 Remote Data Processing Systems