Commit eede2981 authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Added reference to APAC

Relates #398
parent b3a48948
Loading
Loading
Loading
Loading
+2 −1
Original line number Original line Diff line number Diff line
@@ -163,6 +163,7 @@ For the purposes of the present document, the following terms apply:


For the purposes of the present document, the following abbreviations apply:
For the purposes of the present document, the following abbreviations apply:


`APAC   Attribute-Based Access Control`
`CRA    Cyber Resilience Act`
`CRA    Cyber Resilience Act`
`OS     Operating System`
`OS     Operating System`
`IDP    Identity Provider`
`IDP    Identity Provider`
@@ -836,7 +837,7 @@ In addition, the managed device can have a configuration port, management API, f
- **[REQ-AUTH-3]:** When a user or system identity has been authenticated, the product shall apply authorization controls based on assigned roles or equivalent access-control attributes.
- **[REQ-AUTH-3]:** When a user or system identity has been authenticated, the product shall apply authorization controls based on assigned roles or equivalent access-control attributes.
- **[REQ-AUTH-4]:** The authorization model shall enforce separation of privileges appropriate to the intended and reasonably foreseeable use of the product.
- **[REQ-AUTH-4]:** The authorization model shall enforce separation of privileges appropriate to the intended and reasonably foreseeable use of the product.
- **[REQ-AUTH-5]:** The technical documentation shall describe the authorization model implemented by the product.
- **[REQ-AUTH-5]:** The technical documentation shall describe the authorization model implemented by the product.
- **[REQ-AUTH-6]:** The product shall implement and document authorization controls, like RBAC, suitable for privileged interfaces and sensitive operations.
- **[REQ-AUTH-6]:** The product shall implement and document authorization controls, like RBAC or APAC, suitable for privileged interfaces and sensitive operations.
- **[REQ-AUTH-7]:** All access to administrative interfaces, control functions, and sensitive operations shall be subject to strong authentication of users, services, or integrated components.
- **[REQ-AUTH-7]:** All access to administrative interfaces, control functions, and sensitive operations shall be subject to strong authentication of users, services, or integrated components.
- **[REQ-AUTH-8]:** Privileged interfaces shall be protected with [5.2.4 State-of-the-art cryptographic libraries].
- **[REQ-AUTH-8]:** Privileged interfaces shall be protected with [5.2.4 State-of-the-art cryptographic libraries].
- **[REQ-AUTH-9]:** The product shall report all relevant events related to authorisation including, but not limited to, successful and unsuccessful use of identity, object access, policy change, privileged function use, data access and deletions, data changes and permission changes.
- **[REQ-AUTH-9]:** The product shall report all relevant events related to authorisation including, but not limited to, successful and unsuccessful use of identity, object access, policy change, privileged function use, data access and deletions, data changes and permission changes.