| **[REQ-TECH-0]** | See [5.2.3 Appropriate cryptographic libraries](#523-appropriate-cryptographic-libraries) |
| **[REQ-TECH-1]** | Deployment of a production distribution exposes only documented interfaces. |
| **[REQ-TECH-2]** | Actions are recorded and can not be modified later. |
@@ -585,7 +585,7 @@ When TLS is not used to encrypt the traffic in the secure channel, manufacturer
The chosen method shall follow the intent in the CRA by protecting the data transfer, and protect the confidentiality and integrity of the data according to the requirements of the forseeable use.
| [REQ-HA-0] | Not required | Required | [6.3.8.0](#6380-req-ha-0) |
| [REQ-HA-1] | Not required | Required | [6.3.8.1](#6380-req-ha-1) |
@@ -1407,7 +1407,7 @@ Matching tests for these requirements are listed in [6.3.8 High availability tes
> Table mapping technical security requirements from Section 5 of the present document to essential cybersecurity requirements in Annex I of the CRA. The purpose of this is to help identify missing technical security requirements.
@@ -1742,7 +1746,7 @@ Other Union legislation may be applicable to the product(s) falling within the s
The "Change history/Change request (history)" annex shall be included in every revised or amended harmonised standard and shall contain information concerning significant changes that have been introduced by it. It shall be presented as a table.