@@ -581,7 +581,7 @@ Later [Section 5.3 Risk Mitigations](#53-risk-mitigations) combines these genera
Technical requirements:
-**[REQ-TECH-0]** An network management system shall implement appropriate cryptographic libraries to allow the protection to the requirements of the forseeable use.
-**[REQ-TECH-0]** An SIEM system shall implement appropriate cryptographic libraries to allow the protection to the requirements of the forseeable use.
-**[REQ-TECH-1]** The product is shipped without undocumented interfaces.
-**[REQ-TECH-2]** Administrative actions shall be traced.
-**[REQ-TECH-3]** A secure channel is used in transport.
@@ -627,8 +627,8 @@ The technical documentation shall include:
### 5.2.3 Network segmentation
Network segmentation is encouraged to be used where applicapble. The best practise is to use dedicated network segment for network management traffic.
Management traffic can be configuration updates, encryption keys, software updates, and others alike.
Network segmentation is encouraged to be used where applicapble. The best practise is to use dedicated network segment for SIEM traffic.
SIEM traffic can be configuration updates, encryption keys, software updates, and others alike.
Regardless of what connectivity structure manufacturer implements in the design, manufacturer shall implement mitigations described in the following section [Risk Mitigations](#53-risk-mitigations).