Commit b576cc41 authored by Santeri Toikka's avatar Santeri Toikka
Browse files

Added writing instructions requirements

parent 4ea2c843
Loading
Loading
Loading
Loading
+13 −0
Original line number Diff line number Diff line
@@ -535,10 +535,23 @@ https://www.skyflow.com/post/how-to-keep-sensitive-data-out-of-your-logs-nine-be

### 5.2.1 Mitigations for user identity integrity

This section shall have:
- How the system users identities should be maintained
- How the least amount of privileges principles are enforced to user groups

### 5.2.2 Mitigations for ingested data integrity

This section shall have:
- How the SIEM shall verify the authensity and integrity of the incoming data
- What is expected to happen, if discrepencies are found

### 5.2.3 Mitigations of event collection infrastructure

This section shall have:
- How the SIEM deploys an updated collector or API client software to the managed device?
- How the SIEM shall monitor changes in the connectivity
- How the managed device inventory should be correlated to the existing collection sources

# Annex A (informative): Mapping between the present document and CRA requirements

> Table mapping technical security requirements from Section 5 of the present document to essential cybersecurity requirements in Annex I of the CRA. The purpose of this is to help identify missing technical security requirements.