Change to Main for HAS Comment 61
Issue #100 Partial adoption of comment - retained need to document method for identification of interfaces and clarified need to compare lists of exposed interfaces and to document all aspects of process. "* Preparation: List all types of interfaces on the product that may be exposed to an attacker, whether enabled or disabled. For each type of interface, list all exposed interfaces of that type, and document the method or methods used to create and verify these lists. List all states of the product with different exposed interfaces of the product in its secure-by-default configuration, including but not limited to initial configuration, startup, in use, idle, shutdown, and reset, if applicable. For each distinct exposed interface in each state, describe the interface and why it has to be enabled by default. * Activities: Using the list of types of interfaces, the list of states of the product, list all exposed interfaces in each state, and document the method or methods used to create and verify this list. Compare the list of exposed interfaces by state to the documented list by type."
Loading
Please sign in to comment