# Annex A (informative): Mapping between the present document and CRA requirements
> Table mapping technical security requirements from Section 5 of the present document to essential cybersecurity requirements in Annex I of the CRA. The purpose of this is to help identify missing technical security requirements.
@@ -757,6 +765,8 @@ Physical interfaces:
> FIXME lookup CVEs - anything from host-generated packets?
Potential sources of threats:
A generic CVE for many NICs that copied data beyond the end of the packet in memory and sent it on the network.
automatically connecting to an open network where a closed/encrypted one was remembered
seamlessly switching between AP's without ability to check if it's a different network
## C.3 Assumptions
> List assumptions that are relevant to the risk analysis for these threats. Everything is hackable if you try hard enough. What kinds of threats are in and out of scope? What are you assuming is the sophistication of attack? Relate to use cases.
> FIXME more assumptions, associate with risk factors and security requirements
- Not being attacked by a state actor
- Not using sophisticated or expensive hardware snooping techniques
- No secret hardware backdoors
Assume no physical tampering
For wireless - operating environment of standard applies