Commit 4e7d689d authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Add/update placeholders for encryption and authentication

parent 5e7db002
Loading
Loading
Loading
Loading
+12 −6
Original line number Diff line number Diff line
@@ -1115,6 +1115,10 @@ FIXME define RSKL/M/H as a function of other risk factors
| WL-1                | SCFM, SCDD, SCDC, SCDL |
| WL-1                | SCFM, SCDD, SCDC, SCDM |

### 5.2.X **TR-AUTH**: Authentication and access control

> TODO: Fill in very limited authentication requirements (for remote management or self-update) and reference cross-vertical authentication standards when they exist.

### 5.2.X **TR-CDST**: Confidentiality of data stored on the product

#### 5.2.X.x Requirement
@@ -1191,6 +1195,10 @@ Guidance: Data transmitted may be protected by the environment or encryption.

> FIXME: update above

### 5.2.X **TR-CRYP**: Encryption

> TODO: Fill in very limited encryption requirements that are not performance-related (this is probably remote management and self-update). Need to specify any necessary encryption algorithms that are not already included in the Agreed Cryptographic Mechanism and CRA Addendum.

### 5.2.X **TR-IDST**: Integrity of data stored on the product

#### 5.2.X.x Requirement
@@ -1539,10 +1547,6 @@ The product shall provide a method by which an authorized user can securely tran

> FIXME: Update when risk factors are fully filled out

### 5.2.X **TR-XXXX**: Encryption related stuff

Need to specify encryption related stuff that is not covered by ACM.

### 5.2.X Additional requirements

> TODO: Look at the [notes.md](notes.md) document for ideas for requirements to write.
@@ -1567,8 +1571,8 @@ Need to specify encryption related stuff that is not covered by ACM.
| Secure design, development, production          | SSDD, MSAF                         |
| Secure by default configuration                 | SDEF                               |
| Secure updates                                  | SCUD                               |
| Authentication and access control mechanisms    | _waiting on cross-vertical_        |
| Confidentiality protection                      | CDST, CDTX                         |
| Authentication and access control mechanisms    | AUTH\*                             |
| Confidentiality protection                      | CDST, CDTX, CRYP\*                 |
| Integrity protection for data and configuration | IDST, IDTX                         |
| Data minimization                               | DMIN                               |
| Availability protection                         | AVAI, MSAF                         |
@@ -1578,6 +1582,8 @@ Need to specify encryption related stuff that is not covered by ACM.
| Logging and monitoring mechanisms               | LOGG                               |
| Secure deletion and data transfer               | SCDL, SDTR                         |

\* _waiting on cross-vertical_

# Annex B (informative): Relationship between the present document and any related ETSI standards (if any)

> List any related ETSI standards and how they interact with the present document.