The manufacturer shall ensure that all security-relevant firmware and software are compiled with secure compilation flags and options appropriate to the target platform and language. The manufacturer shall document the compilation flags used, their rationale, and any exceptions or limitations. Any exceptions to the flags or warnings shall be documented as to why they do not affect the security of the system.
* Applicability: Product implemented in a compiled language
* Reference: TR-SDDV
* Objective: Secure design and development
* Preparation: Document which flags should be used
* Activities: Review compilation flags, warnings, and documentation for exceptions
* Verdict: Documentation of flags exists, all warnings and exceptions are documented
* Evidence: Documentation of flags, build system files, documentation of warnings and exceptions
#### 5.2.X.x Mapping of mitigations to risk factors and security profiles
Mitigations satisfy technical requirements only under when they mitigate the relevant risks appropriately. Risk factors are used to determine this. The below table shows which mitigations are appropriate to which use cases or security profiles based on the risk factors determined in the risk assessment.
The manufacturer shall ensure that all security-relevant firmware and software are compiled with secure compilation flags and options appropriate to the target platform and language. The manufacturer shall document the compilation flags used, their rationale, and any exceptions or limitations. Any exceptions to the flags or warnings shall be documented as to why they do not affect the security of the system.
* Applicability: (for requirements that depend on a feature)
* Reference: TR-SDDV
* Objective: Secure design and development
* Preparation: Document which flags should be used
* Activities: Review compilation flags, warnings, and documentation for exceptions
* Verdict: Documentation of flags exists, all warnings and exceptions are documented
* Evidence: Documentation of flags, build system files, documentation of warnings and exceptions
[Any other mitigations available]
| Risk factors | Requires mitigations |
|---------------------|----------------------|
| all | SCFS |
| Security Profile | Requires mitigations |
|---------------------|----------------------|
| all | SCFS |
> Copy-n-paste mitigation format
### 5.X.Y **TR-XXXX**:
_Description of high-level requirement in “shall” format._
#### 5.X.Y.Z **MI-XXXX**:
_Description of mitigation implementing the requirement in "shall" format._
* Applicability: (for requirements that depend on a feature)