Commit b4d97822 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Add secure deletion requirement

parent 4c37f77f
Loading
Loading
Loading
Loading
+31 −1
Original line number Diff line number Diff line
@@ -1084,6 +1084,36 @@ All exposed interfaces on the product in any state that is part of its reasonabl
|---------------------|----------------------|
| any                 | JSTY                 |

### 5.2.X **TR-SCDL**: Secure deletion

The product shall provide a method of deleting all data and settings and resetting the device to its secure-by-default configuration.

#### 5.2.X.x **MI-RSET**:

The product shall reset to its secure-by-default state after a power cycle or reset command.

  * Reference: TR-SCDL

  * Objective: Secure deletion

  * Preparation: Document every kind of data or setting that may be stored on the device, how to store it on the device, and how to read it from the device

  * Activities: For each kind of user data or setting that may be stored on the device, write an instance of the data or setting stored on the device that is different from the default, read it from the device, power cycle or reset the device, and read the data again

  * Verdict: If any data or setting is the same for both of the reads => FAIL, otherwise => PASS

  * Evidence: Record of each type of data or setting, what data or setting was written, what data or setting was returned by the first read, and what data or setting was returned by the second read, comparison of each one

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors        | Requires mitigations |
|---------------------|----------------------|
| any                 | RSET                 |

| Security Profile    | Requires mitigations |
|---------------------|----------------------|
| any                 | RSET                 |

### 5.2.X **TR-XXXX**: Encryption related stuff

Need to specify encryption related stuff that is not covered by ACM.
@@ -1168,7 +1198,7 @@ Suggested type of tests include, but are not limited to:
| Limit attack surface                            | LMAS                               |
| Exploit mitigation by limiting incident impact  | MDNF, IMEM                         |
| Logging and monitoring mechanisms               | MDNF                               |
| Secure deletion and data transfer               |                                    |
| Secure deletion and data transfer               | SCDL                               |

# Annex B (informative): Relationship between the present document and any related ETSI standards (if any)