@@ -783,9 +783,9 @@ The manufacturer shall ensure that all security-relevant firmware and software a
Mitigations satisfy technical requirements only under when they mitigate the relevant risks appropriately. Risk factors are used to determine this. The below table shows which mitigations are appropriate to which use cases or security profiles based on the risk factors determined in the risk assessment.