Loading EN-304-625.md +5 −5 Original line number Diff line number Diff line Loading @@ -1001,18 +1001,18 @@ _Description of mitigation in "shall" format._ | CRA requirement | Technical security requirements(s) | |-------------------------------------------------|------------------------------------| | No known exploitable vulnerabilities | | | Secure design, development, production | TEST | | Secure design, development, production | SCCA, FZ95, IMSL | | Secure by default configuration | | | Secure updates | | | Authentication and access control mechanisms | | | Confidentiality protection | | | Integrity protection for data and configuration | IMEM | | Data minimization | | | Availability protection | MDNF | | Minimize impact on other devices or services | MDNF | | Availability protection | MDNF, WDOG, NTFY | | Minimize impact on other devices or services | MDNF, WDOG, NTFY | | Limit attack surface | | | Exploit mitigation by limiting incident impact | MDNF, IMEM | | Logging and monitoring mechanisms | | | Exploit mitigation by limiting incident impact | MDNF, IMEM, WDOG, NTFY | | Logging and monitoring mechanisms | NTFY | | Secure deletion and data transfer | | # Annex B (informative): Relationship between the present document and any related ETSI standards (if any) Loading Loading
EN-304-625.md +5 −5 Original line number Diff line number Diff line Loading @@ -1001,18 +1001,18 @@ _Description of mitigation in "shall" format._ | CRA requirement | Technical security requirements(s) | |-------------------------------------------------|------------------------------------| | No known exploitable vulnerabilities | | | Secure design, development, production | TEST | | Secure design, development, production | SCCA, FZ95, IMSL | | Secure by default configuration | | | Secure updates | | | Authentication and access control mechanisms | | | Confidentiality protection | | | Integrity protection for data and configuration | IMEM | | Data minimization | | | Availability protection | MDNF | | Minimize impact on other devices or services | MDNF | | Availability protection | MDNF, WDOG, NTFY | | Minimize impact on other devices or services | MDNF, WDOG, NTFY | | Limit attack surface | | | Exploit mitigation by limiting incident impact | MDNF, IMEM | | Logging and monitoring mechanisms | | | Exploit mitigation by limiting incident impact | MDNF, IMEM, WDOG, NTFY | | Logging and monitoring mechanisms | NTFY | | Secure deletion and data transfer | | # Annex B (informative): Relationship between the present document and any related ETSI standards (if any) Loading