@@ -1833,250 +1833,6 @@ _Description of mitigation implementing the requirement in "shall" format._
|---------------------|----------------------|
| | |
### NOTES
Could requirements be tested by checking for the configuration options? Or do we want to give some instructions to the manufacturer on how to tell what settings or features will satisfy the requirements?
https://kspp.github.io/Recommended_Settings
Technical requirements notes/sources:
Guidance on tools (see English translation in annex):
* Secure boot with HW Root of Trust: Ensures that only authenticated firmware is executed, anchored in immutable hardware
* Hardware-backed Key Storage (e.g., TPM, Secure Enclave): Protects cryptographic keys from software-level attacks and unauthorized access
* Memory Protection Units (MPU and/or MMU): Enforces access control policies at hardware level, isolating critical OS components
* Hardware-enforced Execution Zones (e.g., ARM TEE): Enables secure execution environments for sensitive operations.
* Bootloader Locking and Firmware/SW Anti-rollback: Prevents downgrading to vulnerable firmware/SW versions.
* Hardware Watchdog Timers: Detects and recovers from system hangs or malicious loops
* Secure Debug Interface Management: Disabling or restricting access through state-of-the-art security mechanisms debug access
## 5.3 Risk Mitigation Sets
> **TODO**: Connect the technical security requirements in clause 5.2 to specific Risk Factors, and define these as sets of Risk Mitigations that will be referenced in clause 6.
@@ -2698,6 +2454,248 @@ Special case of verified/measured boot partially implemented outside the operati
Special case configuration files? Not code in most cases, but substantial impact on the security configuration of the operating system.
### NOTES
Could requirements be tested by checking for the configuration options? Or do we want to give some instructions to the manufacturer on how to tell what settings or features will satisfy the requirements?
https://kspp.github.io/Recommended_Settings
Technical requirements notes/sources:
Guidance on tools (see English translation in annex):
* Secure boot with HW Root of Trust: Ensures that only authenticated firmware is executed, anchored in immutable hardware
* Hardware-backed Key Storage (e.g., TPM, Secure Enclave): Protects cryptographic keys from software-level attacks and unauthorized access
* Memory Protection Units (MPU and/or MMU): Enforces access control policies at hardware level, isolating critical OS components
* Hardware-enforced Execution Zones (e.g., ARM TEE): Enables secure execution environments for sensitive operations.
* Bootloader Locking and Firmware/SW Anti-rollback: Prevents downgrading to vulnerable firmware/SW versions.
* Hardware Watchdog Timers: Detects and recovers from system hangs or malicious loops
* Secure Debug Interface Management: Disabling or restricting access through state-of-the-art security mechanisms debug access
# Annex F (informative): Change history
The "Change history/Change request (history)" annex shall be included in every revised or amended harmonised standard and shall contain information concerning significant changes that have been introduced by it. It shall be presented as a table.