Commit 1186ce76 authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Add data transmission integrity requirement

parent 425e939a
Loading
Loading
Loading
Loading
+38 −0
Original line number Diff line number Diff line
@@ -1618,6 +1618,44 @@ The product shall detect corruption of the data stored on the product.
| MOB-1            | IDST, DCST           |
| all others       | IDST                 |

> TODO: Rate use cases by sensitivity of data transmitted and update the security profile list above.

#### 5.2.X **TR-IDST**: Integrity of data transmitted by the product

The product shall detect corruption of the data transmitted by the product.

Guidance: Integrity may be protected by the environment, permissions, duplication, backups, and/or checksums.

#### 5.2.X.x **MI-DCTX**: Detect corruption of data transmitted by the product

The product shall detect corruption of the data transmitted by the product.

  * Reference: TR-IDST

  * Objective: Integrity of data

  * Preparation: List all types of data that may be transmitted by the product whose corruption should be detected and what methods of detecting corruption are appropriate for each type

  * Activities: For each type of data and method of detecting corruption, corrupt the data in a way that the method will detect

  * Verdict: If all methods of detecting corruption match the type of the data stored, and all the corruptions of data are detected => PASS, otherwise => FAIL

  * Evidence: Logs of determination of type of data and corruptions of data

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors | Requires mitigations |
|--------------|----------------------|
| SNDT < 1     | none                 |
| all others   | DCTX                 |

| Security Profile | Requires mitigations |
|------------------|----------------------|
| LR, IoT-1        | none                 |
| all others       | DCTX                 |

> TODO: Rate use cases by sensitivity of data transmitted and update the security profile list above.

### 5.2.X **TR-LMAS**: Minimize exposed interfaces

The manufacturer shall minimize exposed interfaces in the default configuration of the product in all operating modes, including initial configuration, during initialization, while in use, while shutting down or paused, or after reset.