Commit 425e939a authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Minor formatting fixes

parent fecfe301
Loading
Loading
Loading
Loading
+2 −4
Original line number Diff line number Diff line
@@ -1381,14 +1381,12 @@ FIXME: ptrace scope

> FIXME: Figure out which risk factors/use cases require CFIN or else delete it.

|------------------------------------------------------|---------------------------------------------|
| Risk factors                                         | Requires mitigations                        |
|------------------------------------------------------|---------------------------------------------|
| NUSR < 2 & UEIN < 2 & SWMD < 2 & DVCS < 2 & FNET < 2 | None                                        |
| NUSR < 2 & RT-High                                   | None                                        |
| all others - option 1                                | MSAF-\*, MZRO-\*, MRWX-\*, NKAM, PLLC, MRCO |
| all others - option 2                                | MPMT, MZRO-\*, MRWX-\*, NKAM, PLLC, MRCO    |
|------------------------------------------------------|---------------------------------------------|

| Security Profile              | Requires mitigations                        |
|-------------------------------|---------------------------------------------|
@@ -1529,7 +1527,7 @@ Guidance: Data may be protected by the environment, permissions, encryption, sal

| Security Profile | Requires mitigations |
|------------------|----------------------|
| LR, IoT-1,       | none                 |
| LR, IoT-1        | none                 |
| all others       | CDST                 |

#### 5.2.X **TR-CDTX**: Confidentiality of data transmitted by product
@@ -1604,7 +1602,7 @@ The product shall detect corruption of the data stored on the product.

  * Verdict: If all methods of detecting corruption match the type of the data stored, and all the corruptions of data are detected => PASS, otherwise => FAIL

  * Evidence: Logs of determination of type of data and method of detecting corruption and corruptions of data
  * Evidence: Logs of determination of type of data and corruptions of data

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles