@@ -1529,7 +1527,7 @@ Guidance: Data may be protected by the environment, permissions, encryption, sal
| Security Profile | Requires mitigations |
|------------------|----------------------|
| LR, IoT-1, | none |
| LR, IoT-1 | none |
| all others | CDST |
#### 5.2.X **TR-CDTX**: Confidentiality of data transmitted by product
@@ -1604,7 +1602,7 @@ The product shall detect corruption of the data stored on the product.
* Verdict: If all methods of detecting corruption match the type of the data stored, and all the corruptions of data are detected => PASS, otherwise => FAIL
* Evidence: Logs of determination of type of data and method of detecting corruption and corruptions of data
* Evidence: Logs of determination of type of data and corruptions of data
#### 5.2.X.x Mapping of mitigations to risk factors and security profiles