@@ -1501,21 +1501,21 @@ The product shall require appropriate authorization by default to access securit
#### 5.2.X.x **MI-SCNF**: Confidentiality of data stored on the product
The product shall protect confidential data stored on the product from unauthorized access.
The product shall protect data stored on the product from unauthorized access.
* Reference: TR-CONF
* Objective: Confidentiality of data
* Preparation: List all types of data that may be stored on the product that should not be readable without authorization, all methods of accessing that data available to an attacker based on the risk assessment, and what the allowable authorization methods are for that access method
* Preparation: List all types of data that may be stored on the product that should not be readable without authorization, what methods of ensuring confidentiality are appropriate for each type, all methods of accessing that data available to an attacker based on the risk assessment, and what the allowable authorization methods are for that access method
* Activities: For each type of data and each access mechanism, attempt to read the data without authorization
* Activities: For each type of data and each access mechanism, determine the method of ensuring confidentiality used, and attempt to read the data without authorization
* Verdict: If all the attempts to read confidential data fail => PASS, otherwise => FAIL
* Verdict: If all methods of ensuring confidentiality match the type of the data stored, and all the attempts to read confidential data without authorization fail => PASS, otherwise => FAIL
* Evidence: Logs of attempts to read confidential data with indication of success or failure
* Evidence: Logs of determination of type of data and method of confidentiality and attempts to read confidential data without authorization
> TODO: Specify which types of data should be protected by the environment, permissons, encryption, salted hashes, offline storage, or hardware-backed secrets.
Guidance: Data may be protected by the environment, permissons, encryption, salting and hashing, offline storage, or hardware-backed secrets.
#### 5.2.X.x **MI-TCNF**: Confidentiality of data transmitted by product
@@ -1525,15 +1525,15 @@ The product shall protect data transmitted by the product from unauthorized acce
* Objective: Confidentiality of data
* Preparation: List all methods of transmitting confidential data, all methods of accessing that data available to an attacker based on the risk assessment, and what the allowable authorization methods are for that access method
* Preparation: List all types of data that may be transmitted on the product that should not be readable without authorization, what methods of ensuring confidentiality are appropriate for each type, all methods of accessing that data available to an attacker based on the risk assessment, and what the allowable authorization methods are for that access method
* Activities: For each method of data transmission and each access mechanism, attempt to read the transmitted data without authorization
* Activities: For each type of data and each access mechanism, determine the method of ensuring confidentiality used, and attempt to read the data without authorization
* Verdict: If all the attempts to read confidential data fail => PASS, otherwise => FAIL
* Verdict: If all methods of ensuring confidentiality match the type of the data transmitted, and all the attempts to read confidential data without authorization fail => PASS, otherwise => FAIL
* Evidence: Logs of attempts to read data transmitted with indication of success or failure
* Evidence: Logs of determination of type of data and method of confidentiality and attempts to read confidential data without authorization
> TODO: Specify which types of transmitted data should be protected by the environment or encryption.
Guidance: Data transmitted may be protected by the environment or encryption.
#### 5.2.X.x Mapping of mitigations to risk factors and security profiles