@@ -1837,9 +1837,9 @@ _Description of mitigation implementing the requirement in "shall" format._
> **TODO**: Connect the technical security requirements in clause 5.2 to specific Risk Factors, and define these as sets of Risk Mitigations that will be referenced in clause 6.
# 6 Security Profiles
## 5.4 Security Profiles
## 6.1 General
### 5.4.1 General
Security Profiles are mapped one-to-one to each Use Case (defined in clause 4.4).
@@ -1847,9 +1847,9 @@ Each Security Profile connects one Use Case to its relevant Risk Factors (define
Risk Tolerances are applied to the foreseeable risks associated to each Security Profile, relative to potential severity and likelihood of an incident affecting users.
## 6.2 Details of Security Profiles
### 5.4.2 Details of Security Profiles
### 6.2.1 SP-IoT-1 :: RT-HIGH
#### 5.4.2.1 SP-IoT-1 :: RT-HIGH
Description: A non-internet-connected device such as a bluetooth speaker
@@ -1867,7 +1867,7 @@ Description: A non-internet-connected device such as a bluetooth speaker
* TBD - maybe none?
* Derived Risk Tolerance: HIGH (4)
### 6.2.2 SP-IoT-2 :: RT-HIGH
#### 5.4.2.2 SP-IoT-2 :: RT-HIGH
Description: An internet-enabled power switch
@@ -1885,7 +1885,7 @@ Description: An internet-enabled power switch
Description: A personal computer in a fixed and generally safe location
@@ -1942,7 +1942,7 @@ Description: A personal computer in a fixed and generally safe location
* Physical access to the device is likely to be limited only to trusted users, so tamper-resistant mitigations may not be needed -- and may be counter-indicated if end-users are anticipated to perform maintenance tasks.
* Derived Risk Tolerance: LOW (2)
### 6.2.10 SP-PC-2 :: RT-????
#### 5.4.2.10 SP-PC-2 :: RT-????
Description: An enterprise workstation in a fixed and generally safe location
@@ -1955,7 +1955,7 @@ Description: An enterprise workstation in a fixed and generally safe location
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.11 SP-LA-1 :: RT-???
#### 5.4.2.11 SP-LA-1 :: RT-???
Description: A personal laptop
@@ -1968,7 +1968,7 @@ Description: A personal laptop
@@ -1993,7 +1993,7 @@ Description: Personal server
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.14 SP-SE-1 :: RT-???
#### 5.4.2.14 SP-SE-1 :: RT-???
Description: An enterprise server in a datacenter with no user accounts
@@ -2006,7 +2006,7 @@ Description: An enterprise server in a datacenter with no user accounts
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.15 SP-SE-2 :: RT-???
#### 5.4.2.15 SP-SE-2 :: RT-???
Description: An enterprise server in a datacenter with only trusted user accounts
@@ -2019,7 +2019,7 @@ Description: An enterprise server in a datacenter with only trusted user account
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.16 SP-SE-3 :: RT-???
#### 5.4.2.16 SP-SE-3 :: RT-???
Description: An enterprise server in a datacenter hosting many untrusted user accounts
@@ -2032,7 +2032,7 @@ Description: An enterprise server in a datacenter hosting many untrusted user ac
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.17 SP-IF-1 :: RT-???
#### 5.4.2.17 SP-IF-1 :: RT-???
Description: Internet infrastructure on private network
@@ -2045,7 +2045,7 @@ Description: Internet infrastructure on private network
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.18 SP-IF-2 :: RT-???
#### 5.4.2.18 SP-IF-2 :: RT-???
Description: Internet infrastructure on filtered network
@@ -2058,7 +2058,7 @@ Description: Internet infrastructure on filtered network
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.19 SP-IF-3 :: RT-???
#### 5.4.2.19 SP-IF-3 :: RT-???
Description: Internet infrastructure on open internet
@@ -2071,7 +2071,7 @@ Description: Internet infrastructure on open internet
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.20 SP-FI-1 :: RT-???
#### 5.4.2.20 SP-FI-1 :: RT-???
Description: Firewall for personal network
@@ -2084,7 +2084,7 @@ Description: Firewall for personal network
* ...
* Derived Risk Tolerance: --- (-)
### 6.2.21 SP-FI-2 :: RT-???
#### 5.4.2.21 SP-FI-2 :: RT-???
Description: Firewall for enterprise network
@@ -2098,18 +2098,17 @@ Description: Firewall for enterprise network
* Derived Risk Tolerance: --- (-)
## 6.3 Mapping of Security Profile to Risk Tolerance
### 5.4.3 Mapping of Security Profile to Risk Tolerance
> TODO
### 5.4.4 Mapping of Security Profile to Risk Mitigation
## 6.4 Mapping of Security Profile to Risk Mitigation
> TODO
# 6 Conformity Assessment
# Annex A (informative): Relationship between the present document and any related ETSI standards (if any)
_List any related ETSI standards and how they interact with the present document._
> FIXME: Split out assessment from clause 5 requirements and put them here if required. For now, they are adjacent to the requirement they are assessing, which is far easier to read, write, and understand.
# Annex A (informative): Mapping between the present document and CRA requirements