Commit b327acd9 authored by Aeva Black's avatar Aeva Black Committed by Valerie Aurora
Browse files

Add vulnerability handling subsection to 4.3.6

parent 13e0802a
Loading
Loading
Loading
Loading
+11 −0
Original line number Diff line number Diff line
@@ -438,6 +438,17 @@ The operating system can choose which thread to schedule based on factors such a
* Resource limits
* Performance considerations

### 4.3.6 Vulnerability Handling

When a Product with Digital Element's essential functionality is not  that of an operating system, and it contains an operating system, then the manufacturer of the operating system shall provide:
1. clear documentation of all essential security capabilities, and
1. unique, unambiguous, and machine-readable identification of all components of the operating system, including integrated third party components, in a format consistent with common vulnerability handling standards. 

Providing this information enables the manufacturer of the PwDE which integrates the operating system to:
1. verify that the PwDE's forseeable use case can rely on appropriate security protections from the operating system, and
1. verify that the PwDE is free of known vulnerabilities at the time it is placed on the market, and
1. proactively monitor for the disclosure of new vulnerabilities in the operating system and its dependencies which might affect the security of the PwDE.

## 4.4 Use Cases

_The following use cases are provided to assist manufacturers in selecting risk factors and security levels. This is not intended to be an exhaustive or complete list of all possible use cases._