Commit eaf557b3 authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Fix hanging clauses in requirements

parent dcdefc52
Loading
Loading
Loading
Loading
+22 −0
Original line number Diff line number Diff line
@@ -975,6 +975,8 @@ Format:

5.X.Y **TR-XXXX**:

5.X.Y.Z Requirement

_Description of high-level requirement in “shall” format._

5.X.Y.Z **MI-XXXX**:
@@ -1432,6 +1434,8 @@ Use case: Higher risk servers, workstations, laptops?

### 5.2.X **TR-SDEF**: Secure by default configuration

### 5.2.X.x Requirement

The product shall operate in a secure configuration by default.

#### 5.2.X.x **MI-ADEF**: Authorization required by default to access security-relevant assets
@@ -1464,6 +1468,8 @@ The product shall require appropriate authorization by default to access securit

#### 5.2.X **TR-CDST**: Confidentiality of data stored on the product

### 5.2.X.x Requirement

The product shall protect data stored on the product from unauthorized access.

#### 5.2.X.x **MI-CDST**: Protect confidentiality of data stored on the product
@@ -1498,6 +1504,8 @@ Guidance: Data may be protected by the environment, permissions, encryption, sal

#### 5.2.X **TR-CDTX**: Confidentiality of data transmitted by product

### 5.2.X.x Requirement

The product shall protect data transmitted by the product from unauthorized access.

#### 5.2.X.x **MI-CDTX**: Protect confidentiality of data transmitted by product
@@ -1534,6 +1542,8 @@ Guidance: Data transmitted may be protected by the environment or encryption.

#### 5.2.X **TR-IDST**: Integrity of data stored on the product

### 5.2.X.x Requirement

The product shall protect the integrity of data stored on the product from unauthorized modification and report corruption.

Guidance: Integrity may be protected by the environment, permissions, duplication, backups, and/or checksums.
@@ -1588,6 +1598,8 @@ The product shall detect corruption of the data stored on the product.

#### 5.2.X **TR-IDTX**: Integrity of data transmitted by the product

### 5.2.X.x Requirement

The product shall detect corruption of the data transmitted by the product.

Guidance: Integrity may be protected by the environment, permissions, duplication, backups, and/or checksums.
@@ -1624,6 +1636,8 @@ The product shall detect corruption of the data transmitted by the product.

### 5.2.X **TR-LMAS**: Minimize exposed interfaces

### 5.2.X.x Requirement

The manufacturer shall minimize exposed interfaces in the default configuration of the product in all operating modes, including initial configuration, during initialization, while in use, while shutting down or paused, or after reset.

#### 5.2.X.x **MI-JSTY**: Document and justify exposed interfaces
@@ -1659,6 +1673,8 @@ All exposed interfaces on the product in any state that is part of its reasonabl

### 5.2.X **TR-SCDL**: Secure deletion

### 5.2.X.x Requirement

The product shall provide a method of deleting all data and settings and resetting the product to its secure-by-default configuration.

Guidance: Overwriting all storage or encrypting all data and deleting the key are two secure deletion mechanisms.
@@ -1727,6 +1743,8 @@ The product shall reset to its secure-by-default state after the secure deletion

### 5.2.X **TR-SDTR**: Secure data read and transfer

### 5.2.X.x Requirement

The product shall provide a method to read all data and settings from the product, and if provided, securely transfer data and settings to another product.

#### 5.2.X.x **MI-SDRF**: Secure data read from product
@@ -1777,6 +1795,8 @@ The product shall provide a method by which an authorized user can securely tran

### 5.2.X **TR-DMIN**:

### 5.2.X.x Requirement

The product shall minimize the data processed.

#### 5.2.X.x **MI-DJST**: Document and justify processed data
@@ -1812,6 +1832,8 @@ All sources of data processed by the product in its secure-by-default configurat

### 5.2.X **TR-SCUD**: Secure updates

### 5.2.X.x Requirement

The product shall be securely updateable by the user.

> FIXME: Waiting on legal approval to include self-update text, following text is for update by the operational environment (other OS, human process, etc.)