From: andre ebersold Date: Mon, 24 Jun 2024 14:53:14 +0000 (+0200) Subject: Added new example X-Git-Url: https://git.ebersold.fr/?a=commitdiff_plain;h=5ffcff53626d83682cbd3e1b5448488a50fd636f;p=antcc.git Added new example --- diff --git a/examples/reqif/MI_General_SecurityRequirements.reqif b/examples/reqif/MI_General_SecurityRequirements.reqif new file mode 100644 index 0000000..9ac6421 --- /dev/null +++ b/examples/reqif/MI_General_SecurityRequirements.reqif @@ -0,0 +1,7328 @@ + + + + + 2024-06-24T09:05:32.072+02:00 + Polarion ReqIF Roundtrip + 1.0 + Polarion + MI_General_SecurityRequirements + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + polarion_type_string + + + + + polarion_type_string + + + + + polarion_type_date_time + + + + + polarion_type_string + + + + + polarion_type_rich_text + + + + + + + + + polarion_type_string + + + + + polarion_type_string + + + + + polarion_type_date_time + + + + + polarion_type_string + + + + + polarion_type_rich_text + + + + + rmf-232a64c4-dc0e-4ea3-beeb-a9f47e1c1abb + + + + + polarion_type_rich_text + + + + + polarion_type_string + + + + + rmf-ccc7a833-8375-41e5-b1d4-d9816a3d11d1 + + + + + rmf-e5f4abad-78ac-4044-b747-69bfc727892c + + + + + polarion_type_integer + + + + + + + + + + + + + + + + + + + + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9f + + + + + rmf-05a5dc11-0032-482a-b9ae-530dc233538a + + + + + rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6 + + + + + rmf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40 + + + + + _c84c4772-a773-48ac-a565-c214850e68b2 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to identify and authenticate all human users on all interfaces that provide human user access to the product to support segregation of duties and least privilege in accordance with applicable security policies and procedures. This capability may be provided locally by the product or by integration into a system level identification and authentication system. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to uniquely identify and authenticate all human users. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to identify itself and authenticate to any other product (software application, embedded devices, host devices and network devices).If the product, as in the case of an application, is running in the context of a human user, in addition, the identification and authentication of the human user may be part of the product identification and authentication process towards the other products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to identify and authenticate all non-human users (e.g. software process, device) on all relevant interfaces capable of non-human user access. This capability shall enforce such identification and authentication on all interfaces that provide non-human user access to the product to support segregation of duties and least privilege in accordance with applicable security policies and procedures. This capability may be provided locally by the component or by integration into a system level identification and authentication system. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to support the management of all accounts directly or integrated into a higher-level account management system.  + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to support the management of unique and unambiguous identifiers for all accounts directly or integrated into a system that manages the account identifiers. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to: + support the use of initial authenticator content - all pre-programmed passwords shall be unique for each manufactured device or the user shall be forced to change the default password by first use (TRA AC-10, California SB 327); + support the recognition of changes to default authenticators made at installation time - the product shall enforce a user to generate a new means of authentication before access is granted to the device for the first time (California SB 327); + function properly with periodic authenticator change/refresh operation - authenticator changes shall not impact the service availability; and + protect authenticators from unauthorized disclosure and modification when stored, used, and transmitted. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The network device supporting usage through wireless interfaces shall provide the capability to identify and authenticate all users (humans, software processes or devices) engaged in wireless communication and to support the management of all implemented accounts natively or integrated into a higher-level account management system. The device shall implement means to protect all services offered via wireless interfaces by identification and authentication means. E.g., read only access for measurement values shall also be protected on wireless interfaces. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The network device shall provide the capability to uniquely identify and authenticate all users (humans, software processes or devices) engaged in wireless communication. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When password-based authentication is utilized, the product shall provide or integrate into a system that provides the capability to enforce configurable password strength according to internationally recognized and proven password guidelines. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to manage trust, e.g. by means of Public Key Infrastructure (PKI) certificates issued by a trusted Certification Authority (CA) or at least by using the appropriate compensating mechanisms (e.g. certificate enrollment by using the corresponding engineering or runtime tool). + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When public key infrastructure (PKI) is utilized, the product shall provide the capability to operate a PKI directly or integrated into a system that provides such capability according to commonly accepted best practices or obtain public key certificates from an existing PKI. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When public key infrastructure (PKI) is utilized, the product shall provide directly or be integrated into a system that provides the capability within the same Industrial Automation and Control System environment to: + validate certificates by checking the validity of the signature of a given certificate; + validate the certificate chain or, in the case of self-signed certificates, by deploying leaf certificates to all hosts that communicate with the subject to which the certificate is issued; + validate certificates by checking a given certificate’s revocation status; + establish user (human, software process or device) control of the corresponding private key; + map the authenticated identity to a user (human, software process or device); + protect the relevant private keys via mechanisms according to commonly accepted security industry practices and recommendations. + + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + For products that utilize public key-based authentication, those products shall provide the capability to protect critical, long-lived private keys via hardware mechanisms. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When authentication capability is utilized, the product shall provide the capability to obscure feedback of authenticator information during the authentication process. Note:During the whole authentication process the password shall be protected from exploitation, this includes (but is not limited to) obscuring during typing on the UI as well as hiding the reason for an authentication failure. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When authentication capability is utilized, the product shall provide the capability to: + enforce a limit of a configurable number of consecutive invalid access attempts by any user (human, software process or device) during a configurable time period; and + deny access for a specified period of time or until unlocked by an administrator when this limit has been reached. An administrator may unlock an account prior to the expiration of the timeout period. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When the product provides local human user access (HMI), it shall provide the capability to display a system use notification message before authenticating. The system use notification message shall be configurable by authorized personnel. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The network device supporting device access into a network shall provide the capability to monitor and control all methods of access to the network device via untrusted networks. (Monitoring = recording the accesses, Control = check of content and access prevention) + + + + + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When symmetric keys are utilized, the product shall provide the capability to: + establish the mutual trust using the symmetric key; + store securely the shared secret (the authentication is valid as long as the shared secret remains secret); + restrict access to the shared secret + ensure that the algorithms and keys used for the symmetric key authentication comply with   + + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide an authorization enforcement mechanism for all identified and authenticated users based on their assigned responsibilities. All available communication interfaces realize an independent authorization enforcement, i.e. an authorization decision on one communication interface does not have an effect on an authorization decision on another communication interface (TRA AC-8). + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide an authorization enforcement mechanism for all users (humans, software processes and devices) based on their assigned responsibilities and least privilege. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall, directly or through a compensating security mechanism, provide for an authorized role to define and modify the mapping of permissions to roles for all human users. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When the product supports usage through wireless interfaces, it shall provide the capability to integrate into a system that supports usage authorization, monitoring and restrictions according to commonly accepted industry practices. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + In the event that the product utilizes mobile code technologies, the product shall provide the capability to enforce a security policy for the usage of mobile code technologies. The security policy shall allow, at a minimum, the following actions for each mobile code technology used on the product: + Control execution of mobile code; + Control which users (human, software process, or device) are allowed to transfer mobile code to/from the product; + Control the execution of mobile code based on the results of an integrity check prior to the code being executed.  + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to enforce a security policy that allows the product to control execution of mobile code based on the results of an authenticity check prior to the code being executed. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When the product provides a human user interface, whether accessed locally or via a network, the product shall provide the capability + to protect against further access by initiating a session lock after a configurable time period of inactivity or by manual initiation by the user (human, software process or device); and + for the session lock to remain in effect until the human user who owns the session, or another authorized human user, re-establishes access using appropriate identification and authentication procedures. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + If a product supports remote sessions, the product shall provide the capability to terminate a remote session either automatically after a configurable time period of inactivity, manually by a local authority, or manually by the user (human, software process or device) who initiated the session. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to generate audit records relevant to security for the following categories (if respective functionality is available): + access control; + request errors; + control system events; + backup and restore event; + configuration changes (incl. operation mode change, calibration, validation, etc.); and + audit log events. + Individual audit records shall include: + timestamp; + source (originating device, software process or human user account); + category; + type; + event ID; and + event result. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide + the capability to allocate audit record storage capacity according to commonly recognized recommendations for log management; and + mechanisms to protect against a failure of the component when it reaches or exceeds the audit storage capacity.  + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide + the capability to protect against the loss of essential services and functions in the event of an audit processing failure; and + the capability to support appropriate actions in response to an audit processing failure according to commonly accepted industry practices and recommendations. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to create timestamps (including date and time) for use in audit records. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to create timestamps that are synchronized with a system wide time source. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When a time synchronization mechanism is provided, the product shall provide the capability to detect unauthorized alteration of the time and cause an audit event upon alteration. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When a human user interface is provided, the product shall provide the capability to determine whether a given human user took a particular action.Control elements that are not able to support such capability shall be listed in component documents. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall protect against unauthorized use of the physical factory diagnostic and test interface(s) (e.g. JTAG debugging).Doesn't apply to pure software products which doesn't have a physical interface. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to protect integrity of transmitted information. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to verify the authenticity of received information during communication. NOTE: Both integrity protection and authentication of origin can be achieved without providing confidentiality protection. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to protect from installation and execution of unauthorized software. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to support verification of the intended operation of security functions. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to perform or support integrity checks on software, configuration and other information as well as the recording and reporting of the results of these checks or be integrated into a system that can perform or support integrity checks. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + Products shall provide the capability to perform or support authenticity checks on software, configuration and other information as well as the recording and reporting of the results of these checks or be integrated into a system that can perform or support authenticity checks. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall validate the syntax, length and content of any input data that is used as an industrial process control input or input via external interfaces that directly impacts the action of the component. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When the product is physically or logically connected to an automation process, the product shall provide the capability to set outputs to a predetermined state if normal operation as defined by the component supplier cannot be maintained. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall identify and handle error conditions in a manner that does not provide information that could be exploited by adversaries to attack the IACS.  + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide mechanisms to protect the integrity of communications sessions including: + the capability to invalidate session identifiers upon user logout or other session termination (including browser sessions); + the capability to generate a unique session identifier for each session and recognize only session identifiers that are system-generated; and + the capability to generate unique session identifiers with commonly accepted sources of randomness. + + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall protect audit information, audit logs, and audit tools (if present) from unauthorized access, modification and deletion. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + Integrity verification mechanism for all scripts, executables and other important files included in the product shall be provided. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + Authenticity verification mechanism for all scripts, executables and other important files included in the product shall be provided. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall support the ability to be updated and upgraded. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall validate the authenticity and integrity of any software update or upgrade prior to installation.Note: not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide tamper resistance and detection mechanisms to protect against unauthorized physical access into the product. Note: not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall be capable of automatically providing notification to a configurable set of recipients upon discovery of an attempt to make an unauthorized physical access. All notifications of tampering shall be logged as part of the overall audit logging function.Note: not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to provision and protect the confidentiality, integrity, and authenticity of product supplier keys and data to be used as one or more “roots of trust” at the time of manufacture of the product. Note: not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to provision and protect the confidentiality, integrity, and authenticity of product supplier keys and data to be used as one or more "roots of trust" throughout the whole lifecycle of the product. Note: Not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall + provide the capability to provision and protect the confidentiality, integrity, and authenticity of keys and data to be used as “roots of trust” belonging to the asset owner; and + support the capability to provision keys and data to be used as "roots of trust" belonging to the asset owner without reliance on components that may be outside of the device’s security zone. + + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall verify the integrity of the firmware, software, and configuration data needed for the component’s boot and runtime processes prior to use.Note: not applicable to software only products. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall use the product supplier roots of trust to verify the authenticity of the firmware, software, and configuration data needed for the product's boot process prior to it being used in the boot process. Note: Not applicable to software only products. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall + provide the capability to protect the confidentiality of information at rest for which explicit read authorization is supported; and + support the protection of the confidentiality of information in transit + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to erase all information, for which explicit read authorization is supported, from components to be released from active service and/or decommissioned. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When cryptography is utilized, the product shall use cryptographic security mechanisms according to internationally recognized and proven security practices and recommendations.Note: This requirement affects all requirements in which cryptographic algorithms or keys are used. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall have unique keys for the implemented key-based cryptographical functions. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall prevent access to its private keys for the implemented key-based cryptographical functions. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall only be able to process personal data to the extent required for a proper use of the product according to the General Data Protection Regulation + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall support a segmented network to support zones and conduits, as needed, to support the broader network architecture based on logical segmentation and criticality. + + + + + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + A network device at a zone boundary shall provide the capability to monitor and control communications at zone boundaries to enforce the compartmentalization defined in the risk based zones and conduits model. Note: Not applicable for devices as long as the devices do not act at the network boundaries (eg switch). + + + + + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The network component shall provide the capability to deny network traffic by default and allow network traffic by exception (also termed deny all, permit by exception).Note: Not applicable for devices as long as the devices do not act at the network boundaries (eg switch). + + + + + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + A network device at a zone boundary shall provide the capability to protect against general purpose, person-to-person messages from being received from users or systems external to the control system. + + + + + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability for authorized humans and/or tools to access audit logs on a read-only basis. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to be continuously monitored using commonly accepted security industry practices and recommendations to detect, characterize and report security breaches in a timely manner. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to maintain essential functions when operating in a degraded mode as the result of a DoS event. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to mitigate the effects of information and/or message flooding types of DoS events. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to limit the use of resources by security functions to protect against resource exhaustion. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to participate in system level backup operations in order to safeguard the product state (user- and system-level information). The backup process shall not affect the normal product operations. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to validate the integrity of backed up information prior to the initiation of a restore of that information. + + + + + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to be recovered and reconstituted to a known secure state after a disruption or failure. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to be configured according to recommended network and security configurations as described in guidelines provided by the control system supplier. The product shall provide an interface to the currently deployed network and security configuration settings. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to specifically restrict the use of unnecessary functions, ports, protocols and/or services. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall provide the capability to support a control system component inventory. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product shall be by default pre-configured in a way to ensure the highest appropriate level of security according to the corresponding security concept + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall describe all security related information in a common chapter or in a separate document. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall describe the security defense in depth strategy for the product to support installation, operation and maintenance that includes: + security capabilities implemented by the product and their role in the defense in depth strategy; + threats addressed by the defense in depth strategy; and + product user mitigation strategies for known security risks associated with the product, including risks associated with legacy code. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall describe the security defense in depth measures expected to be provided by the external environment in which the product is to be used. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall include guidelines for hardening the product when installing and maintaining the product.The guidelines shall include, but are not limited to, instructions, rationale and recommendations for the following: + integration of the product, including third-party components, with its product security context; + integration of the product’s application programming interfaces/protocols with user applications; + applying and maintaining the product’s defense in depth strategy; + configuration and use of security options/capabilities in support of local security policies, and for each security option/capability: + + its contribution to the product’s defense in depth strategy; + descriptions of configurable and default values that include how each affects security along with any potential impact each has on work practices; and + setting/changing/deleting its value; + + instructions and recommendations for the use of all security-related tools and utilities that support administration, monitoring, incident handling and evaluation of the security of the product; + instructions and recommendations for periodic security maintenance activities; + instructions for reporting security incidents for the product to the product supplier; and + description of the security best practices for maintenance and administration of the product. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall include guidelines for removing the product from use.The guidelines shall include, but are not limited to, instructions and recommendations for the following: + removing the product from its intended environment; + including recommendations for removing references and configuration data stored within the environment; + secure removal of data stored in the product; and + secure disposal of the product to prevent potential disclosure of data contained in the product that could not be removed as described in 3. above. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall describe: + responsibilities and actions necessary for users, including administrators, to securely operate the product; and + assumptions regarding the behavior of the user/administrator and their relationship to the secure operation of the product. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall define user account requirements and recommendations associated with the use of the product that includes, but is not limited to: + user account permissions (access control) and privileges (user rights) needed to use the product, including, but not limited to operating system accounts, control system accounts and data base accounts; and + default accounts used by the product (for example, service accounts) and instructions for changing default account names and passwords. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation and software installers shall contain the unchanged "Industrial Security Disclaimer" released by Siemens Legal department. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall describe all communication channels (ports and communication protocols) available in the product together with their corresponding default state (e.g., active/inactive), configuration options and implemented security mechanisms. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall include a list of all security events generated by the product. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall include instructions how to verify the integrity of all scripts, executables and other important files included in the product. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The user documentation shall include instructions how to verify the authenticity of all scripts, executables and other important files included in the product. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The user documentation about product security updates shall be made available to product users that includes but is not limited to: + the product version number(s) to which the security patch applies; + instructions on how to apply approved patches manually and via an automated process; + description of any impacts that applying the patch to the product can have, including reboot; + instructions on how to verify that an approved patch has been applied; and + risks of not applying the patch and mediations that can be used for patches that are not approved or deployed by the asset owner. + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The user documentation about dependent component or operating system security updates shall be made available to product users that includes but is not limited to: + stating whether the product is compatible with the dependent component or operating system security update; and + for security updates that are unapproved by the product vendor, the mitigations that can be used in lieu of not applying the update + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + When the product processes personal data, the product user documentation shall describe the following issues: + Purpose of the data collection / processing + Kind of / categories of personal data which are processed + Collection of log files or other tracking data + + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The product user documentation shall include information about the product security patch policy. + + + + + rmf-29b121ea-fca6-4247-9200-89bb02922eeb + rmf-b894f6af-9f96-4560-ba02-fcfa310f5e41 + rmf-0087acde-2b84-4aa8-824d-ac3575caecb7 + rmf-39851fee-2da2-4c3d-ad17-fefc68988cb2 + rmf-0dcaf791-8498-4e4d-bf5e-9993ce0c923c + + + rmf-7b1a1283-3e4e-46d1-9279-732abdf84174 + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The electronic user documentation shall provide the capability or support to check its integrity. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The electronic user documentation shall provide the capability or support to check its authenticity. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + The user documentation shall describe all control elements that are not able to support the capability to determine whether a given human user took a particular action. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576be + + + + + rmf-17f22930-cdbb-4551-b8d2-75071698b8ca + + + + + rmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892 + + + + + rmf-7b033466-4820-4697-9909-aef5d7e6c154 + + + + + rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9 + + + Where applicable the user documentation shall describe which protection from malicious code mechanisms are compatible with the product and note any special configuration requirements. + + + + + rmf-1e2c8692-33c6-4363-b8bd-4335bb5e84b1 + + + rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73 + + + + + rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0 + + + + + _7f563cb8-8b67-48e5-8096-773888ec2821 + + + + + + + polarion_live_document + + + + + rmf-6cf63a7e-6ab6-4c2a-875a-4e4c3dfd58b8 + + + + + rmf-5061cb34-e0f7-4e83-aae9-4970777976e8 + + + + + rmf-52dce088-607b-417f-a090-2258c29932ef + + + + + rmf-6ef0e1de-4288-434e-a363-dbf8962c5e4b + + + + + rmf-b2df728c-846d-4366-81f5-0e2970fbff38 + + + + + rmf-291c32de-b8fe-48bc-a587-a76233a56e32 + + + + + rmf-f7200732-091a-46e4-be5d-01a6d7dd3937 + + + + + rmf-208ab7a1-75e2-487d-b5f0-419af76cfd37 + + + + + rmf-75f96b6a-5db2-484f-9365-cbd915412c01 + + + + + rmf-4e0de655-8e0a-4e32-9f7d-dcf1173c5a23 + + + + + rmf-5124a5be-09d5-41ff-b35f-73c1daca7b95 + + + + + rmf-c2e5f6fa-6216-487f-8260-e3e3dea11353 + + + + + rmf-97b54750-acfb-4975-8589-2607bcf227a5 + + + + + + + + + rmf-193f4355-9a12-427a-b5cf-13186e0399ea + + + + + rmf-8431e9b0-3eec-4e21-9845-b6484e6d3ea7 + + + + + rmf-df8fa006-fa81-433e-b7be-b1826d6439b5 + + + + + rmf-59226f1d-ea97-49a5-860d-b1596240fc71 + + + + + rmf-1039d15f-85ea-4c11-8566-8696ad5d4e51 + + + + + rmf-06761963-854b-45c4-9251-2208ac10db98 + + + + + rmf-d2233a10-3d91-493a-b7b8-e3b1da67fde5 + + + + + rmf-8b4581df-d1f6-4de3-9e92-5465b9407d8f + + + + + rmf-eaa0ac63-b5f1-4426-b922-050369aa6f99 + + + + + rmf-5ffeb342-9504-4361-bef5-25c4c134b958 + + + + + rmf-52b0a9b4-6796-4f94-bed2-067b5dad098e + + + + + rmf-19291005-8a22-4357-8930-cea3afc10444 + + + + + rmf-d290c960-86f8-4b01-9eea-312e48358974 + + + + + rmf-1e4c12ca-93a9-4412-8655-95250ba3ae16 + + + + + rmf-aa750814-b232-4433-8909-d91f7520e8b4 + + + + + rmf-8a18f3bf-c06a-4682-bf59-217d7cbf5dde + + + + + rmf-5b096766-1259-4eca-acf7-3b2f2372facc + + + + + rmf-39aa1c9e-45ff-4260-b229-8c446886b070 + + + + + rmf-7da4542b-c3f3-490e-abf4-041c29664951 + + + + + rmf-de902e47-ef88-4862-b213-255f288ca125 + + + + + rmf-dab5d01e-a1d7-44e4-8aa8-352fb3ebc729 + + + + + + + rmf-71887b01-6b8c-4655-bc24-f2644e52ef19 + + + + + rmf-d91e4cc5-8350-435a-b03b-e16db5672988 + + + + + rmf-555e4e15-94fd-466e-bef0-dd509deeef8e + + + + + rmf-c8115c63-429d-4969-b729-d698a4c0b5a1 + + + + + rmf-7a911e35-ecfa-4b42-96cf-544b226fd267 + + + + + rmf-0be8a035-733a-4038-883c-c7d3591928e9 + + + + + rmf-3fc6d128-4ad0-4dda-997e-ff4eda4f285e + + + + + rmf-6a277309-ba45-4158-a73b-49c736a71f1f + + + + + rmf-9ece02e0-27cd-4def-b3e4-5cf1739d00e7 + + + + + rmf-0fbebd9a-9742-4af6-89aa-bc784983ed08 + + + + + rmf-d2b3272d-6982-426a-bb96-167279d98754 + + + + + rmf-8a3eb266-c4d5-473a-9498-132e29a5b0df + + + + + rmf-ea759c0c-6b8d-4c56-a591-a62f8bf99bfc + + + + + rmf-fe4d7fd9-4116-4923-b3c1-e5b72fb9c8d5 + + + + + rmf-081bf1f3-227e-4b31-9482-3b53e81c6bd9 + + + + + rmf-c380c145-e35a-4eee-8e56-163290194795 + + + + + rmf-af8c0553-8627-4a4b-ae44-3c1320cbf8f7 + + + + + + + rmf-fdf3655e-342e-444d-a093-72a7a117590b + + + + + rmf-9f790b59-d74c-44a1-bf69-36c9fac7302b + + + + + rmf-6e49a26a-6d71-40a9-bc34-9e7ae54d58cd + + + + + rmf-a3fa4216-753a-4e60-8ceb-2f43b041caea + + + + + rmf-e9d94494-92c8-46cd-bcfe-f1a8f64e2163 + + + + + rmf-ea770d84-fba7-41cf-b002-460a8ec70d8b + + + + + rmf-4164f980-8466-4edc-9425-a8831feae0a1 + + + + + rmf-bfa36bdc-f7c2-43b5-8b68-37dd7ebcf05a + + + + + rmf-3186ed05-f3b1-48dc-8f6a-8b222e80f474 + + + + + rmf-fe5488a5-22ca-4818-93dd-ed21cad1de8b + + + + + rmf-8940c931-8899-42f9-bc96-342c277a5ebc + + + + + rmf-c462e39c-9bac-4a27-9367-46e76cf6ccdd + + + + + rmf-23160782-3b1d-4645-93be-122f382e71a7 + + + + + rmf-cf9fe5e0-aa09-41a7-bebf-6a9474eed003 + + + + + rmf-ae5f023e-dc2f-455f-ba1b-7f56c36c6012 + + + + + rmf-1651e372-6d8b-4745-9df9-0c995bab1bab + + + + + rmf-106666cf-16e4-4142-b6ca-33b45047e005 + + + + + rmf-0480da2c-d131-466f-8137-4ba69f5b04cf + + + + + rmf-631a168b-e003-4ff4-9a35-183adf71db55 + + + + + rmf-c7f2551f-9713-44fb-adf7-e34e0e29e418 + + + + + rmf-a2f557b5-c526-4a9f-87a3-d865bfd2c161 + + + + + rmf-c4e1e9d6-fa07-41ae-9e84-86da9108c53e + + + + + rmf-3ebf1be8-f0fd-4689-8516-76bf4b92bad6 + + + + + + + rmf-39ef640a-bbed-4905-9a02-2b21abd3f34c + + + + + rmf-47d09ff2-0fcb-47cd-94da-aa8a862f391e + + + + + rmf-25151e28-c28a-415b-b6c4-f894d3d84533 + + + + + rmf-2a319343-32f8-494c-8c43-c05c17746db9 + + + + + rmf-790bb3b2-7671-49d0-8973-427b1273c724 + + + + + rmf-3d9d2655-28e9-461f-b467-1fc3284b0164 + + + + + rmf-20c91409-1bfa-4636-aac7-a30608738593 + + + + + + + rmf-e15c2dbb-66a9-4074-bf66-510b0247b855 + + + + + rmf-1d8dd6d6-aa4d-49f0-b306-426de5bd4f7d + + + + + rmf-e47cef44-5f66-4489-84f8-a4162e42480c + + + + + rmf-9370ec7f-b59d-44da-b4ff-891faa12f754 + + + + + rmf-862c072d-2678-4f52-ab65-14a71da21557 + + + + + + + rmf-f82b8634-7b01-41a1-a76e-8638e28e267e + + + + + rmf-6ce6beb3-e016-4918-849f-d4ee68c26b89 + + + + + rmf-bfe1564d-94e0-478a-926b-7df36c1d3b29 + + + + + + + rmf-96bb46db-b1fe-4a50-bb28-e2358d000aad + + + + + rmf-e268812e-9d4f-446f-8a49-3aa9bd48ca35 + + + + + rmf-718b2043-0c33-4972-a678-b6f6a6d2031c + + + + + rmf-044300b9-d432-4cff-8e33-1fe0dcdb7c75 + + + + + rmf-873c8dfb-7bf9-406b-a84a-14e527faf314 + + + + + rmf-f7201794-0242-4645-8df9-b2b309bddf9f + + + + + rmf-90bf0af6-1a4f-45c0-bfa1-faa3d365764f + + + + + rmf-f327d9dd-7e3d-420d-b6f1-3d812bee6b36 + + + + + rmf-9c9bc8b6-b7d0-4693-955f-b19a8867eb53 + + + + + rmf-bf77fa18-9e47-4af9-881c-bcf9006144a2 + + + + + rmf-71526124-d79e-4090-b896-896b55d505a9 + + + + + + + rmf-9117dd5d-5257-4a30-9d1f-0e57711ba99b + + + + + rmf-be6e89b1-a947-47ef-9fb9-575e5e45b4cb + + + + + rmf-1862eca3-b161-4f8f-9e25-5caebb60bc5c + + + + + rmf-5f7c74d2-53c3-4855-8cbd-75e553457984 + + + + + rmf-05e52201-7da2-4ed3-b45f-e9437683ba62 + + + + + rmf-6040cea8-3a82-489c-9ab2-0480029adccd + + + + + rmf-5dd291a3-88b5-4735-a761-4ef95cc2945d + + + + + rmf-28985b9e-3552-479a-8d3e-257a9e6141c2 + + + + + rmf-86d99b76-bfdd-495c-82e2-f175ba1d4b32 + + + + + rmf-10650dfd-f6f3-497d-a6db-6b4ad8bfb2c5 + + + + + rmf-855713c7-6fcb-4862-9e37-8a0138b7eb6a + + + + + rmf-432fa6d9-d9d2-4ab5-af47-fa312b82f9e2 + + + + + rmf-6ae658ae-4ed0-423c-808b-551b44de337c + + + + + rmf-a2cdecdf-0889-468c-84a5-bf5f7bb7ece2 + + + + + rmf-3c60cb72-2fa1-41f7-9b0d-9e19598b9646 + + + + + rmf-c8816614-b27b-4a89-abee-44bba634ccef + + + + + rmf-c2c3e91a-09bb-4713-b600-cc0ab5b85eef + + + + + rmf-4fd2ca7a-614f-452f-a7d7-6b5079943abc + + + + + rmf-0e79fe52-e0a5-4c38-ad7f-47d560769d7e + + + + + rmf-001d2ece-c5b2-47c9-a828-208ce11d7f01 + + + + + rmf-705464d4-ee68-4c83-9058-75b5d1d06488 + + + + + + + + + + + +_0b3ff8cc-e9a2-4074-b334-fc165a26cde4DDC_FULL_MODULE_4d40986d-5183-4771-a3c3-34edd8d3c10armf-7997ce61-7e97-4fe2-a6fe-9c5acd1d5a40rmf-d65663e6-7fc8-4f70-aeba-f9ef7e73a8b6rmf-b8e1665a-cfa3-4dd7-8acf-5bc2faf67a9frmf-05a5dc11-0032-482a-b9ae-530dc233538armf-4b559a8a-b9e3-472e-89e9-b4c3777528darmf-17f22930-cdbb-4551-b8d2-75071698b8carmf-aa66e7ba-262c-49a3-90d3-fcb2649c9892rmf-b808a3f4-7803-48f2-93bf-f29f6537f4b0rmf-7b033466-4820-4697-9909-aef5d7e6c154rmf-0e1beedd-af3f-442d-99aa-61a986ea13f9rmf-04580580-fe2a-4a76-9d91-3cf91031fbbcrmf-de3686a0-e87f-4cee-a80f-2144e25cf920rmf-c80caf1a-a7b4-4428-8a86-ca91c2f576bermf-7b1a1283-3e4e-46d1-9279-732abdf84174rmf-d8b2593c-5407-4c7b-9bec-47a1ca358a73rmf-84c981d2-7fcb-447c-ae15-bb7bfa8222ec \ No newline at end of file diff --git a/examples/reqif/MI_General_SecurityRequirements.reqifz b/examples/reqif/MI_General_SecurityRequirements.reqifz new file mode 100644 index 0000000..a9fffda Binary files /dev/null and b/examples/reqif/MI_General_SecurityRequirements.reqifz differ diff --git a/src/xml/reqif/reqif_elements_parser.cpp b/src/xml/reqif/reqif_elements_parser.cpp index 7e76a8f..884232e 100644 --- a/src/xml/reqif/reqif_elements_parser.cpp +++ b/src/xml/reqif/reqif_elements_parser.cpp @@ -1170,6 +1170,7 @@ COMPLEX_PARSER(AttributeValueParser, && ! ns.empty()) { ::reqif::Element *el = s.m_parser->post(); + //std::cout<<"AttributeValue::Definition: "<<(*el)< %s" + ANTCC_PARSER_DEBUG_TASK("AttributeDefinitionRefParser Attribute: %s-> %s" ,name.c_str() ,val.c_str()); if (name == "IDENTIFIER")