Fulfillment of the requirements (FR3)

Requirement

 

SL 1

Recommended compensatory measures at system level

CR 3.1 – Communication integrity

Communication is protected by a cyclic redundancy check (CRC).

M1, M3, M5, M6

CR 3.1 RE (1) – Authentication of communication

o

EDR 3.2 – Protection against malicious codes

M1, M3

CR 3.3 – Verification of the IT security functionality

The system integrator must provide the operator with instructions for checking the required IT security measures.

CR 3.3 RE (1) – Verification of IT security functionality during ongoing operation

o

CR 3.4 – Software and information integrity

M1, M3

CR 3.4 RE (1) – Authenticity of the software and information

o

CR 3.4 RE (2) – Automated notification of IT security violations

o

CR 3.5 – Input validation

CR 3.6 – Predetermined output states

Responses to errors such as network timeout or network overload are defined.

CR 3.7 – Troubleshooting

CR 3.8 – Session integrity

o

CR 3.9 – Protection of audit information

o

CR 3.9 RE (1) – Event records on write-once storage media

o

EDR 3.10 – Support for updates

M1, M3

EDR 3.10 RE (1) – Authenticity and integrity of updates

o

EDR 3.11 – Protection against and detection of physical tampering

o

EDR 3.11 RE (1) – Notification of a tampering attempt

o

EDR 3.12 – Provision of manufacturer trust anchors

o

 

EDR 3.13 – Provision of operator trust anchors

o

EDR 3.14 – Integrity of boot processes

Integrity is protected by a cyclic redundancy check (CRC).

M1, M3

EDR 3.14 RE (1) – Authenticity of the boot process

o