From fa7344f570bfa67d766ca30e8fdb07fd5292eac7 Mon Sep 17 00:00:00 2001 From: Marko Stojanovic Date: Tue, 6 Feb 2024 10:50:12 +0100 Subject: [PATCH] Delete IDS-criteria --- README.md | 1 - SUMMARY.md | 1 - doc/IDS-criteria.md | 107 -------------------------------------------- 3 files changed, 109 deletions(-) delete mode 100644 doc/IDS-criteria.md diff --git a/README.md b/README.md index 53926b5..1c15873 100644 --- a/README.md +++ b/README.md @@ -65,7 +65,6 @@ Please [click here](https://engineering-ing-inf-rd.gitbook.io/true-connector/), * [Docker image signing and verification](doc/cosign.md) * [Life cycle](doc/life_cycle.md) * [Security](doc/security.md) - * [IDS-criteria](doc/IDS-criteria.md) * [Roadmap](doc/roadmap.md) * [Traceability matrix](doc/traceability_matrix.md) * [License](doc/license.md) diff --git a/SUMMARY.md b/SUMMARY.md index ab3b481..6fa31c9 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -52,7 +52,6 @@ * [Docker image signing and verification](doc/cosign.md) * [Life cycle](doc/life_cycle.md) * [Security](doc/security.md) -* [IDS-criteria](doc/IDS-criteria.md) * [Roadmap](doc/roadmap.md) * [Traceability matrix](doc/traceability_matrix.md) * [License](doc/license.md) diff --git a/doc/IDS-criteria.md b/doc/IDS-criteria.md deleted file mode 100644 index 0332d7c..0000000 --- a/doc/IDS-criteria.md +++ /dev/null @@ -1,107 +0,0 @@ -In the table below is an overview of all criteria for the base profile and -whether it is already implemented or not. - -| TRUE Connector | No. | Title | Note | -|:---:|:------------|:------------|:------------| -| x | COM 01 | Protected connection | | -| x | COM 02 | Mutual authentication | | -| x | COM 03 | State of the art cryptography | | -| x | USC 01 | Definition of usage policies | | -| - | USC 02 | Sending of usage policies | | -| x | USC 03 | Usage policy enforcement | | -| x | INF 01 | Self-Description (at Connector) | | -| x | INF 02 | Self-Description (at Broker) | | -| - | INF 03 | Self-Description content | | -| x | INF 04 | Self-Description evaluation | | -| x | INF 05 | Dynamic attribute tokens | | -| x | IAM 01 | Connector identifier | | -| - | IAM 02 | Time Service | | -| - | IAM 03 | Online certificate status check | | -| - | IAM 04 | Attestation of dynamic attributes | | -| x | BRK 01 | Broker service inquiries | | -| x | BRK 02 | Broker registration | | -| x | BRK 03 | Broker registration update | | -| x | OS 01 | Container support | | -| - | APS 01 | App signature | | -| - | APS 02 | App signature verification | | -| - | APS 05 | App installation | | -| - | APS 06 | App Store | | -| - | AUD 01 | Access control logging | | -| - | AUD 02 | Data access logging | | -| - | AUD 03 | Configuration changes logging | | -| x | CR 1.1 | Human user identification and authentication | | -| - | CR 1.1 (1) | Unique identification and authentication | | -| - | CR 1.2 | Software process and device identification and authentication | | -| - | CR 1.2 (1) | Unique identification and authentication | | -| - | CR 1.3 | Account management | | -| - | CR 1.4 | Identifier management | | -| - | CR 1.5 | Authenticator management | | -| - | CR 1.7 | Strength of password-based authentication | | -| x | CR 1.8 | Public key infrastructure certificates | | -| - | CR 1.9 | Strength of public key-based authentication | | -| x | CR 1.10 | Authenticator feedback | | -| x | CR 1.11 | Unsuccessful login attempts | | -| - | CR 1.12 | System use notification | | -| NA | CR 1.14 | Strength of symmetric key-based authentication| Using asymetric key pair | -| x? | CR 2.1 | Authorization enforcement | | -| NA | CR 2.2 | Wireless use control | We do not have wireless control| -| NA | CR 2.5 | Session lock | We do not have sessions | -| x | CR 2.8 | Auditable events | | -| x? | CR 2.9 | Audit storage capacity | | -| x | CR 2.10 | Response to audit processing failures | | -| x | CR 2.11 | Timestamps | | -| x? | CR 2.12 | Non-repudiation | | -| x | CR 3.1 | Communication integrity | | -| x? | CR 3.1 (1) | Communication authentication | | -| - | CR 3.3 | Security functionality verification | | -| - | CR 3.4 | Software and information integrity | | -| x? | CR 3.5 | Input validation | | -| - | CR 3.6 | Deterministic output | | -| x | CR 3.7 | Error handling | | -| NA | CR 3.8 | Session integrity| We do not have sessions | | -| x? | CR 4.1 | Information confidentiality | | -| - | CR 4.2 (1) | Erase of shared memory resources | | -| x? | CR 4.3 | Use of cryptography | | -| x? | CR 5.1 | Network segmentation | | -| x? | CR 6.1 | Audit log accessibility | | -| - | CR 7.1 | Denial of service protection | | -| - | CR 7.2 | Resource management | | -| - | CR 7.3 | Control system backup | | -| - | CR 7.4 | Control system recovery and reconstitution | | -| - | CR 7.6 | Network and security configuration settings | | -| - | CR 7.7 | Least functionality | | -| - | SAR 2.4 | Mobile code | | -| - | SAR 2.4 (1) | Mobile code integrity check | | -| - | SAR 2.4 (1) | Protection from malicious code | | -| - | NDR 1.6 | Wireless Access Management | | -| - | NDR 1.13 | Access via untrusted networks | | -| - | NDR 2.4 | Mobile code | | -| - | NDR 3.2 | Protection from malicious code | | -| - | NDR 3.10 | Support for updates | | -| - | NDR 3.14 | Integrity of the boot process | | -| - | NDR 5.2 | Zone boundary protection | | -| - | NDR 5.3 | General purpose, person-to-person communication restrictions | | -| x | D_AD.1 | Secure initialisation | | -| - | D_AD.2 | Tamper protection | | -| - | D_AD.3 | Security-enforcing mechanisms | | -| x | D_IS.1 | Interface purpose and usage | | -| - | D_IS.2 | Interface parameters | | -| x? | D_DD.1 | Subsystem structure | | -| x? | G_AP.1 | Acceptance procedures | | -| x? | G_AP.2 | Installation procedures | | -| x? | G_OG.1 | Interface usage for each user role | | -| - | G_OG.2 | Possible modes of operation | | -| x | S_CM.1 | Unique component reference | | -| x | S_CM.2 | Consistent usage of component reference | | -| - | S_CM.6 (1) | Configuration list content (1) | | -| - | S_CM.7 | Unique identification based on configuration list | | -| - | S_CM.8 | Developer Information | | -| - | S_DL.1 | Secure delivery | | -| x? | S_FR.1 | Tracking of reported security flaws | | -| x? | S_FR.2 | Security flaw description | | -| - | S_FR.3 | Status of corrective measures | | -| - | T_CA.1 | Test coverage analysis | | -| - | T_CA.2 | Test procedures for subsystems | | -| - | T_TD.1 | Test documentation | | -| - | T_TD.2 | Test configuration | | -| - | T_TD.3 | Ordering Dependencies | |