EN 18031-2 2024原版完整文件.docx

上传人:暗伤 文档编号:101405841 上传时间:2024-10-25 格式:DOCX 页数:213 大小:1.58MB
返回 下载 相关 举报
EN 18031-2 2024原版完整文件.docx_第1页
第1页 / 共213页
EN 18031-2 2024原版完整文件.docx_第2页
第2页 / 共213页
点击查看更多>>
资源描述

《EN 18031-2 2024原版完整文件.docx》由会员分享,可在线阅读,更多相关《EN 18031-2 2024原版完整文件.docx(213页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、EN 18031-2:2024 (E)EUROPEAN STANDARDEN 18031-211August 2024NORME EUROPEENNE EURoPAISCHE NORMICS 33.060.20English versionCommon security requirements for radio equipment - Part2: radio equipment processing data, namely Internetconnected radio equipment, childcare radio equipment,toys radio equipment

2、and wearable radio equipmentExigences de securite communes applicables auxequipements Fadioelectriques - Partie 2 : Equipementsradioelectriques qui traitent des donnees, a savoir lesequipements Fadioelectriques connectes a interneles equipements radioelectriques destines a la garded,enfants, les jou

3、ets dotes d,equipementsradioelectriques et les equipements radioelectriquesportablesGemeinsame Sicherheitsanforderungen furdatenverarbeitende Funkanlagen, namentlich mit demInternet verbundene Funkanlagen, in derKinderbetreuung eingesetzte FunkanIagen, inSpieIzeug eingesetzte Funkanlagen sowie an ei

4、nem Teildes menschlichen Korpers oder an Kleidungsstuckengetragene FunkanlagenThis European Standard was approved by CEN on 1 August 2024.CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status

5、of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN and CENELEC member.This European Standard exists in three official versions (English, Fr

6、ench, German). A version in any other language made by translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions.CEN and CENELEC members are the national standards bodies and n

7、ational electrotechnical committees OfAUStria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania,

8、Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Tiirkiye and United Kingdom.ContentsPageEuropean foreword5Introduction61 Scope72 Normative references73 Terms and definitions74 Abbreviations125 Application of this document136 Requirements166.1 ACM Access control mechanism166.1.1 ACM-1 Applica

9、bility of access control mechanisms166.1.2 ACM-2 Appropriate access control mechanisms216.1.3 ACM-3 Default access control for children in toys266.1.4 ACM-4 Default access control to children,s privacy assets fortoysand childcareequipment306.1.5 ACM-5 Parental/Guardian access controls for children i

10、n toys366.1.6 ACM-6 Parental/Guardian access controls for other entities* accessto managedchildren,s privacy assets in toys406.2 AUM Authentication mechanism456.2.1 AUM-1 Applicability of authentication mechanisms456.2.2 AUM-2 Appropriate authentication mechanisms556.2.3 AUM-3 Authenticator validati

11、on616.2.4 AUM-4 Changing authenticators656.2.5 AUM-5 Password strength686.2.6 AUM-6 Brute force protection766.3 SUM Secure update mechanism806.3.1 SUM-1 Applicability of update mechanisms806.3.2 SUM-2 Secure updates836.3.3 SUM-3 Automated updates886.4 SSM Secure storage mechanism916.4.1 SSM-1 Applic

12、ability of secure storage mechanisms916.4.2 SSM-2 Appropriate integrity protection for secure storage mechanisms966.4.3 SSM-3 Appropriate confidentiality protection for secure storagemechanisms. 1016.5 SCM Secure communication mechanism1066.5.1 SCM-1 Applicability of secure communication mechanisms1

13、066.5.2 SCM-2 Appropriate integrity and authenticity protection for secure communicationmechanisms1126.5.3 SCM-3 Appropriate confidentiality protection for securecommunicationmechanisms1186.5.4 SCM-4 Appropriate replay protection for secure communicationmechanisms. 1236.6 LGM Logging mechanism1286.6

14、.1 LGM-1 Applicability of logging mechanisms1286.6.2 LGM-2 Persistent storage of log data1316.6.3 LGM-3 Minimum number of persistently stored events1346.6.4 LGM-4 Time-related information of persistently stored log data1376.7 DLM Deletion mechanism1406.7.1 DLM-1 Applicability of deletion mechanisms1

15、406.8 UNM User notification mechanism1446.8.1 UNM-1 Applicability of user notification mechanisms1446.8.2 UNM-2 Appropriate user notification content1486.9 CCK Confidential cryptographic keys1506.9.1 CCK-1 Appropriate CCKs1506.9.2 CCK-2 CCK generation mechanisms1546.9.3 CCK-3 Preventing static defau

16、lt values for preinstalled CCKs1596.10 GEC General equipment capabilities1636.10.1 GEC-1 Up-to-date software and hardware with no publicly known exploitable vulnerabilities1636.10.2 GEC-2 Limit exposure of services via related network interfaces1686.10.3 GEC-3 Configuration of optional services and

17、the related exposed network interfaces1726.10.4 GEC-4 Documentation of exposed network interfaces and exposed services via network interfaces1756.10.5 GEC-5 No unnecessary external interfaces1786.10.6 GEC-6 Input validation1816.10.7 GEC-7 Documentation of external sensing capabilities1866.11 CRY Cry

18、ptography1886.11.1 CRY-1 Best practice cryptography188Annex A (informative) Rationale194A.1 General194A.2 Rationale194A.2.1 Family of standards194A.2.2 Security by design194A.2.3 Threat modelling and security risk assessment195A.2.4 Functional sufficiency assessment196A.2.5 Implementation categories

19、196A.2.6 Assets197A.2.7 Mechanisms199A.2.8 Assessment criteria199A.2.9 Interfaces202Annex B (informative) Mapping with EN IEC 62443-4-2: 20192058.1 General2058.2 Mapping205Annex C (informative) Mapping with ETSIEN 303 645 (Cyber Security for Consumer Internet ofThings: Baseline Requirements)208C.l G

20、eneral208C.2 Mapping208Annex D (informative) Mapping with Security Evaluation Standard for IoT Platforms (SESIP) 214D.l General214D.2 Mapping214Annex ZA (informative) Relationship between this European Standard and the Delegated Regulation (EU) 2022/30 supplementing Directive 2014/53/EU of the Europ

21、ean Parliament and of the Council with regard to the application of the essential requirements referred to in Article 3(3), points (d) (e) and (f), of that Directive aimed to be covered217218BibliographyEuropean forewordThis document (EN 18031-2:2024 has been prepared by Technical Committee CEN/CENE

22、LEC JTC 13 nCybersecurity and Data Protection, the secretariat of which is held by DIN.This European Standard shall be given the status of a national standard, either by publication of an identical text or by endorsement, at the latest by February 2025, and conflicting national standards shall be wi

23、thdrawn at the latest by February 2025.Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN shall not be held responsible for identifying any or all such patent rights.This document has been prepared under a standardization request

24、 addressed to CEN-CENELEC by the European Commission. The Standing Committee of the EFTA States subsequently approves these requests for its Member States.For the relationship with EU Legislation, see informative Annex ZA, which is an integral part of this document.Any feedback and questions on this

25、 document should be directed to the users, national standards body. A complete listing of these bodies can be found on the CEN website.According to the CEN-CENELEC Internal Regulations, the national standards organisations of the following countries are bound to implement this European Standard: Aus

26、tria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden

27、, Switzerland, Tiirkiye and the United Kingdom.IntroductionVigilance is required from manufacturers to improve the overall resilience against cybersecurity threats caused by the increased connectivity of radio equipment 36 and the growing ability ofmalicious threat actors to cause harm to users, org

28、anizations, and society.The security requirements presented in this baseline standard are developed to improve the ability of radio equipment to protect its security and privacy assets against common cybersecurity threats and to mitigate publicly known exploitable vulnerabilities.It is important to

29、note that to achieve the overall cybersecurity of radio equipment, defence in depth best practices will be needed by both the manufacturer and user. In particular, no single measure will suffice to achieve the given objectives, indeed achieving even a single security objective will usually require a

30、 suite of mechanisms and measures. Throughout this document, the guidance material includes lists of examples. These examples given are only indicative possibilities, as there are other possibilities that are not listed, and even using the examples given will not be sufficient unless the mechanisms

31、and measures chosen are implemented in a coordinated fashion.1 ScopeThis document specifies common security requirements and related assessment criteria for radio equipment 36 processing personal data 40 or traffic data 41 or location data 41 for either internet connected radio equipment 37, radio e

32、quipment designed or intended exclusively for childcare 37; toys 39 and wearable radio equipment 37 (hereinafter referred to as equipment).2 Normative referencesThere are no normative references in this document.3 Terms and definitionsFor the purposes of this document, the following terms and defini

33、tions apply.ISO and IEC maintain terminology databases for use in standardization at the following addresses: ISO Online browsing platform: available at https:/www.iso.org/obp/ IEC Electropedia: available at https:/www.electropedia.org/3.1access control mechanismequipment functionality to grant, res

34、trict or deny access to specific equipments resourcesNote 1 to entry: Access to specific equipments resources can amongst others be: reading specific data; or writing specific data to equipments persistent storage; or performing a specific equipment functionality such as recording audio.3.2authentic

35、ationprovision of assurance that an entity is who or what it claims to beNote 1 to entry: An entity can amongst others claim to be: a specific human, owner of a user account, device, or service; or a member of specific groups such as an authorized group to access a specific equipments resource; or a

36、uthorized by another entity to access a specific equipments resource.3.3authentication mechanismequipment functionality to verify that an entity is who or what it claims to beNote 1 to entry: Typically, the verification is based on examining evidence from one or more elements of the categories:knowl

37、edge; andpossession; andinherence.3.4authenticatorsomething known or possessed, and controlled by an entity that is used for authenticationNote 1 to entry: Typically, it is a physical device or a password.EXAMPLE A password or token can be used as an authenticator.3.5assessment objectivestatement, p

38、rovided as part of the assessment input, which defines the reasons for performing the assessmentSOURCE: ISO/IEC 33001:2015, 3.2.6 293.6best practicemeasures that have been shown to provide appropriate security for the corresponding use case3.7brute force attackattack on a cryptosystem that employs a

39、 trial-and-error search of a set of keys, passwords or other data3.8communication mechanismequipment functionality that allows communication via a machine interface3.9confidential cryptographic keyconfidential security parameter, excluding passwords, which is used in the operation of a cryptographic

40、 algorithm or cryptographic protocol3.10confidential personal informationpersonal information whose disclosure can compromise the user,s or subscribers privacy3.11confidential privacy function configurationprivacy function configuration whose disclosure can compromise the user,s or subscribers priva

41、cy3.12confidential security parametersecurity parameter whose disclosure can compromise the user,s or subscribers privacy3.13denial of serviceprevention or interruption of authorized access to an equipment resource or the delaying of the equipment operations and functionsSOURCE :IEC 62443-1-1:2019,

42、3.2.42 30 modified3.14deviceproduct external to the equipment3.15entityuser, device, equipment or service3.16entropymeasure of the disorder, randomness or variability in a closed system3.17external interfaceinterface of an equipment that is accessible from outside the equipmentNote 1 to entry: Machi

43、ne, network, and user interfaces are specific types of external interfaces.3.18factory default statedefined state where the configuration settings and configuration of the equipment is set to initial valuesNote 1 to entry: A factory default state can include security updates, installed after the equ

44、ipment being placed on the market.3.19hard-codedsoftware development practice of embedding data directly into the source code of a program or other executable object3.20initializationprocess that configures the network connectivity of the equipment for operationNote 1 to entry: Initialization may pr

45、ovide the possibility to configure authentication features for a user or for network access.3.21interfaceshared boundary across which entities exchange information3.22justificationdocumented information providing evidence that a claim is true under the assumption of common expertiseNote 1 to entry:

46、Such evidence can be supported for example by: a description of the intended equipment functionality, a descriptions of equipments operational environment of use, a description of equipments technical properties such as security measures an analysis of relevant risks related to the operation of the

47、equipment within its reasonably foreseeable use and intended equipment functionality.3.23log datarecord(s of certain events (of processes on a computing equipment3.24logging mechanismequipment functionality to log internal activities3.25machine interfaceexternal interface between the equipment and a service or device3.26network interfaceexternal interface enabling the equipment to have or provide access to a networkNote 1 to entry: Examples for net

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 技术资料 > 技术方案

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁