network security

#

Security Capability

Implementation Method

Inspection Method

Notes

1

Automatic Logout (ALOF)

Web auto logout, Access token expire

-

-

2

Audit (AUDT)

Web access control, Remote SSH access control

-

-

3

Authorization (AUTH)

-

-

-

4

Node Authentication (NAUT)

-

-

-

5

Personnel Authentication (PAUT)

Remote MQTT control

-

-

6

Connectivity (CONN)

-

-

-

7

Physical Protection (PLOK)

-

-

-

8

System Hardening (SAHD)

-

-

-

9

Data De-identification and Anonymization (DIDT)

-

-

-

10

Data Integrity and Authenticity (IGAU)

-

-

-

11

Data Backup and Disaster Recovery (DTBK)

-

-

-

12

Data Storage Confidentiality and Integrity (STCF)

Account password must be stored in echobox in encrypted form, Model must be stored in echobox in encrypted form

-

-

13

Data Transmission Confidentiality (TXCF)

Signaling transmission must be encrypted with TLS, Media transmission must be encrypted with SRTP

-

Only internal transmission can relax requirements

14

Data Transmission Integrity (TXIG)

-

-

-

15

Network Security Patch Upgrade (CSUP)

-

-

-

16

Off-the-Shelf Software List (SBOM)

-

-

-

17

Off-the-Shelf Software Maintenance (RDMP)

Third-party component security upgrade, Product network security upgrade

-

-

18

Network Security Use Guidance (SGUD)

Document identification, Product identification, Security features can be tested and verified, Product intended use and configuration of security precautions, Product intended use scenarios, Network security-related product configuration and product environment deployment environment requirements or recommendations

-

-

19

Network Security Feature Configuration (CNFS)

-

-

-

20

Emergency Access (EMRG)

-

-

-

21

Remote Access and Control (RMOT)

-

-

-

22

Malware Detection and Protection (MLDP)

-

-

-