network security
# |
Security Capability |
Implementation Method |
Inspection Method |
Notes |
|---|---|---|---|---|
1 |
Automatic Logout (ALOF) |
Web auto logout, Access token expire |
- |
- |
2 |
Audit (AUDT) |
Web access control, Remote SSH access control |
- |
- |
3 |
Authorization (AUTH) |
- |
- |
- |
4 |
Node Authentication (NAUT) |
- |
- |
- |
5 |
Personnel Authentication (PAUT) |
Remote MQTT control |
- |
- |
6 |
Connectivity (CONN) |
- |
- |
- |
7 |
Physical Protection (PLOK) |
- |
- |
- |
8 |
System Hardening (SAHD) |
- |
- |
- |
9 |
Data De-identification and Anonymization (DIDT) |
- |
- |
- |
10 |
Data Integrity and Authenticity (IGAU) |
- |
- |
- |
11 |
Data Backup and Disaster Recovery (DTBK) |
- |
- |
- |
12 |
Data Storage Confidentiality and Integrity (STCF) |
Account password must be stored in echobox in encrypted form, Model must be stored in echobox in encrypted form |
- |
- |
13 |
Data Transmission Confidentiality (TXCF) |
Signaling transmission must be encrypted with TLS, Media transmission must be encrypted with SRTP |
- |
Only internal transmission can relax requirements |
14 |
Data Transmission Integrity (TXIG) |
- |
- |
- |
15 |
Network Security Patch Upgrade (CSUP) |
- |
- |
- |
16 |
Off-the-Shelf Software List (SBOM) |
- |
- |
- |
17 |
Off-the-Shelf Software Maintenance (RDMP) |
Third-party component security upgrade, Product network security upgrade |
- |
- |
18 |
Network Security Use Guidance (SGUD) |
Document identification, Product identification, Security features can be tested and verified, Product intended use and configuration of security precautions, Product intended use scenarios, Network security-related product configuration and product environment deployment environment requirements or recommendations |
- |
- |
19 |
Network Security Feature Configuration (CNFS) |
- |
- |
- |
20 |
Emergency Access (EMRG) |
- |
- |
- |
21 |
Remote Access and Control (RMOT) |
- |
- |
- |
22 |
Malware Detection and Protection (MLDP) |
- |
- |
- |