Resulting Requirements Clause Samples

Resulting Requirements. This section contains the resulting security requirements for the RESOLVD project’s developed technology, derived from the threat risk assessment and modelling process described above. It consists of the requirements per communication protocol (for communications security), the requirements per device (for device security) and the building blocks, the security measures are composed of. The first two subsections therefore consequently refer to the last one. Apart from the measures in the subchapters, it is crucial to apply the concept of Defence-in-Depth [31] in order to mitigate cascading effects of threats, the circumvention of single security policies or the corruption of a single device. That is, simply put, to fulfil all requirements one by one and therefore making the best effort for each component’s security independently without unconditional trust to other components instead of relying on a single line of defence. Note: Some of the requirements in the tables in Sections 4.2 and 4.3 are marked with an asterisk (*). These are always marked pairwise and pose mutal alternatives, meaning that only one of two requirements has to be fulfilled. Also, on one occasion, a double asterisk (**) occurs. This marks a last-resort measure if both asterisk-marked requirements are impossible to fulfil.