| 1.1(Application Debug Interface Protection) |
- |
9166 |
|
- |
| 1.2(Device Unique Crypto Keys) |
- |
9166 |
|
- |
| 1.3(On-Chip Debug Interface Protection) |
- |
9166 |
|
- |
| 1.4(Trusted Execution) |
- |
9166 |
|
- |
| 1.5(Secure Storage) |
- |
9166 |
|
- |
| 1.6(Tamper Protection) |
- |
9166 |
|
- |
| 1.7(IP Protection) |
- |
9166 |
|
- |
| 1.8(Boot Image Validation) |
- |
9166 |
|
- |
| 1.9(Secure PRNG Usage) |
- |
9166 |
|
- |
| 2.1(Memory Protection Controls) |
- |
9166 |
|
- |
| 2.2(Data Transit Security) |
- |
9167 |
|
- |
| 2.3(Server Connection Validation) |
- |
9167 |
|
- |
| 2.4(Banned C Functions) |
- |
9167 |
|
- |
| 2.5(Software Bill of Materials) |
- |
9167 |
|
- |
| 2.6(Secure Code Review) |
- |
9167 |
|
- |
| 2.7(Digital Signature Pinning) |
- |
9167 |
|
- |
| 2.8(Reverse Engineering Protection) |
- |
9167 |
|
- |
| 2.9(Update Process Security) |
- |
9167 |
|
- |
| 2.10(Code Signing Verification) |
- |
9167 |
|
- |
| 2.11(Firmware Downgrade Protection) |
- |
9167 |
|
- |
| 2.12(Scheduled Firmware Updates) |
- |
9167 |
|
- |
| 3.1(Wireless Mutual Authentication) |
- |
9167 |
|
- |
| 3.2(Wireless Encrypted Channel) |
- |
9167 |
|
- |
| 3.3(Trusted Supply Chain) |
- |
9167 |
|
- |
| 3.4(Supply Chain Risk Management) |
- |
9167 |
|
- |
| 3.5(Proprietary Protocols Management) |
- |
9167 |
|
- |
| 4.1(Anti-Counterfeit Measures) |
- |
9167 |
|
- |
| 4.2(Threat Mitigation) |
- |
9167 |
|
- |
| 4.3(Malware Detection Deployment) |
- |
9167 |
|
- |
| 4.4(Supply Chain Risk Assessment) |
- |
9167 |
|
- |