1.1(Application Debug Interface Protection) |
- |
10000 |
|
- |
1.2(Device Unique Crypto Keys) |
- |
10000 |
|
- |
1.4(Trusted Execution) |
- |
10000 |
|
- |
1.5(Secure Storage) |
- |
10000 |
|
- |
1.6(Tamper Protection) |
- |
10000 |
|
- |
1.9(Secure PRNG Usage) |
- |
10000 |
|
- |
2.2(Data Transit Security) |
- |
10000 |
|
- |
2.3(Server Connection Validation) |
- |
10000 |
|
- |
2.4(Banned C Functions) |
- |
10000 |
|
- |
2.6(Secure Code Review) |
- |
34500 |
|
- |
2.8(Reverse Engineering Protection) |
- |
10000 |
|
- |
1.3(On-Chip Debug Interface Protection) |
- |
10000 |
|
- |
1.7(IP Protection) |
- |
10000 |
|
- |
1.8(Boot Image Validation) |
- |
10000 |
|
- |
2.1(Memory Protection Controls) |
- |
10000 |
|
- |
2.5(Software Bill of Materials) |
- |
10000 |
|
- |
2.7(Digital Signature Pinning) |
- |
10000 |
|
- |
2.9(Update Process Security) |
- |
10000 |
|
- |
2.10(Code Signing Verification) |
- |
10000 |
|
- |
2.11(Firmware Downgrade Protection) |
- |
10000 |
|
- |
2.12(Scheduled Firmware Updates) |
- |
10000 |
|
- |
3.1(Wireless Mutual Authentication) |
- |
10000 |
|
- |
3.2(Wireless Encrypted Channel) |
- |
10000 |
|
- |
3.3(Trusted Supply Chain) |
- |
10000 |
|
- |
3.4(Supply Chain Risk Management) |
- |
10000 |
|
- |
3.5(Proprietary Protocols Management) |
- |
10000 |
|
- |
4.1(Anti-Counterfeit Measures) |
- |
10000 |
|
- |
4.2(Threat Mitigation) |
- |
10000 |
|
- |
4.3(Malware Detection Deployment) |
- |
10000 |
|
- |
4.4(Supply Chain Risk Assessment) |
- |
10000 |
|
- |