Documents
Documents
| iWave Cybersecurity SW Modules | EN 18031-1 | EN 18031-2 |
|---|---|---|
| Access control – This provides protection against unauthorized access to devices and their functions. | ACM | ACM |
| Authentication – This module verifies the identity of users & devices before granting access to sensitive functionalities or data within the equipment. | AUM | AUM |
| Secure boot & image signing – This ensures that software updates are authenticated, and their integrity is protected. | SUM | SUM |
| Secure storage – Device shall securely store security assets and protect them from unauthorized access. | SSM | SSM |
| Secure communication – This ensures that communication channels are secured to protect transit data. | SCM | SCM |
| Key Management – Offers protection of keys by storing it securely. | CCK | CCK |
| Log Management – This module tracks & records security, device relevant events. Provision for irreversible deletion of data when necessary. | – | LGM & DLM |
| Additional security capabilities – Periodic security audit for vulnerability and assessment at hardware & software level. Limiting the exposure of network, other interfaces. | GEC | GEC |
| Security standards – AES-256 is used to encrypt data at rest. TLS 1.3 is used to encrypt the data in transit. ECC is used to sign the images for secure boot or OTA update. | CRY | CRY |



