Logo
StreamLex Home
Logo
StreamLex Home
Laws
Laws
Recitals
Recitals
Your feedback
About UsNewsletterTerms of UsePrivacy NoticeLinkedIn
Cybersecurity Act
  • Data & Privacy

    • Data Act
    • Data Governance Act
    • ePrivacy Directive
    • GDPR
  • AI & Trust

    • Artificial Intelligence Act
  • Cybersecurity

    • Cybersecurity Act
    • DORA
    • NIS2
  • Digital Services & Media

    • Digital Markets Act
    • Digital Services Act
    • European Media Freedom Act
CSA

CSA Article 51. Security objectives of European cybersecurity certification schemes

  • A European cybersecurity certification scheme shall be designed to achieve, as applicable, at least the following security objectives:
    • (a)
      to protect stored, transmitted or otherwise processed data against accidental or unauthorised storage, processing, access or disclosure during the entire life cycle of the ICT product, ICT service or ICT process;
    • (b)
      to protect stored, transmitted or otherwise processed data against accidental or unauthorised destruction, loss or alteration or lack of availability during the entire life cycle of the ICT product, ICT service or ICT process;
    • (c)
      that authorised persons, programs or machines are able only to access the data, services or functions to which their access rights refer;
    • (d)
      to identify and document known dependencies and vulnerabilities;
    • (e)
      to record which data, services or functions have been accessed, used or otherwise processed, at what times and by whom;
    • (f)
      to make it possible to check which data, services or functions have been accessed, used or otherwise processed, at what times and by whom;
    • (g)
      to verify that ICT products, ICT services and ICT processes do not contain known vulnerabilities;
    • (h)
      to restore the availability and access to data, services and functions in a timely manner in the event of a physical or technical incident;
    • (i)
      that ICT products, ICT services and ICT processes are secure by default and by design;
    • (j)
      that ICT products, ICT services and ICT processes are provided with up-to-date software and hardware that do not contain publicly known vulnerabilities, and are provided with mechanisms for secure updates.

Relevant Recitals for this Article

© 2024 StreamLex

NewsletterAbout UsTerms of UsePrivacy NoticeManage cookies

© 2024 StreamLex