Part I, point (2) is a structured set of product-security outcomes that the manufacturer must apply where relevant on the basis of the cybersecurity risk assessment.
It covers, among other things:
- no known exploitable vulnerabilities at placement on the market
- secure-by-default configuration
- the ability to address vulnerabilities through security updates
- protection from unauthorised access
- confidentiality and integrity protection
- data minimisation
- protection of essential and basic functions, including after incidents
- attack-surface reduction
- exploitation-mitigation techniques
- security-related logging and monitoring
- secure removal and transfer of data and settings