Protocol Test Comparison

Back to Protocol
Protocol: LoRaWAN

Version: 1.1

Description: LoRaWAN protocol for long-range wide-area networks

Comparison Summary

80

Total Test Cases

23

Matched

22

Partial

57

Unmatched

23 Matched
22 Partial
57 Unmatched

Your protocol matched 23 out of 80 test cases.

Detailed Test Results
Test ID Rule ID Status Expected Your Protocol Description Evidence
GDPR-ART32-ENC-TRANS-01 GDPR-ART32-ENC-TRANS UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with ChaCha20-Poly1305 256-bit encryption end-to-end Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-02 GDPR-ART32-ENC-TRANS UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with AES-256-GCM 256-bit encryption Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-03 GDPR-ART32-ENC-TRANS MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with no encryption enabled Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-04 GDPR-ART32-ENC-TRANS UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with weak AES-128-CBC encryption Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-05 GDPR-ART32-ENC-TRANS UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with AES-128-GCM 128-bit encryption Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-06 GDPR-ART32-ENC-TRANS MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with unsupported encryption algorithm Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-07 GDPR-ART32-ENC-TRANS MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with AES-256-GCM but only 64-bit keys Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-08 GDPR-ART32-ENC-TRANS UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with AES-128-CCM encryption Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-09 GDPR-ART32-ENC-TRANS MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with encryption but null algorithm Protocol does not meet encryption requirements for data in transit
GDPR-ART32-ENC-TRANS-10 GDPR-ART32-ENC-TRANS UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit
Protocol with multiple encryption layers Protocol does not meet encryption requirements for data in transit
GDPR-ART32-AUTH-01 GDPR-ART32-AUTH PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with mutual authentication using Ed25519 Protocol implements one-way authentication only
GDPR-ART32-AUTH-02 GDPR-ART32-AUTH PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with no mutual authentication Protocol implements one-way authentication only
GDPR-ART32-AUTH-03 GDPR-ART32-AUTH MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with one-way authentication only Protocol implements one-way authentication only
GDPR-ART32-AUTH-04 GDPR-ART32-AUTH PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with mutual ECDSA authentication Protocol implements one-way authentication only
GDPR-ART32-AUTH-05 GDPR-ART32-AUTH PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with mutual but null auth fields Protocol implements one-way authentication only
GDPR-ART32-AUTH-06 GDPR-ART32-AUTH MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with device auth but no server auth Protocol implements one-way authentication only
GDPR-ART32-AUTH-07 GDPR-ART32-AUTH MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with server auth but no device auth Protocol implements one-way authentication only
GDPR-ART32-AUTH-08 GDPR-ART32-AUTH PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with mutual RSA-2048 authentication Protocol implements one-way authentication only
GDPR-ART32-AUTH-09 GDPR-ART32-AUTH MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with AES-based implicit server auth Protocol implements one-way authentication only
GDPR-ART32-AUTH-10 GDPR-ART32-AUTH PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable mutual authentication for full compliance
Protocol with mutual X.509 certificate authentication Protocol implements one-way authentication only
GDPR-ART32-INTEGRITY-01 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with ChaCha20-Poly1305 AEAD cipher Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-02 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with AES-256-GCM AEAD cipher Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-03 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with AES-128-CCM AEAD cipher Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-04 GDPR-ART32-INTEGRITY UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with non-AEAD cipher and logging Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-05 GDPR-ART32-INTEGRITY MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with weak encryption and no logging Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-06 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with AES-256-GCM and comprehensive logging Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-07 GDPR-ART32-INTEGRITY MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with null encryption algorithm Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-08 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with ChaCha20-Poly1305 and no logging Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-09 GDPR-ART32-INTEGRITY UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with AES-128-CCM and limited logging Protocol does not provide data integrity protection
GDPR-ART32-INTEGRITY-10 GDPR-ART32-INTEGRITY UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Implement AEAD ciphers or message authentication codes (MAC) for data integrity
Protocol with non-AEAD cipher and no authentication logging Protocol does not provide data integrity protection
GDPR-ART32-LOGGING-01 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with comprehensive audit logging Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-02 GDPR-ART32-LOGGING MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with no logging enabled Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-03 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging but insufficient retention Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-04 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging but missing scope items Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-05 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with all required logging scope items Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-06 GDPR-ART32-LOGGING MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging enabled but null scope Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-07 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging minimum retention (30 days) Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-08 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging just below minimum retention Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-09 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging two scope items minimum Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-10 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging one scope item only Protocol does not have comprehensive audit logging
HIPAA-SEC-CRYPTO-01 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with ChaCha20-Poly1305 and ephemeral key exchange Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-02 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-256-GCM and ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-03 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with encryption but non-ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-04 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with no encryption Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-05 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with TLS and ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-06 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with weak encryption and ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-07 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-128-GCM and ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-08 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with encryption null algorithm and ephemeral keys Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-09 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-256-GCM but ephemeral false Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-10 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with ChaCha20-Poly1305 and ephemeral null Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange
HIPAA-SEC-ACCESS-01 HIPAA-SEC-ACCESS PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with mutual Ed25519 authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-02 HIPAA-SEC-ACCESS PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with mutual ECDSA authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-03 HIPAA-SEC-ACCESS PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with no authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-04 HIPAA-SEC-ACCESS PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with mutual RSA-2048 authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-05 HIPAA-SEC-ACCESS MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with one-way Ed25519 authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-06 HIPAA-SEC-ACCESS PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with shared secret authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-07 HIPAA-SEC-ACCESS PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with X.509 mutual authentication Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-08 HIPAA-SEC-ACCESS PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with mutual but null auth fields Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-09 HIPAA-SEC-ACCESS PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with device X.509 and server Ed25519 Protocol has authentication but may not meet full HIPAA requirements
HIPAA-SEC-ACCESS-10 HIPAA-SEC-ACCESS PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA)
Protocol with AES-based authentication only Protocol has authentication but may not meet full HIPAA requirements
HC-MED-FW-SIGN-01 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with EdDSA-signed firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-02 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with RSA-2048-signed firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-03 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with unsigned firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-04 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware OTA disabled Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-05 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with ECDSA-P256-signed firmware Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-06 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware enabled but signing false Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-07 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with unsupported signature algorithm Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-08 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with SHA-256-signed firmware Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-09 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware signing null signature algorithm Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-10 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware update field null Firmware updates are not signed or use unsupported signature algorithm
HC-MED-AUDIT-01 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with comprehensive medical audit logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-02 HC-MED-AUDIT MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with no audit logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-03 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging but insufficient retention Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-04 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging but missing error tracking Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-05 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with local logging transmission Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-06 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with both local and cloud logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-07 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging 90-day retention minimum Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-08 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging just below 90-day retention Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-09 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging only two scope items Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-10 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with comprehensive logging 180-day retention Protocol does not meet Health Canada medical device audit requirements
Recommendations
Needs Improvement. Your protocol matched 23 test cases. Review the detailed results below to understand what compliance features are missing.

Partial Coverage: 22 test cases showed partial compliance. These indicate that your protocol has some of the required features but may need enhancements to fully meet the requirements.

Next Steps:

  • Review the unmatched test cases to identify missing compliance features
  • Check the evidence and recommendations for each unmatched test
  • Update your protocol specification to address the gaps
  • Re-run the comparison to verify improvements
Back to Protocol