Version: 1.1
Description: LoRaWAN protocol for long-range wide-area networks
Total Test Cases
Matched
Partial
Unmatched
Your protocol matched 23 out of 80 test cases.
| Test ID | Rule ID | Status | Expected | Your Protocol | Description | Evidence |
|---|---|---|---|---|---|---|
| GDPR-ART32-ENC-TRANS-01 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with ChaCha20-Poly1305 256-bit encryption end-to-end | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-02 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with AES-256-GCM 256-bit encryption | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-03 | GDPR-ART32-ENC-TRANS | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with no encryption enabled | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-04 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with weak AES-128-CBC encryption | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-05 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with AES-128-GCM 128-bit encryption | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-06 | GDPR-ART32-ENC-TRANS | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with unsupported encryption algorithm | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-07 | GDPR-ART32-ENC-TRANS | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with AES-256-GCM but only 64-bit keys | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-08 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with AES-128-CCM encryption | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-09 | GDPR-ART32-ENC-TRANS | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with encryption but null algorithm | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-ENC-TRANS-10 | GDPR-ART32-ENC-TRANS | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable encryption with AES-128-GCM or stronger, minimum 128-bit keys, and ensure scope covers data in transit |
Protocol with multiple encryption layers | Protocol does not meet encryption requirements for data in transit |
| GDPR-ART32-AUTH-01 | GDPR-ART32-AUTH | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with mutual authentication using Ed25519 | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-02 | GDPR-ART32-AUTH | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with no mutual authentication | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-03 | GDPR-ART32-AUTH | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with one-way authentication only | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-04 | GDPR-ART32-AUTH | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with mutual ECDSA authentication | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-05 | GDPR-ART32-AUTH | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with mutual but null auth fields | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-06 | GDPR-ART32-AUTH | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with device auth but no server auth | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-07 | GDPR-ART32-AUTH | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with server auth but no device auth | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-08 | GDPR-ART32-AUTH | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with mutual RSA-2048 authentication | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-09 | GDPR-ART32-AUTH | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with AES-based implicit server auth | Protocol implements one-way authentication only |
| GDPR-ART32-AUTH-10 | GDPR-ART32-AUTH | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable mutual authentication for full compliance |
Protocol with mutual X.509 certificate authentication | Protocol implements one-way authentication only |
| GDPR-ART32-INTEGRITY-01 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with ChaCha20-Poly1305 AEAD cipher | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-02 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with AES-256-GCM AEAD cipher | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-03 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with AES-128-CCM AEAD cipher | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-04 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with non-AEAD cipher and logging | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-05 | GDPR-ART32-INTEGRITY | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with weak encryption and no logging | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-06 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with AES-256-GCM and comprehensive logging | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-07 | GDPR-ART32-INTEGRITY | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with null encryption algorithm | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-08 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with ChaCha20-Poly1305 and no logging | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-09 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with AES-128-CCM and limited logging | Protocol does not provide data integrity protection |
| GDPR-ART32-INTEGRITY-10 | GDPR-ART32-INTEGRITY | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Implement AEAD ciphers or message authentication codes (MAC) for data integrity |
Protocol with non-AEAD cipher and no authentication logging | Protocol does not provide data integrity protection |
| GDPR-ART32-LOGGING-01 | GDPR-ART32-LOGGING | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with comprehensive audit logging | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-02 | GDPR-ART32-LOGGING | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with no logging enabled | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-03 | GDPR-ART32-LOGGING | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging but insufficient retention | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-04 | GDPR-ART32-LOGGING | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging but missing scope items | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-05 | GDPR-ART32-LOGGING | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with all required logging scope items | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-06 | GDPR-ART32-LOGGING | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging enabled but null scope | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-07 | GDPR-ART32-LOGGING | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging minimum retention (30 days) | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-08 | GDPR-ART32-LOGGING | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging just below minimum retention | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-09 | GDPR-ART32-LOGGING | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging two scope items minimum | Protocol does not have comprehensive audit logging |
| GDPR-ART32-LOGGING-10 | GDPR-ART32-LOGGING | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention) |
Protocol with logging one scope item only | Protocol does not have comprehensive audit logging |
| HIPAA-SEC-CRYPTO-01 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with ChaCha20-Poly1305 and ephemeral key exchange | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-02 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with AES-256-GCM and ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-03 | HIPAA-SEC-CRYPTO | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with encryption but non-ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-04 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with no encryption | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-05 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with TLS and ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-06 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with weak encryption and ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-07 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with AES-128-GCM and ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-08 | HIPAA-SEC-CRYPTO | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with encryption null algorithm and ephemeral keys | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-09 | HIPAA-SEC-CRYPTO | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with AES-256-GCM but ephemeral false | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-CRYPTO-10 | HIPAA-SEC-CRYPTO | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Enable ephemeral key exchange for forward secrecy compliance |
Protocol with ChaCha20-Poly1305 and ephemeral null | Protocol uses encryption (AES-128-CBC) but lacks ephemeral key exchange |
| HIPAA-SEC-ACCESS-01 | HIPAA-SEC-ACCESS | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with mutual Ed25519 authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-02 | HIPAA-SEC-ACCESS | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with mutual ECDSA authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-03 | HIPAA-SEC-ACCESS | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with no authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-04 | HIPAA-SEC-ACCESS | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with mutual RSA-2048 authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-05 | HIPAA-SEC-ACCESS | MATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with one-way Ed25519 authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-06 | HIPAA-SEC-ACCESS | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with shared secret authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-07 | HIPAA-SEC-ACCESS | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with X.509 mutual authentication | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-08 | HIPAA-SEC-ACCESS | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with mutual but null auth fields | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-09 | HIPAA-SEC-ACCESS | PARTIAL |
Status: COVERED Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with device X.509 and server Ed25519 | Protocol has authentication but may not meet full HIPAA requirements |
| HIPAA-SEC-ACCESS-10 | HIPAA-SEC-ACCESS | PARTIAL |
Status: MISSING Confidence: HIGH |
Status: PARTIAL Confidence: MEDIUM Implement mutual authentication with strong cryptographic methods (X.509, Ed25519, ECDSA) |
Protocol with AES-based authentication only | Protocol has authentication but may not meet full HIPAA requirements |
| HC-MED-FW-SIGN-01 | HC-MED-FW-SIGN | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with EdDSA-signed firmware updates | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-02 | HC-MED-FW-SIGN | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with RSA-2048-signed firmware updates | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-03 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with unsigned firmware updates | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-04 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with firmware OTA disabled | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-05 | HC-MED-FW-SIGN | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with ECDSA-P256-signed firmware | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-06 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with firmware enabled but signing false | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-07 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with unsupported signature algorithm | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-08 | HC-MED-FW-SIGN | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with SHA-256-signed firmware | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-09 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with firmware signing null signature algorithm | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-FW-SIGN-10 | HC-MED-FW-SIGN | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm |
Protocol with firmware update field null | Firmware updates are not signed or use unsupported signature algorithm |
| HC-MED-AUDIT-01 | HC-MED-AUDIT | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with comprehensive medical audit logging | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-02 | HC-MED-AUDIT | MATCHED |
Status: MISSING Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with no audit logging | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-03 | HC-MED-AUDIT | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with logging but insufficient retention | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-04 | HC-MED-AUDIT | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with logging but missing error tracking | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-05 | HC-MED-AUDIT | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with local logging transmission | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-06 | HC-MED-AUDIT | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with both local and cloud logging | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-07 | HC-MED-AUDIT | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with logging 90-day retention minimum | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-08 | HC-MED-AUDIT | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with logging just below 90-day retention | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-09 | HC-MED-AUDIT | UNMATCHED |
Status: PARTIAL Confidence: MEDIUM |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with logging only two scope items | Protocol does not meet Health Canada medical device audit requirements |
| HC-MED-AUDIT-10 | HC-MED-AUDIT | UNMATCHED |
Status: COVERED Confidence: HIGH |
Status: MISSING Confidence: HIGH Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission |
Protocol with comprehensive logging 180-day retention | Protocol does not meet Health Canada medical device audit requirements |
Partial Coverage: 22 test cases showed partial compliance. These indicate that your protocol has some of the required features but may need enhancements to fully meet the requirements.
Next Steps: