Protocol Test Comparison

Back to Protocol
Protocol: MQTT

Version: 3.1.1

Description: MQTT messaging protocol with TLS/SSL transport

Comparison Summary

80

Total Test Cases

32

Matched

7

Partial

48

Unmatched

32 Matched
7 Partial
48 Unmatched

Your protocol matched 32 out of 80 test cases.

Detailed Test Results
Test ID Rule ID Status Expected Your Protocol Description Evidence
GDPR-ART32-ENC-TRANS-01 GDPR-ART32-ENC-TRANS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with ChaCha20-Poly1305 256-bit encryption end-to-end Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-02 GDPR-ART32-ENC-TRANS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with AES-256-GCM 256-bit encryption Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-03 GDPR-ART32-ENC-TRANS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with no encryption enabled Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-04 GDPR-ART32-ENC-TRANS UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with weak AES-128-CBC encryption Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-05 GDPR-ART32-ENC-TRANS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with AES-128-GCM 128-bit encryption Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-06 GDPR-ART32-ENC-TRANS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with unsupported encryption algorithm Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-07 GDPR-ART32-ENC-TRANS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with AES-256-GCM but only 64-bit keys Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-08 GDPR-ART32-ENC-TRANS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with AES-128-CCM encryption Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-09 GDPR-ART32-ENC-TRANS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with encryption but null algorithm Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-ENC-TRANS-10 GDPR-ART32-ENC-TRANS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 encryption requirement ✓
Protocol with multiple encryption layers Protocol uses AES-256-GCM with 256-bit keys for transport-layer encryption
GDPR-ART32-AUTH-01 GDPR-ART32-AUTH MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with mutual authentication using Ed25519 Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-02 GDPR-ART32-AUTH UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with no mutual authentication Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-03 GDPR-ART32-AUTH UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with one-way authentication only Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-04 GDPR-ART32-AUTH MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with mutual ECDSA authentication Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-05 GDPR-ART32-AUTH UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with mutual but null auth fields Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-06 GDPR-ART32-AUTH UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with device auth but no server auth Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-07 GDPR-ART32-AUTH UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with server auth but no device auth Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-08 GDPR-ART32-AUTH MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with mutual RSA-2048 authentication Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-09 GDPR-ART32-AUTH UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with AES-based implicit server auth Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-AUTH-10 GDPR-ART32-AUTH MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 mutual authentication requirement ✓
Protocol with mutual X.509 certificate authentication Protocol implements mutual authentication: device (X.509_certificate), server (X.509_certificate)
GDPR-ART32-INTEGRITY-01 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with ChaCha20-Poly1305 AEAD cipher Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-02 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with AES-256-GCM AEAD cipher Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-03 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with AES-128-CCM AEAD cipher Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-04 GDPR-ART32-INTEGRITY UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with non-AEAD cipher and logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-05 GDPR-ART32-INTEGRITY UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with weak encryption and no logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-06 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with AES-256-GCM and comprehensive logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-07 GDPR-ART32-INTEGRITY UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with null encryption algorithm Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-08 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with ChaCha20-Poly1305 and no logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-09 GDPR-ART32-INTEGRITY MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with AES-128-CCM and limited logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-INTEGRITY-10 GDPR-ART32-INTEGRITY UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets GDPR Article 32 data integrity requirement ✓
Protocol with non-AEAD cipher and no authentication logging Protocol uses AEAD cipher (AES-256-GCM) which provides data integrity
GDPR-ART32-LOGGING-01 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with comprehensive audit logging Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-02 GDPR-ART32-LOGGING MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with no logging enabled Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-03 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging but insufficient retention Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-04 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging but missing scope items Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-05 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with all required logging scope items Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-06 GDPR-ART32-LOGGING MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging enabled but null scope Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-07 GDPR-ART32-LOGGING UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging minimum retention (30 days) Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-08 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging just below minimum retention Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-09 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging two scope items minimum Protocol does not have comprehensive audit logging
GDPR-ART32-LOGGING-10 GDPR-ART32-LOGGING UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable audit logging with scope covering authentication, key_rotation, and data_access events (minimum 30 days retention)
Protocol with logging one scope item only Protocol does not have comprehensive audit logging
HIPAA-SEC-CRYPTO-01 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with ChaCha20-Poly1305 and ephemeral key exchange Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-02 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-256-GCM and ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-03 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with encryption but non-ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-04 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with no encryption Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-05 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with TLS and ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-06 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with weak encryption and ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-07 HIPAA-SEC-CRYPTO PARTIAL Status: COVERED
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-128-GCM and ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-08 HIPAA-SEC-CRYPTO PARTIAL Status: MISSING
Confidence: HIGH
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with encryption null algorithm and ephemeral keys Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-09 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with AES-256-GCM but ephemeral false Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-CRYPTO-10 HIPAA-SEC-CRYPTO MATCHED Status: PARTIAL
Confidence: MEDIUM
Status: PARTIAL
Confidence: MEDIUM

Enable ephemeral key exchange for forward secrecy compliance
Protocol with ChaCha20-Poly1305 and ephemeral null Protocol uses encryption (AES-256-GCM) but lacks ephemeral key exchange
HIPAA-SEC-ACCESS-01 HIPAA-SEC-ACCESS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with mutual Ed25519 authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-02 HIPAA-SEC-ACCESS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with mutual ECDSA authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-03 HIPAA-SEC-ACCESS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with no authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-04 HIPAA-SEC-ACCESS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with mutual RSA-2048 authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-05 HIPAA-SEC-ACCESS UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with one-way Ed25519 authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-06 HIPAA-SEC-ACCESS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with shared secret authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-07 HIPAA-SEC-ACCESS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with X.509 mutual authentication Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-08 HIPAA-SEC-ACCESS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with mutual but null auth fields Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-09 HIPAA-SEC-ACCESS MATCHED Status: COVERED
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with device X.509 and server Ed25519 Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HIPAA-SEC-ACCESS-10 HIPAA-SEC-ACCESS UNMATCHED Status: MISSING
Confidence: HIGH
Status: COVERED
Confidence: HIGH

Meets HIPAA Security Rule access control requirement ✓
Protocol with AES-based authentication only Protocol uses mutual authentication with strong methods: X.509_certificate, X.509_certificate
HC-MED-FW-SIGN-01 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with EdDSA-signed firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-02 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with RSA-2048-signed firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-03 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with unsigned firmware updates Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-04 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware OTA disabled Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-05 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with ECDSA-P256-signed firmware Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-06 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware enabled but signing false Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-07 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with unsupported signature algorithm Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-08 HC-MED-FW-SIGN UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with SHA-256-signed firmware Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-09 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware signing null signature algorithm Firmware updates are not signed or use unsupported signature algorithm
HC-MED-FW-SIGN-10 HC-MED-FW-SIGN MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Implement firmware signing using RSA-2048, EdDSA, or ECDSA-P256 signature algorithm
Protocol with firmware update field null Firmware updates are not signed or use unsupported signature algorithm
HC-MED-AUDIT-01 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with comprehensive medical audit logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-02 HC-MED-AUDIT MATCHED Status: MISSING
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with no audit logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-03 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging but insufficient retention Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-04 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging but missing error tracking Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-05 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with local logging transmission Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-06 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with both local and cloud logging Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-07 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging 90-day retention minimum Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-08 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging just below 90-day retention Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-09 HC-MED-AUDIT UNMATCHED Status: PARTIAL
Confidence: MEDIUM
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with logging only two scope items Protocol does not meet Health Canada medical device audit requirements
HC-MED-AUDIT-10 HC-MED-AUDIT UNMATCHED Status: COVERED
Confidence: HIGH
Status: MISSING
Confidence: HIGH

Enable comprehensive audit logging covering authentication, key_rotation, and errors with minimum 90 days retention and cloud/local transmission
Protocol with comprehensive logging 180-day retention Protocol does not meet Health Canada medical device audit requirements
Recommendations
Needs Improvement. Your protocol matched 32 test cases. Review the detailed results below to understand what compliance features are missing.

Partial Coverage: 7 test cases showed partial compliance. These indicate that your protocol has some of the required features but may need enhancements to fully meet the requirements.

Next Steps:

  • Review the unmatched test cases to identify missing compliance features
  • Check the evidence and recommendations for each unmatched test
  • Update your protocol specification to address the gaps
  • Re-run the comparison to verify improvements
Back to Protocol