2.4.14.19
| Req No | Requirement | Compliance Class And Applicability | Primary Keyword | Secondary Keyword |
|---|---|---|---|---|
| 2.4.14.19 | Device certificate signing keys and other onboarding credentials are secured against unauthorised access. For example, they may be stored encrypted and managed or created by an HSM and delivered by the secure signing process. | Mandatory for Class 2 and above | Business | Process |