Declaration of Compliance With Cyber Security Requirements
Declaration of Compliance With Cyber Security Requirements
EQUIPMENT
4.1.a) The product was developed in compliance with the security by design principle.
Justification: Provide justification if the requirement is not applicable to the product.
5.1. Requirements for terminal equipment that connect to the Internet and for infrastructure equipment for
telecommunications networks, in their final versions intended for marketing:
5.1.1. Regarding the Software/Firmware Update:
a) Have automated and secure mechanisms for updating software/firmware that use proper methods of
encryption, authentication, and integrity verification.
Justification: Provide justification if the requirement is not applicable to the product.
b) Allow users to manually check the availability of software/firmware updates and easily deploy them.
Justification: Provide justification if the requirement is not applicable to the product.
c) Have mechanisms to inform the software/firmware user of changes implemented due to updates, especially
those related to security.
Justification: Provide justification if the requirement is not applicable to the product.
d) Preserve the existing settings on the equipment after the update procedure is completed. Changes to
equipment configuration can be implemented in the upgrade process only if they result in improvements to
the device's security.
Justification: Provide justification if the requirement is not applicable to the product.
5.1.2. Regarding the Remote Management:
a) Have a mechanism for remote management and administration that employ proper authentication and
encryption methods.
Justification: Provide justification if the requirement is not applicable to the product.
b) Implement access control mechanisms to remote management and administration interfaces, in such a way
as to limit access as to the origin (for example, specific network segment, selected URL etc.).
Justification: Provide justification if the requirement is not applicable to the product.
5.1.3. Regarding Installation and Operation:
a) Implement simplified routines suitable for its installation and configuration, avoiding potential unintentional
security breaches.
Justification: Provide justification if the requirement is not applicable to the product.
b) By factory default, the device must be configured restrictively rather than permissively. Selecting parameters
for the initial factory settings must prioritize natively secure options, in line with the principles of security and
privacy.
Justification: Provide justification if the requirement is not applicable to the product.
c) Perform software/firmware integrity verification when resetting the system, and it is able to alert the user in
cases of compromised integrity.
Justification: Provide justification if the requirement is not applicable to the product.
d) Have a monitoring mechanism for unusual software/firmware behavior, alerting the user or automatically
restarting itself when suspicious behavior is detected. After resetting it, the user must be offered the option of
restoring the equipment to factory defaults.
Justification: Provide justification if the requirement is not applicable to the product.
e) Implement a tool for recording activities (logs) related to, at least, user authentication, changing system
settings, and system operation.
Justification: Provide justification if the requirement is not applicable to the product.
f) Provide documentation that describes, at a minimum, the name, version, and functionality of the
software/firmware and/or operating system, as well as the full name and version of each open-source
software incorporated in the system. Documentation can be in electronic format.
Justification: Provide justification if the requirement is not applicable to the product.
5.1.4. Regarding the Access to Equipment Configuration:
a) Do not use initial credentials and passwords to access its settings that are the same across all devices
produced.
Justification: Provide justification if the requirement is not applicable to the product.
b) Do not use initial passwords that are derived from information easily obtainable by methods of scanning
network data traffic, such as MAC (Media Access Control) addresses.
Justification: Provide justification if the requirement is not applicable to the product.
1/4
c) Force, in the first use, the change of the initial access password to the equipment configuration.
Justification: Provide justification if the requirement is not applicable to the product.
d) Do not allow the use of blank passwords or weak passwords.
Justification: Provide justification if the requirement is not applicable to the product.
e) Have defense mechanisms against exhaustive unauthorized access attempts (brute force authentication
attacks).
Justification: Provide justification if the requirement is not applicable to the product.
f) Ensure password recovery mechanisms are robust against credential theft attempts.
Justification: Provide justification if the requirement is not applicable to the product.
g) Do not use credentials, passwords and cryptographic keys set in the software/firmware source code and
which cannot be changed (hard-coded).
Justification: Provide justification if the requirement is not applicable to the product.
h) Protect passwords, access keys and credentials stored or transmitted using appropriate methods of
encryption or hashing.
Justification: Provide justification if the requirement is not applicable to the product.
i) Implement inactive session termination routines (timeout).
Justification: Provide justification if the requirement is not applicable to the product.
5.1.5. Regarding the Data Communication Services:
a) Be devoid of any test tool or backdoor used in the product development processes and unnecessary for its
usual operation.
Justification: Provide justification if the requirement is not applicable to the product.
b) Be devoid of any form of undocumented communication, including those for sending equipment usage profile
information to manufacturers or third parties.
Justification: Provide justification if the requirement is not applicable to the product.
c) Be provided with data communication services (service associated with a port) not usually used disabled by
reducing its attack surface.
Justification: Provide justification if the requirement is not applicable to the product.
d) Provide the user with the possibility of disabling functionalities and communication services that are not
essential to the equipment operation or management.
Justification: Provide justification if the requirement is not applicable to the product.
5.1.6. Regarding the Personal Data and Sensitive Personal Data, Subject to the Legislation in Force:
a) Enable the use of proper encryption methods for transmitting sensitive data, including personal information.
Justification: Provide justification if the requirement is not applicable to the product.
b) Enable the use of proper encryption methods for storing sensitive data, including personal information.
Justification: Provide justification if the requirement is not applicable to the product.
c) Allow users to easily delete their stored personal and sensitive data, enabling the disposal or replacement of
equipment without risk of exposure of personal information.
2/4
It further declares it comply with the following requirements listed in item 6 of the annex to Act No. 77, of
January 5, 2021:
6.1. Requirements for Suppliers of Terminal Equipment that connect to the Internet and Infrastructure Equipment for
Telecommunications Networks:
6.1.1. Have a clear product support policy, especially regarding the availability of software/firmware updates to fix
security vulnerabilities.
Justification: Provide justification if the requirement is not applicable to the product.
6.1.2. Make it clear to the consumer up to when and in which situations safety updates for the equipment will be
provided.
The requesting company is aware that the product under approval may be subject to Anatel's Market
Supervision program, at any time, for the purpose of proving that the approved product and its supplier comply
with the items indicated in this declaration. Additionally, it is aware that any cyber security failures identified in
approved equipment that affect the security of its users, providers or telecommunications networks in the
country may be subject to evaluation by Anatel, even if the affected characteristic has not been the subject
matter of this declaration.
Finally, it declares it is fully aware of the terms of the annex to Act No. 77 of January 5, 2021, and that the cyber
security requirements published by the National Telecommunications Agency are subject to updates, including
regulatory and administrative, in line with the technological development and the emergence of new threats or
vulnerabilities.
Filling Instructions:
1. The requesting company for approval of the telecommunication product must complete the tables of this
declaration according to the following codification:
C The equipment complies with the requirement.
3/4
NA The requirement does not apply to the equipment due to its characteristics. Justification must be provided.
2. In compliance with item 4.1.2 of the requirements, in the event the equipment under approval meets the
definition of Customer Premise Equipment (CPE), the table in Annex 1 to the document referenced in item
2.5 of the requirements (LAC-BCOP-1 (May/2019) – Best Current Operational Practices on Minimum Security
Requirements for Customer Premises Equipment (CPE) Acquisition) shall be completed, signed and attached
to this declaration.
4/4