The device supports automatic updates and/or update notifications (9)
Updates are delivered over a network interface (11)
Software components are not updateable (3)
The device is constrained (4)
If you do not know yet whether the device is constrained, you can use the embeded identification tool.
Secure Storage of Security Parameters
5.4-15.4-25.4-35.4-45.5-65.5-7
A hard-coded unique per device identity is used for security purposes (10)
Sensitive security parameters are stored persistently (14)
Critical security parameters used for integrity and authenticity checks of software updates in device software or for protection of communication with associated services in device software exist (15)