@@ -46,7 +46,7 @@ and so it is recommended that the intro text and associated table heading be upd
4646 <entry >
4747 <version >2.0</version >
4848 <date >2025-06-13</date >
49- <subject >CC2022 conversion</subject >
49+ <subject >CC:2022 conversion</subject >
5050 </entry >
5151 </RevisionHistory >
5252
@@ -181,7 +181,7 @@ and so it is recommended that the intro text and associated table heading be upd
181181
182182 <section title =" Use Cases" id =" usecases" > Requirements in this PP-Module are designed to address
183183 the security problem for the following use cases. An EDR's functionality may be
184- extended by addons, plugins , threat feeds, or other reputation services. These are out of
184+ extended by add-ons, plug-ins , threat feeds, or other reputation services. These are out of
185185 scope of this PP-Module. <usecases >
186186 <usecase title =" Detection of Potential Unauthorized Activity" id =" detect" >
187187 <description >The detection of potentially unauthorized activity, software, or users is
@@ -225,7 +225,7 @@ and so it is recommended that the intro text and associated table heading be upd
225225 <cc-pp-config-with >
226226 <PP-cc-ref >Protection Profile for Application Software, Version 2.0</PP-cc-ref >
227227 <Mod-cc-ref >PP-Module for Enterprise-Management (EM), Version 2.0</Mod-cc-ref >
228- <Mod-cc-ref >PP-Module for Host Agents (HA), Version 2.0</Mod-cc-ref >
228+ <Mod-cc-ref >PP-Module for Host Agent (HA), Version 2.0</Mod-cc-ref >
229229 </cc-pp-config-with >
230230 <!-- Package claims -->
231231
@@ -1339,7 +1339,7 @@ This section describes any modifications that the ST author must make to the Bas
13391339 commands sent to the Host Agent as being from the EDR. This is not to
13401340 protect the policies in transit as they are already protected by FPT_ITT.1.
13411341 If the TSF implements this function, any signature algorithms used should be consistent with any selections made in
1342- FCS_COP.1/Sig Gen and FCS_COP.1/Sig Ver in the Protection Profile for Application Software, Version 2.0.</note >
1342+ FCS_COP.1/Sig Gen and FCS_COP.1/SigVer in the Protection Profile for Application Software, Version 2.0.</note >
13431343 <aactivity >
13441344 <TSS >The evaluator shall check to ensure that the TSS describes how all commands and policies are signed.<h : p /></TSS >
13451345 <Guidance >The evaluator shall review the operational guidance and ensure that the
0 commit comments