Tara
Tara
Project: Doc-ID:
Maturity: Released Version: 1.0
Author:
Role Name Date Signature
Cyber Security Manager
Checked by:
Role Name Date Signature
General Manager Pavan Kodali
Purpose:
Threat Analysis & Risk Assessment for Vehicle Access, Locking and Start Authorization
System
Goal
Cybersecurity Goals (CG)
- Cybersecurity Goals Summary
Step5
Y
(RTD)
Mitigation?
N
Cybersecurity Claims (CC)
- Risk Avoidance Claim
Step - Risk Retention Claim
6 - Risk Transfer Claim
Asset ID Asset
P-001 NFC Interface
P-002 Zone Controller Cabin
P-003 Zone Controller Front Left
P-004 Zone Controller Rear
P-005 Low Voltage Battery Management System
P-006 Airbag Control Unit
P-007 Electronic Stability Program
P-008 Connectivity Box
P-009 Head Unit
P-010 Cloud
P-011 Smart Phone
set Data ID Data
D-001 Door Unlock request from smartphone(NFC enabled) to NFC interface via NFC signal.
D-002 Door Unlock request from NFC interface to ZC_C
Left D-003 Low voltage battery signal from LV_BMS to ZC_R
D-004 Drive direction information (PRND) from gear shifter to ZC_C
Management System D-005 Battery status information from ZC_R to ZC_C.
D-006 Crash status from ACU to ZC_FL.
ogram D-007 Vehicle speed status from ESP to ZC_FL.
D-008 Vehicle speed status and crash status from ZC_FL to ZC_C.
D-009 Lock/unlock request from ZC_C to smart latch.
D-009' Door ajar status from smart latch to ZC_C
D-010 Lock/unlock status from cloud to smart phone app and app update via cloud.
D-011 Lock/unlock status from connectivity box to cloud and firmware update via cloud.
D-012 Lock/unlock status from ZC_C to connectivity box.
D-012' Firmware update from connectivity box to ZC_C and other ECUs via cloud.
D-013 Lock/Unlock request from Head unit to ZC_C.
D-013' Display door related status on head unit.
D-014 Lock/Unlock command from smart phone to Head unit via Bluetooth.
ace via NFC signal.
e via cloud.
pdate via cloud.
a cloud.
th.
Sl. No
P-001
P-001
P-001
P-002
P-002
P-002
P-003
P-003
P-003
P-004
P-004
P-004
P-005
P-006
P-006
P-006
P-006
P-007
P-007
P-007
P-007
P-008
P-008
P-008
P-008
P-009
P-009
P-009
P-009
P-010
P-011
D-001
D-002
D-003
D-003
D-004
D-004
D-005
D-005
D-006
D-006
D-007
D-007
D-008
D-008
D-009
D-009
D-009'
D-010
D-010
D-011
D-012
D-012
D-012'
D-012'
D-013
D-013
D-013'
D-013'
D-014
D-014
D-014
D-014
Threat Scenarios Damage Scenarios Impact Category Attack Path MOTAL Attack Feasibility Assessment Risk
Cybersecurity Property Impact Risk Attack Feasibility Mitigation Cybersecurity
Assets Name Damage Judgement Description Impact Category Rationale CEL Attack Mapping (R155) Treatment
C/I/A1/A2/A3/NR Level Value Rationale Method Goal
Strategy
Time Knowledge Window of CAF
S/N Details S/N Details S F O P S/N Details Threat Agent Access Motivation Outcome Expertise Equipment Total AF Level
Consuming about Item opportunity Level
High
Safety: Moderate because of 1. Download the FOTA package from the FOTA
tampered door ajar status. server.
Financial: Moderate, since the 2. Reverse analyze the FOTA package and forge a
Attacker may An external agent with
system recovery may take malicious FOTA package.
compromise the Due to the loss of integrity of the The firmware has been tampered, resulting in the Cellular motives to damage the
T- major cost. 3. Obtain the target vehicle. Material
Head Unit I integrity of firmware by DS-027 firmware, the function of the head unit manipulation of the functionality of head unit. Mo Mo Mo Ne Mo Connection(3 AP-027 17.1 Cyber Vandal External Dominance <6m Expert Public Moderate Standard 14 Medium 2 assets of a user may Mitigation M20 G.2
027 Operational: Moderate, 4. Attacker might implement man-in-the-middle Damage
tampering the might not work properly. G/4G) carry out this type of
because of partial degradation attacks through fake LTE BTS and push malicious
firmware. attack
of the function. FOTA packages.
Privacy: No private data 5. Wait for the head unit upgrade to restart and to
stored in the system. install the tampered firmware.
Safety: Negligible, as no
impact on road user.
Financial: Major, as vehicle
Due to the loss of authenticity, the 1. Guide users to download and install malicious
Attacker may can be unlocked illegally and A social hacker with
attacker can send control commands applications.
T- compromise the It may cause the vehicle to be unlocked illegally and cause vehicle to be stolen. Online Social Personal Acquisition/ motives to theft may
Smart Phone A2 DS-031 to the vehicle (or to the cloud through Ne Ma Mo Ne Ma Wi-Fi AP-031 2. Obtain user key information through malicious NA External <1m Proficient Public Easy Standard 5 High High 4 Transfer NA NA
031 authenticity of the vehicle to be stolen. Operational : Moderate Hacker Financial Gain Theft carry out this type of
a smartphone app) by impersonating a applications.
smartphone. because of partial degradation attack
legitimate user. 3. Use the key information to forge equipment.
of function.
Privacy: No private data
stored in the system.
Safety: Negligible, as no
impact on road user.
Financial: Moderate, since the
CAN Attacker may An external agent with
system recovery may take 1. Get the physical access to CAN bus.
Communicati compromise the Due to loss of integrity of CAN signal, motives to damage the
T- Due to loss of integrity of CAN signal, the tampered moderate cost. 2. Analyze the signal using CAN analyzer tool. Material
on between I integrity of CAN bus DS-034 there will be impact on the functionality Ne Mo Mo Ne Ne OBD II AP-034 6.1 Cyber Vandal External Dominance <6m Proficient Public Easy Standard 8 High 2 assets of a user may Mitigation M10 G.5
034 low voltage information might sent to ZC_R. Operational: Moderate, 3. Based on the analysis attacker can mal craft the Damage
LV_BMS and by tampering the CAN of ZC_R. carry out this type of
because of partial degradation CAN signal.
ZC_R. signal. attack
of the vehicle.
Privacy: No private data
stored in the system.
High
High
High
High
High
High
High
High
High
Safety: Negligible, as no
impact on road user.
1. Access the ethernet bus and connect the packet
Attacker may Financial: Moderate, since the An external agent with
analyser device to it.
ZC_C to compromise the Due to loss of integrity of ethernet system recovery may take motives to damage the
T- Thereby user may receive tampered lock/unlock 2. Use the packet analyser device to monitor the Material
Connectivity I integrity of ethernet DS-052 signal, tampered Lock/unlock status Ne Mo Ne Ne Ne moderate cost. OBD II AP-052 6.1 Cyber Vandal External Dominance <6m Proficient Public Easy Standard 8 High 2 assets of a user may Mitigation M10 G.5
052 status on smartphone(App). traffic. Damage
box signal by tampering might send to connectivity box. Operational: No operational carry out this type of
3.Based on the analysis attacker can manipulate
the signal. faults. attack
the traffic.
Privacy: No private data
stored in the system.
High
Safety: Negligible, as no
impact on road user.
Flooding of ethernet Financial: Moderate, since the An external agent with
1. Access the ethernet bus and connect the packet
ZC_C to bus to halt the Flooding of ethernet bus to halt the system recovery may take motives to damage the
T- Thereby user may not receive any lock/unlock status analyser device to it. Material
Connectivity A1 communication DS-053 communication between ZC_C and Ne Mo Ne Ne Ne moderate cost. OBD II AP-053 24.1 Cyber Vandal External Dominance <6m Proficient Public Easy Standard 8 High 2 assets of a user may Mitigation M13 G.6
053 on smartphone(APP). 2. Create the mal crafts packets. Damage
box between ZC_C and connectivity box. Operational: No operational carry out this type of
3. Flood the bus with mal crafted packets.
connectivity box. faults. attack
Privacy: No private data
stored in the system.
High
Flooding of ethernet
1. Access the ethernet bus and connect the packet Criminals with motives
bus to halt the Flooding of ethernet bus to halt the
Connectivity T- analyser device to it. Organized Organizational Material to damage the assets
A1 communication DS-055 communication between connectivity As a result, there may be no firmware update. Ne Mo Mo Ne Ne OBD II AP-055 24.1 External <6m Proficient Public Easy Standard 8 High 2 Mitigation M13 G.6
Box to ZC_C 055 2. Create the mal crafts packets. Crime Gain Damage of a user may carry out
between ZC_C and box and ZC_C.
3. Flood the bus with mal crafted packets. this type of attack
connectivity box.
High
Safety: Negligible, as no
impact on road user.
Financial: Moderate, since the
Flooding of ethernet An external agent with
Ethernet system recovery may take 1. Access the ethernet bus and connect the packet
bus to halt the Due to loss of availability of ethernet Driver may not be able to access the vehicle via motives to damage the
communicati T- moderate cost. analyser device to it. Material
A1 communication DS-057 bus, it halts the communication bluetooth, thereby may feel degraded performance Ne Mo Mo Ne Ne OBD II AP-057 24.1 Cyber Vandal External Dominance <6m Proficient Public Easy Standard 8 High 2 assets of a user may Mitigation M13 G.6
on from head 057 Operational: Moderate, 2. Create the mal crafts packets. Damage
between Head unit between Head unit and ZC_C. from the vehicle. carry out this type of
unit to ZC_C because of partial degradation 3. Flood the bus with mal crafted packets.
and ZC_C. attack
of the vehicle.
Privacy: No private data
stored in the system.
High
Safety: Negligible,as no
impact on road user.
Financial: Moderate, since the
Attacker might system recovery may take 1. Select the target device. A social hacker with
Smart Phone Due to loss of integrity of bluetooth Beacause of tampered information it might affect the
T- compromise the moderate cost. 2. Sniff the traffic. Online Social Personal Acquisition/ motives of theft may
to Head unit I DS-061 signal, tampered lock/unlock partial functionality of head unit. Driver may not be Ne Mo Mo Ne Ne Bluetooth AP-061 16.1 External <1w Proficient Public Easy Standard 4 High 2 Mitigation M19 G.5
061 integrity of bluetooth Operational: Moderate, 3. Modify and perform replay attack to send the Hacker Financial Gain Theft carry out this type of
via bluetooth information might pass to head unit. able to access the vehicle via bluetooth.
signal by replay attack. because of partial degradation GATT commands. attack
of the vehicle.
Privacy: No private data
stored in the system.
High
Safety: Negligible, as no
impact on road user.
Financial: Moderate, since the
1. Attach BLE Dongle.
Attacker might Due to loss of availability of bluetooth system recovery may take A social hacker with
Smart Phone 2. Scan for targeted vehicle BLE device
T- compromise the signal, it halts the bluetooth Driver may not be able to access the vehicle via moderate cost. Online Social Personal Acquisition/ motives of theft may
to Head unit A1 DS-062 Ne Mo Mo Ne Ne Bluetooth AP-062 3. Run Sweyntooth exploit. 16.3 External <1w Proficient Public Easy Standard 4 High 2 Mitigation M19 G.6
062 availability of bluetooth communication between smartphone bluetooth. Operational: Moderate, Hacker Financial Gain Theft carry out this type of
via bluetooth 4. Vehicle’s BLE device will crash and restart
signal by DoS attack. and head unit. because of partial degradation attack
Which results, head unit ECU will restart.
of the vehicle.
Privacy: No private data
stored in the system.
Safety: Negligible, as no
impact on road user.
Financial: Moderate, since the 1. Use BLE Sniffer to capture the BLE Packets.
Attacker might Attacker can get access to the vehicle by system recovery may take 2. Wait for the victim to connect vehicle Bluetooth A social hacker with
Smart Phone Due to loss of authenticity of bluetooth
T- compromise the impersonating legitmate user, thereby driver may moderate cost. and perform some action. Online Social Personal Acquisition/ motives of theft may
to Head unit A2 DS-63 signal, attacker can get successfully Ne Mo Mo Ne Ne Bluetooth AP-063 4.1 External <1w Proficient Public Easy Standard 4 High 2 Mitigation M10 G.7
063 authenticity of experience unpredictable behaviour from the vehicle Operational: Moderate, 3. Now attacker can capture the GATT Commands. Hacker Financial Gain Theft carry out this type of
via bluetooth authenticate to the bluetooth signal.
bluetooth signal. or attacker can steal the vehicle. because of partial degradation 4. Replay the GATT Command responsible for attack
of the vehicle. authentication.
Privacy: No private data
stored in the system.
Cybersecurity
Cybersecurity Requirement
Claims (If Any)
NA Transfer to OEM
NA Transfer to OEM
✓
✓ ✓
✓ ✓
✓
✓
✓
✓
Non-Hostile Intent
Internal
Access
External
Acquisition/Theft
Business Advantage
Material Damage
Outcome
Technical Advantage
Reputation Damage
15 Minutes of Fame
Individual
Club
Contest
Resources
Team
Organization
Government
None
Minimal
Skills
Operational
Adept
Overt
Covert
Visibility
Clandestine
"Don't Care"
Code of Conduct
Legal
Limits
Extra Legal - Minor
Extra Legal - Major
Copy
Deny
Injure
Objective Destroy
Damage
Take
All Above/Don't care
Accidental
Coercion
Disgruntlement
Dominance
Ideology
Motivation
Notoriety
Organizational Gain
Personal Financial Gain
Personal Satisfaction
Unpredictable
None
Partial Trust
Trust
Trust
Employee
Administrator
Theft of PII and Business Data
Denial of Service
Method Intentional Manipulation
Unauthorized Physical Access
Unpredictable Action
Privacy Violated
Loss of Financial Assets/Car
Impact
Traffic Accidents
Injured Passengers
Non-Hostile Intent
Online
Outward Information Cyber Data
Hacktivist Competitor Social
Sympathizer Partner Vandal Miner
Hacker
Methods, Objectives & Threat Agent Library
Hostile Intent
ta/code
uthorized personnel to access personal or system critical data. Example Security Controls can be found in Security Controls can be found in
loyed
considered
ered
Security controls shall be applied to minimise the risk from third party software that is intended or foreseeable to be hosted on the vehicle
Clause ID Description
The organization shall define a cybersecurity policy that includes:
a) acknowledgement of road vehicle cybersecurity risks; and
b) the executive management’s commitment to manage the
Overall Cybersecurity corresponding risks.
Management - [RQ-05-01] NOTE 1: Links to the organization’s objectives and other policies can be
Cybersecurity Governance included in the cybersecurity policy.
NOTE 2: The cybersecurity policy can include a statement regarding
the risk treatment of generic threat scenarios with respect
Overall Cybersecurity Cybersecurity risk management shall be in accordance with ISO 31000.
Management -
[RQ-05-10]
Cybersecurity Risk
Management
The organization may align its cybersecurity risk management and its
corporate risk management.
NOTE: New and evolving cybersecurity risks after the release for post-
development are managed with cybersecurity monitoring and
Overall Cybersecurity vulnerability management and, if applicable, incident management.
Management -
[PM-01-01] EXAMPLE: During the development phase an assumption is made that
Cybersecurity Risk a specific cryptographic algorithm is secure, but in the field it is
Management discovered via cybersecurity monitoring that the algorithm is no longer
secure. Vulnerability management and incident response are used to
manage this issue.
A cybersecurity audit shall be performed to independently judge
whether the organizational processes achieve the objectives of this
document.
NOTE 1: Such a cybersecurity audit can be included in, or combined
with, an audit according to a quality management system standard.
EXAMPLE: IATF 16949 in conjunction with ISO 9001
Overall Cybersecurity NOTE 2: Independence can be based on, for example, IATF 16949[16]
Management -
[RQ-05-11] in conjunction with ISO 9001[3], or ISO 26262.
Organizational NOTE 3: The person that performs the audit can be internal or external
Cybersecurity Audit to the organization.
NOTE 4: To ensure the organizational processes remain appropriate for
cybersecurity, 291 an audit can be performed periodically.
NOTE 5: Figure 5 illustrates the organizational cybersecurity audit in
relation to other cybersecurity activities. (see [RQ-06-21])
Overall Cybersecurity Cybersecurity policy, rules and processes, resulting from the
Management - Work [WP-05-01]requirements of 5.4.1, 5.4.3 and 5.4.5.
Products
Overall Cybersecurity Evidence of competence management, awareness management and
Management - Work [WP-05-02]continuous improvement, resulting from the requirements of 5.4.2.
Products
Overall Cybersecurity Organizational cybersecurity audit report, resulting from the
Management - Work [WP-05-03]requirements of 5.4.4.
Products
Overall Cybersecurity Evidence of the organization's management systems, resulting from the
Management - Work [WP-05-04]requirements of 5.4.6.
Products
Overall Cybersecurity Evidence of tool management, resulting from the requirements of 5.4.7.
Management - Work [WP-05-05]
Products
Project dependent [RQ-06-01] The responsibilities regarding the project’s cybersecurity activities shall
cybersecurity be assigned and communicated in accordance with [RQ-05-03].
management - NOTE: Responsibilities for cybersecurity activities can be transferred
Requirements and providing that this is communicated and there is a handover of pertinent
Recommendations - information.
Cybersecurity
Responsibilities and Their
Assignment
Project dependent [RQ-06-02] An analysis shall be performed to determine:
cybersecurity a) whether the item or component is cybersecurity relevant; and
management - NOTE 1: Annex D provides a method and criteria that can be used to
Requirements and assess the cybersecurity relevance.
Recommendations - b) whether the item or component is a new development or a reuse.
Cybersecurity Planning NOTE 2: If the item or component is reused, a reuse analysis in
accordance with 6.4.4 is performed. A reuse can be applied with or
without modification to the item, component or environment.
NOTE 3: If the item or component is determined as not being
cybersecurity relevant, there are no relevant cybersecurity activities
thus cybersecurity planning is not initiated.
Project dependent [RQ-06-03] The responsibilities for maintaining the cybersecurity plan, and for
cybersecurity management - tracking the progress of the cybersecurity activities against the
Requirements and cybersecurity plan shall be assigned in accordance with [RQ-05-03] and
Recommendations - [RQ-05-04].
Cybersecurity Planning
Project dependent [RQ-06-04] The cybersecurity plan shall either be:
cybersecurity management - a) referenced in the project plan for the development; or
Requirements and b) included in the project plan, such that the cybersecurity activities are
Recommendations - distinguishable.
Cybersecurity Planning
Project dependent [RQ-06-05] The cybersecurity plan shall specify the activities that are required to
cybersecurity management - comply with the requirements of this document associated with the
Requirements and concept phase and product development phases (see Clauses 9, 10,
Recommendations - and 11).
Cybersecurity Planning NOTE 5: The cybersecurity plan can be refined in incremental steps
during development and integration.
Project dependent [RQ-06-07] The cybersecurity plan shall be updated when a change or a refinement
cybersecurity management - of the activities to be performed is identified.
Requirements and
Recommendations -
Cybersecurity Planning
Project dependent [RQ-06-08] The work products required by the cybersecurity plan shall be
cybersecurity management - maintained and updated during the development phases so as to
Requirements and provide an adequate representation of the item or component, until and
Recommendations - at the release for post-development.
Cybersecurity Planning
Project dependent [RQ-06-09] When cybersecurity activities are distributed, both the customer and the
cybersecurity management - supplier shall define a cybersecurity plan regarding their respective
Requirements and cybersecurity activities and interfaces in accordance with Clause 15.
Recommendations -
Cybersecurity Planning
Project dependent [RQ-06-10] The cybersecurity plan, as well as the work products resulting from the
cybersecurity management - cybersecurity activities defined in the cybersecurity plan, shall be
Requirements and subject to configuration management, change management,
Recommendations - requirements management, and documentation management, in
Cybersecurity Planning accordance with 5.4.6.
Project dependent [PM-06-01]A cybersecurity activity may be tailored.
cybersecurity
management -
Requirements and
Recommendations -
Tailoring of the
Cybersecurity Activities
Project dependent [RQ-06-11] If a cybersecurity activity is tailored, then a rationale shall be provided
cybersecurity management - that includes why the tailoring is adequate and sufficient to achieve the
Requirements and relevant objectives of this document.
Recommendations - NOTE 1: An activity is tailored if it is omitted or performed in a different
Tailoring of the manner compared to its description in this document.
Cybersecurity Activities NOTE 2: Activities that are not performed because they are performed
by another entity in the supply chain are not considered as tailored, but
as distributed activities (see Clause 15).
Project dependent [RQ-06-12] A reuse analysis of an existing item or component shall be carried out if
cybersecurity it is reused with or without modification; i.e., if:
management - a) it has been developed, but modifications are planned;
Requirements and b) it is reused in another operational environment; and/or
Recommendations - c) it is planned to be reused without modification and the information
Reuse concerning the item or component has changed relevantly, such as a
change in the known attacks and vulnerabilities, or a change of the
assets.
EXAMPLE 1: Modifications to the environment resulting from the
installation of the existing item or component in a new operational
environment, or from the upgrading of other items or components
interacting with it.
NOTE 1: Modifications can include design modifications and/or
implementation modifications:
- Design modifications can result from requirements modification (e.g.,
functional or performance enhancement).
- Implementation modifications can result from corrections of software,
or the use of new production or maintenance tools (e.g., model based
development). These modifications might not affect the specification or
performance of the existing item or component, but only the
implementation features.
NOTE 2: A modification to configuration data or calibration data is
considered as a modification if it impacts the functional behavior or the
assets and cybersecurity properties of the existing item or component.
Project dependent [RQ-06-13] The reuse analysis of an existing item or component shall:
cybersecurity management - a) identify the modifications to the operational context, including the
Requirements and modifications to the item or component as well as modifications of its
Recommendations - Reuse environment;
b) analyze the implication of the modifications regarding cybersecurity,
including the impact on the validity of cybersecurity claims and
previously made assumptions;
c) identify the affected or missing work products and determine the
activities necessary to comply with this document; and
NOTE 3: This includes an analysis of the existing threat analysis and
risk assessment; e.g., considering new assets, threat scenarios or risk
determination compared to when the existing item or component was
developed.
d) specify the cybersecurity activities in the cybersecurity plan, based
on this reuse analysis, in accordance with 6.4.2.
EXAMPLE 2: A modification can have one or more implications on:
- the cybersecurity requirements;
- the design and implementation;
- operational environments and operating modes;
- maintenance;
- cybersecurity controls;
- susceptibility to known attacks and exposure of known vulnerabilities;
or
- the assets.
Project dependent [RQ-06-14] The reuse analysis 494 of an existing component shall:
cybersecurity management - a) evaluate whether, with or without modifications, the reused
Requirements and component is able to comply with the allocated cybersecurity
Recommendations - Reuse requirements that result from the item, or component, in which it is to be
integrated; and
b) evaluate whether the existing documentation is sufficient to support
the integration into an item, or into another component.
Project dependent [RQ-06-15] If cybersecurity activities are tailored in accordance with 6.4.2 because
cybersecurity a component is developed out of context, then:
management - a) assumptions on the new intended use and context, including the
Requirements and external interfaces, shall be documented in the corresponding work
Recommendations - products;
Component Out of Context b) the out of context development shall be based on cybersecurity
requirements that are derived from the assumptions; and
c) for the out of context component integration, the cybersecurity
claims and assumptions of the out of context development shall be
validated.
Project dependent [RQ-06-16] When integrating an off-the-shelf component in accordance with 6.4.6,
cybersecurity the cybersecurity-relevant information shall be gathered and analyzed
management - to determine whether:
Requirements and a) the allocated cybersecurity requirements can be complied with;
Recommendations - Off- b) the off-the-shelf component is suitable for the specific application
the-Shelf Component context of the intended use; and
c) the existing off-the-shelf documentation is sufficient to support the
cybersecurity activities.
NOTE: The integration and test activities are documented in the work
products related to integration and testing.
Project dependent [RQ-06-17] If the existing documentation is insufficient to support the integration of
cybersecurity management - the off-the-shelf component, then the cybersecurity activities to comply
Requirements and with this document shall be identified and performed.
Recommendations - Off-the-
Shelf Component
Project dependent [RQ-06-18] A cybersecurity case shall be created to provide the argument,
cybersecurity supported by work products, for the achieved degree of cybersecurity.
management - NOTE: The argument can be implicit (i.e., if the argument is evident
Requirements and from the compiled set of work products an explicit argument can be
Recommendations - omitted). In this scenario, the cybersecurity case contains the list of
Cybersecurity Case work products required by the cybersecurity plan (see [WP-06-01]).
Project dependent [RQ-06-19] A judgement based on a rationale shall be made to decide whether a
cybersecurity cybersecurity assessment is performed for an item or component.
management - NOTE 1: The judgement of whether to perform a cybersecurity
Requirements and assessment or not can be based on the results of the risk determination
Recommendations - in accordance with Clause 8, supported by a rationale.
Cybersecurity
Assessment
Project dependent [RQ-06-21] The cybersecurity assessment shall judge whether the available
cybersecurity management - evidence provides confidence that the achieved degree of cybersecurity
Requirements and of the item or component is sufficient.
Recommendations - NOTE 3: The available evidence is provided by the documented results
Cybersecurity of the cybersecurity activities (i.e., the work products) (see Annex A).
Assessment
Project dependent [RQ-06-22] The cybersecurity assessment report shall be made available prior to
cybersecurity management - the release for post-development.
Requirements and NOTE 6: The scope of the cybersecurity assessment report at the
Recommendations - release for post-development can include the performed cybersecurity
Cybersecurity activities and the cybersecurity requirements for post-development (see
Assessment [WP-10-02]).
Project dependent [RQ-06-23] The person responsible to plan and independently perform the
cybersecurity management - cybersecurity assessment shall be appointed in accordance with [RQ-
Requirements and 05-08] and [RQ-06-01], supported by [RQ-05-03] and [RQ-05-04].
Recommendations - NOTE 7: The independence scheme can be based on IATF 16949[16]
Cybersecurity in conjunction with ISO 9001[3], or ISO 26262[1].
Assessment EXAMPLE: A person of a quality assurance department within the
organization, a person from a different team or department, or a person
from an independent third party.
Project dependent [RQ-06-24] A person who carries out a cybersecurity assessment shall have access
cybersecurity management - to the relevant information, tools and the cooperation of the personnel
Requirements and responsible for performing the cybersecurity activities.
Recommendations -
Cybersecurity
Assessment
Project dependent [RQ-06-26] A cybersecurity assessment report shall include a recommendation for
cybersecurity management - acceptance, conditional acceptance, or rejection of the achieved degree
Requirements and of cybersecurity of the item or component.
Recommendations - NOTE 12: The assessment report can also include recommendations
Cybersecurity for improvement.
Assessment
Project dependent [PM-06-03] A cybersecurity assessment report may include a recommendation for
cybersecurity management - conditional acceptance.
Requirements and
Recommendations -
Cybersecurity
Assessment
Project dependent [RQ-06-29] The release for post-development of the item or component shall be
cybersecurity management - approved if both of the following conditions are fulfilled:
Requirements and a) sufficient evidence of the achieved degree of cybersecurity is
Recommendations - provided by the cybersecurity case; and if applicable the judgement
Release for Post- included in the cybersecurity assessment report; and
Development b) the cybersecurity requirements for the post-development phase are
identified and reviewed.
NOTE: Changes to the cybersecurity claims (see [WP-09-05]) can
result in repeating the release for post-development.
Project dependent [WP-06-01]Cybersecurity plan, resulting from the requirements of 6.4.1 to 6.4.6.
cybersecurity
management - Work
Products
Project dependent [WP-06-02]Cybersecurity case, resulting from the requirements of 6.4.7.
cybersecurity management -
Work Products
Project dependent [WP-06-03]Cybersecurity assessment report, if applicable, resulting from the
cybersecurity management - requirements of 6.4.8.
Work Products
Project dependent [WP-06-04]Release for post-development report, resulting from the requirements of
cybersecurity management - 6.4.9.
Work Products
Continuous Cybersecurity [RQ-07-01] Internal and external sources shall be monitored for collection of
Activities - Cybersecurity cybersecurity information.
Monitoring EXAMPLE 1: External sources for cybersecurity information can
include:
- researchers;
- commercial or non-commercial sources;
- organization’s supply chain;
- customers of the organization; and/or
- government sources.
EXAMPLE 2: Internal sources for cybersecurity information can include:
- results of vulnerability analyses;
- information received from the field (e.g., vulnerability scanning
reports, repair information, consumer usage information); and/or
- configuration information such as a hardware or software bill of
materials.
Continuous Cybersecurity [RQ-07-02] Triage shall be based on defined triggers and applied to cybersecurity
Activities - Cybersecurity information to determine if cybersecurity information becomes one or
Monitoring more cybersecurity events.
EXAMPLE 3: Criteria for the triage that can be used to define the trigger
thresholds can include:
- whether cybersecurity information comes from a known trusted
source;
- the determined risk of the threat scenarios of the item resulting from
the activity in [RQ-09-05]; and/or
- the type of information obtained (e.g., an active attack or proof of
concept).
Continuous Cybersecurity [WP-07-01]List of sources for cybersecurity monitoring, resulting from [RQ-07-01].
Activities - Cybersecurity
Monitoring - Work
Products
Continuous Cybersecurity [WP-07-02]Results from the triage of cybersecurity information, resulting from [RQ-
Activities - Cybersecurity 07-02].
Monitoring - Work Products
Continuous Cybersecurity [PM-07-01] Based on the risk treatment decision from 8.9, the cybersecurity
Activities - Cybersecurity incident response process in accordance with 13.3 may be applied in
Event Assessment post-development phases.
NOTE 3: The organization can define the criteria for invoking incident
response.
EXAMPLE: Risk treatment from 7.6 affects items or components in
post-development phases.
NOTE 4: If the cybersecurity incident response process is applied, then
the cybersecurity event becomes a cybersecurity incident.
Continuous Cybersecurity [RC-07-01] Attack paths should be analyzed in accordance with 8.6 to map the
Activities - Vulnerability discovered vulnerabilities to specific attack paths.
Analysis - Requirements
and Recommendations
Continuous Cybersecurity [RC-07-02] Attack feasibility rating in accordance with 0 should be determined for
Activities - Vulnerability the discovered vulnerabilities.
Analysis - Requirements
and Recommendations
Continuous Cybersecurity [WP-07-04]Vulnerability analysis, resulting from [RQ-07-04].
Activities - Vulnerability
Analysis - Work Products
Continuous Cybersecurity [RQ-07-05] Identified vulnerabilities shall be managed based on a rationale such
Activities - Vulnerability that the corresponding risk is treated.
Management - EXAMPLE: Rationales can include arguments such as the following:
Requirements and - verification report that shows the vulnerability is eliminated;
Recommendations - analysis, risk determination and risk treatment of the vulnerability.
Continuous Cybersecurity [RQ-07-08] If cybersecurity information becomes available that invalidates the
Activities - Vulnerability existing rationale, the vulnerability shall no longer be considered as
Management - managed.
Requirements and
Recommendations
Continuous Cybersecurity [WP-07-05]Rationale for the managed vulnerability, resulting from [RQ-07-05].
Activities - Vulnerability
Management - Work
Products
Risk Assessment Methods - [RQ-08-02] Assets with cybersecurity properties whose compromise leads to a
Asset Identification damage scenario shall be enumerated.
NOTE: The enumeration of relevant assets can be based on various
methods, including:
- performing an impact rating;
- deriving assets from threat scenarios; and
- using predefined catalogues.
EXAMPLE 1: The asset is personal information (customer personal
preferences) stored in an infotainment system and its cybersecurity
property is confidentiality. The damage scenario is disclosure of the
personal information without the customer’s consent resulting from the
loss of confidentiality.
EXAMPLE 2: The asset is messages received by the braking function
and its cybersecurity property is integrity. The damage scenario is
unintended full braking when the vehicle is travelling at high speed
resulting from the loss of integrity.
Risk Assessment Methods - [WP-08-02]Identified assets and cybersecurity properties, resulting from [RQ-08-
Asset Identification - Work 02].
Products
Risk Assessment Methods [RQ-08-03] Threat scenarios shall be identified.
- Threat Scenario NOTE 1: See Annex G for an illustration with a practical example.
Identification NOTE 2: The method for threat scenario identification can use
brainstorming-based approaches.
EXAMPLE 1:
- misuse-case elicitation;
- taxonomy mnemonic-based approaches (e.g., STRIDE); or
- a combination of the above.
NOTE 3: A threat scenario can include:
- the targeted asset;
- the compromised cybersecurity property; and
- the action to accomplish a damage scenario.
EXAMPLE 2: Spoofing of CAN (controller area network) messages for
the powertrain ECU (electronic control unit) leads to loss of integrity of
the CAN messages (and thereby to loss of integrity of the acceleration
function) potentially causing uncontrollable acceleration of the vehicle
and possible harm.
NOTE 4: Relations and dependencies between assets can be relevant
in the identification of threat scenarios.
NOTE 5: If more information about a threat scenario is available, such
as the threat agent who initiates action, the method, tools, and entry
points, it can be documented to provide further information to the risk
assessment process (e.g., attack path analysis, attack feasibility).
NOTE 6: One damage scenario can correspond to multiple t 828 hreat
scenarios (see Figure 6).
Risk Assessment Methods - [RQ-08-07] Safety related impacts shall be derived from ISO 26262-3:2018, 6.4.3
Impact Rating - Classification of hazardous events.
Requirements and NOTE 4: Table H.1 in Annex H can be used for mapping safety
Recommendations impacts.
Risk Assessment Methods [WP-08-04]Impact rating, including the associated impact categories of the damage
- Impact Rating - Work scenarios, resulting from [RQ-08-04] to [RQ-08-07].
Products
Risk Assessment Methods [RQ-08-08] The threat scenarios shall be analyzed to describe possible attack
- Attack Path Analysis - paths.
Requirements and
Recommendations
Risk Assessment Methods - [RQ-08-09] The attack path analysis approach applied shall be documented.
Attack Path Analysis - NOTE 1: An attack path analysis approach can be based on (see
Requirements and Figure 7):
Recommendations a) Top-down approaches such as attack trees, attack graphs,
taxonomy mnemonic-based approaches (e.g., STRIDE):
i. In top-down (deductive) approach, attack paths are deduced (i.e.,
theorized, inferred, reasoned, conjectured) for the item or component
based on historical knowledge of vulnerabilities in similar systems and
components.
ii. Top-down approach is useful in the concept and development
phases when implementation of the current item or component is not
available, or when effort is directed toward building attack hypotheses
or attack path models.
b) Bottom-up approaches (e.g., the output of vulnerability 888
analysis):
i. In a bottom-up (inductive) approach, attack paths are built for the
item or component from the cybersecurity vulnerabilities identified. Each
action in the attack path is based on an “exploitable weakness.”
ii. The bottom-up approach is most commonly used when an
implementation of the item or component is available, or when
hypotheses or attack model are to be confirmed.
c) A combination of these approaches.
Risk Assessment Methods - [RQ-08-09] NOTE 2: If attack path analysis reveals that a partial attack path does
Attack Path Analysis - not accomplish the threat scenario, this partial attack path can be
Requirements and truncated, and the analysis can be stopped at that point.
Recommendations
Risk Assessment Methods - [RC-08-01] The attack path description should include a reference to the threat
Attack Path Analysis - scenarios that can be realized by the attack path.
Requirements and NOTE 3: If a bottom-up approach is used, the following information can
Recommendations be included:
a) vulnerabilities or weaknesses that could be exploited; and
b) how the vulnerabilities could be leveraged in an attack to realize the
threat scenario.
NOTE 4: In the early stages of product development the attack paths
are often incomplete or imprecise as specific implementation details are
not yet known in sufficient detail to be able to identify specific
vulnerabilities. During the lifecycle, the attack paths could be updated
with additional detail as more information becomes available (e.g., after
a vulnerability analysis).
EXAMPLE:
- Threat Scenario: Spoofing of CAN (Controller Area Network)
messages for the braking ECU (Electronic Control Unit), causing
uncontrollable arbitrary braking of the vehicle leading to loss of
passenger safety causing physical harm to the vehicle user.
- Attack Path: The telematics ECU is compromised via the cellular
interface, then Gateway ECU is compromised via CAN communication,
next the gateway ECU forwards malicious torque request signals,
resulting in spoofing of acceleration torque requests.
Risk Assessment Methods [WP-08-05]Identified attack paths, resulting from [RQ-08-08] and [RC-08-01].
- Attack Path Analysis -
Work Products
Risk Assessment Methods [RQ-08-10] For each attack path the attack feasibility rating shall be determined as
- Attack Feasibility Rating one of the following:
- Requirements and - high;
Recommendations - medium;
- low; or
- very low.
NOTE 1: Annex I provides guidelines on determining attack feasibility
rating. [RC-08-02] The defined rating method should be based on one
of the following assessment approaches:
a) attack potential-based approach;
b) CVSS2 based approach; or
c) attack vector-based approach.
NOTE 2: Selection of the rating approach can depend upon the phase
in the lifecycle and available information.
Risk Assessment Methods - [RC-08-03] If an attack potential-based approach is used, it should be determined
Attack Feasibility Rating - based on core factors including elapsed time, specialist expertise,
Requirements and knowledge of the item or component, window of opportunity, and
Recommendations equipment.
NOTE 3: The core attack potential factors can be derived from ISO/IEC
18045[8].
NOTE 4: I.3 provides guidelines on determining attack feasibility based
on attack potential.
Risk Assessment Methods - [RC-08-04] If a CVSS based approach is used, it should be determined based on
Attack Feasibility Rating - the exploit metrics group of the base metrics, including attack vector,
Requirements and attack complexity, privileges required, and user interaction.
Recommendations NOTE 5: I.4 provides guidelines on determining attack feasibility based
on a CVSS based approach.
Risk Assessment Methods - [RC-08-05] If an attack vector based approach is used, it should evaluate the
Attack Feasibility Rating - predominant attack vector (cf. CVSS) of the attack path.
Requirements and NOTE 6: I.5 provides guidelines on determining attack feasibility based
Recommendations 948 on an attack vector based approach.
NOTE 7: Attack feasibility can be estimated qualitatively using an attack
vector based approach during the early stages of product development,
when there is insufficient detailed information to identify specific attack
paths.
Risk Assessment Methods [RQ-08-11] The risk value of a threat scenario shall be determined from the impact
- Risk Determination - of the associated damage scenario and the attack feasibility of the
Requirements and associated attack paths.
Recommendations NOTE 1: The value 1 is the lowest risk and value 5 is the highest risk,
see Annex J.
NOTE 2: If the threat scenario corresponds to more than one attack
path, the associated attack feasibility levels can be appropriately
aggregated (e.g., the threat scenario is assigned the maximum of the
feasibility levels of the corresponding attack paths).
Risk Assessment Methods [RQ-08-12] A risk treatment option shall be determined, considering impact
- Risk Treatment Decision categories, attack paths and the results from risk determination.
- Requirements and NOTE 1: Options for treating risk can involve:
Recommendations a) avoiding the risk by removing the risk sources, or deciding not to
start or continue with the activity that gives rise to the risk;
b) reducing the risk;
c) sharing or transferring the risk (e.g., through contracts, buying
insurance); and/or
d) accepting or retaining the risk.
NOTE 2: Risk treatment options are not mutually exclusive or
appropriate in all circumstances.
Risk Assessment Methods - [PM-08-01] For threat scenarios of risk value 1, determined from an analysis in
Risk Treatment Decision - accordance with 8.8, compliance with 9.5, and with Clauses 10 and 11
Requirements and of this document may be omitted.
Recommendations NOTE 3: These threat scenarios can have consequences with regards
to cybersecurity and if so, the corresponding risks are treated, albeit
potentially with less rigor than defined in this document.
NOTE 4: The sufficiency of the treatment of such risks can be argued
based on a rationale defined in the cybersecurity case, for example
assurance based on compliance with a quality management standard,
such as IATF 16949 in conjunction with ISO 9001, in combination with
additional measures, such as cybersecurity awareness assurance and
cybersecurity training of quality personnel and the existence of
cybersecurity specific aspects or measures defined in the corporate
quality management system.
NOTE 5: For risk acceptance and risk transfer, the corresponding
rationales are recorded as cybersecurity
Risk Assessment Methods [WP-08-08]Risk treatment decision per threat scenario, resulting from [RQ-08-12].
- Risk Treatment Decision
- Work Products
Concept Phase - Item [RQ-09-01] The following information on the item shall be identified:
Definition - Requirements a) item boundary;
and Recommendations NOTE 1: The item boundary distinguishes the item from its
environment. The description of the item boundary can include
interfaces with other item and components internal and/or external to
the vehicle.
b) function; and
NOTE 2: The description of the item function can include the intended
behavior independent from implementation and architecture. The
function of the item includes the operational vehicle functionality that is
realized by the item, and all other functions that are intended during the
lifecycle phases of the item, such as: product development (testing),
production, operations and maintenance, and decommissioning.
c) preliminary architecture.
NOTE 3: The description of preliminary architecture can include:
- internal components and their connections in the item;
- data flow with other objects outside of the item;
- physical aspects; and
- logical aspects.
Concept Phase - Item RQ-09-02] The relevant information about the operational environment of the item
Definition - Requirements with 1054 regard to cybersecurity shall be described.
and Recommendations NOTE 4: The description of the operational environment of the item can
include the aspects that allow the identification and analysis of relevant
threat scenarios and attack paths.
NOTE 5: The item definition and in particular the item boundary for the
processes as described in this document can differ from the scope and
item boundary of the item definition from another process such as
functional safety in accordance with ISO 26262[1].
Concept Phase - Item [RQ-09-03] Constraints and compliance needs shall be identified.
Definition - Requirements EXAMPLE 1: This can include:
and Recommendations - functional constraints;
- technical constraints; and/or
- standards.
Concept Phase - Item [RQ-09-04] Assumptions about the item and the operational environment of the
Definition - Requirements item shall be identified.
and Recommendations NOTE 6: Some attacks might not be feasible under the assumptions on
the operational environment.
NOTE 7: If the item is being reused after its development was
completed, the assumptions of [RQ-09-04] for the original item are
validated with respect to the operational environment for the re-use (see
6.4.4).
NOTE 8: Development of a component out of context can include a
definition of an assumed (generic) item and description of the functions
of the component within the item.
EXAMPLE 2: Assumptions on physical aspects can include:
- the item will be placed in an anti-tamper enclosure.
EXAMPLE 3: Assumptions on connectivity aspects can include:
- every PKI certificate authority that the item relies on are appropriately
managed.
Concept Phase - [RQ-09-05] In order to identify cybersecurity goals, an analysis of the item shall be
Cybersecurity Goals - performed that involves:
Requirements and a) asset identification in accordance with 8.3;
Recommendations NOTE 1: The list of assets with cybersecurity properties (as part of the
result of asset identification) can be consolidated for easier reference by
the cybersecurity requirements.
b) threat scenario identification in accordance with 8.4;
c) impact rating in accordance with 8.5;
d) attack path analysis in accordance with 8.6;
NOTE 2: In the concept phase information about potential attacks can
vary in granularity and depth, from an abstract classification in terms of
remote, adjacent, local, and/or physical attacks (i.e., the attack vector
according to CVSS) to a detailed description of distinct attack actions
(e.g., an attack path). This can lead to a corresponding level of
granularity for the subsequent risk determination and for the potential
cybersecurity goals.
NOTE 3: Assumptions considering the attack path analysis enable the
exclusion of attack paths that are infeasible and clarify the rationale for
the determined attack feasibility. If the assumptions are later shown to
be is false, the excluded attack paths are retroactively identified and
analyzed.
NOTE 4: To estimate attack feasibility in the concept phase, the attack
feasibility rating method described in I.5 can be used.
e) attack feasibility rating in accordance with 0; and
f) risk determination in accordance with 8.8.
Concept Phase - [RQ-09-06] For the identified threat scenarios and their associated risks, a risk
Cybersecurity Goals - treatment decision shall be performed in accordance with 8.9.
Requirements and NOTE 5: A risk can be reduced by a cybersecurity requirement
Recommendations allocated to the item or to the operational environment of the item.
NOTE 6: If the risk is addressed by assumptions on the operational
environment, the cybersecurity claim explains why this is adequate.
NOTE 7: Avoiding a risk by removing the risk source means changing
Concept Phase - [RQ-09-07] If the risk treatment decision for a threat scenario involves reducing the
Cybersecurity Goals - risk, then one or more corresponding cybersecurity goals shall be
Requirements and specified.
Recommendations NOTE 8: The statement of the cybersecurity goal can include the
protection of cybersecurity properties of assets whose compromise can
lead to the associated damage scenario.
NOTE 9: If applicable, a CAL can be derived for cybersecurity goals
(see Annex E).
NOTE 10: Cybersecurity goals can be defined for operations and
maintenance, and decommissioning. This includes the cybersecurity
implications of service and repair in the design and development of their
products.
NOTE 11: Cybersecurity goals can be combined.
Concept Phase - [RQ-09-08] Cybersecurity claims shall 1123 be stated for the following cases:
Cybersecurity Goals - a) an assumption on the operational environment leads to a reduction
Requirements and of the risk of a threat scenario so that the risk becomes acceptable; or
Recommendations b) the risk treatment involves sharing or transferring the risk.
NOTE 12: Cybersecurity claims are subject to monitoring.
Concept Phase - [RQ-09-09] The activities to specify cybersecurity goals and cybersecurity claims
Cybersecurity Goals - shall be verified to:
Requirements and a) confirm consistency of the analysis of [RQ-09-05];
Recommendations b) confirm consistency of the risk treatment decisions [RQ-09-06];
c) confirm consistency and completeness of the cybersecurity goals of
[RQ-09-07] with respect to the threat scenarios; and
d) consistency between different cybersecurity goals.
Concept Phase - [WP-09-02]Threat analysis and risk assessment, resulting from [RQ-09-05].
Cybersecurity Goals -
Work Products
Concept Phase - [WP-09-03]Risk treatment decisions, resulting from [RQ-09-06].
Cybersecurity Goals - Work
Products
Concept Phase - [WP-09-04]Cybersecurity goals, resulting from [RQ-09-07].
Cybersecurity Goals - Work
Products
Concept Phase - [WP-09-05]Cybersecurity claims, resulting from [RQ-09-08].
Cybersecurity Goals - Work
Products
Concept Phase - [WP-09-06]Verification report, resulting from [RQ-09-09].
Cybersecurity Goals - Work
Products
Concept Phase - [RQ-09-10] Cybersecurity requirements shall be specified for the cybersecurity
Cybersecurity Concept - goals, including a rationale for the achievement of the cybersecurity
Requirements and goals.
Recommendations NOTE 1: Cybersecurity requirements can specify which threat
scenarios are controlled.
NOTE 2: If available, additional information about potential attack paths
that can lead to a violation of the cybersecurity goals, can be
considered for the derivation of the cybersecurity requirements.
NOTE 3: The type of asset protection can be specified as an
intermediate step, which supports traceability between cybersecurity
goals and cybersecurity requirements and can identify and resolve
potential conflicts.
EXAMPLE 1: Types of asset protection include combinations of:
- prevention, reduction, detection, correction, or monitoring of losses or
compromise; and/or
- restoring or recovery from damage.
NOTE 4: The cybersecurity requirements can depend on or include
update capabilities of the item.
Concept Phase - [RQ-09-11] The cybersecurity requirements shall be allocated to one or more
Cybersecurity Concept - components of the item or to the operational environment.
Requirements and
Recommendations
Concept Phase - [RQ-09-12] The cybersecurity requirements and their allocation shall be verified to
Cybersecurity Concept - confirm:
Requirements and a) consistency with the cybersecurity goals;
Recommendations b) completeness with respect to the cybersecurity goals; and
c) consistency and compatibility with the functionality of the item.
EXAMPLE 2: A potential compatibility issue can be: performance of the
item affected by cybersecurity requirements.
NOTE 5: If applicable, conformance with the cybersecurity goals
includes effectiveness of the mitigation or capabilities for handling of
cyber security events (e.g., over the air update).
Product Development - [RQ-10-02] Architectural design shall be refined for the development level based
Requirements and on:
Recommendations - a) the initial architectural design, if applicable;
Refinement of b) the cybersecurity controls from [RC-10-01], if applicable;
Cybersecurity c) the refined cybersecurity requirements;
Requirements and d) the higher level architectural design; and
Architectural Design e) the operational environment.
EXAMPLE 5: Interface specifications between hardware and software.
NOTE 6: The architectural design can include the static design aspects
and the dynamic design aspects.
NOTE 7: Information for correct integration and initialization of
cybersecurity controls can be included in the architectural design.
Product Development - [RC-10-02] The refined architectural design should apply architectural design
Requirements and principles to avoid or minimize the introduction of weaknesses.
Recommendations - NOTE 8: Examples of design principles for architectural design for
Refinement of cybersecurity are given in NIST SP 800-1600, appendix F.1.
Cybersecurity NOTE 9: Design principles can be achieved by applying and enforcing
Requirements and design and modelling guidelines.
Architectural Design
Product Development - [RQ-10-05] During the refinement of cybersecurity requirements, the cybersecurity
Requirements and implications 1318 of post-development phases shall be considered.
Recommendations -
Refinement of
Cybersecurity
Requirements and
Architectural Design
Product Development - [RQ-10-06] If specific procedures are required to ensure cybersecurity in post-
Requirements and development phases, these cybersecurity requirements shall be
Recommendations - specified and allocated to the relevant entities of the operational
Refinement of environment.
Cybersecurity EXAMPLE 8: Table 1 provides example requirements and procedures
Requirements and to ensure cybersecurity in post-development phases including their
Architectural Design allocation.
Product Development - RQ-10-07] The refined cybersecurity requirements shall be verified to ensure:
Requirements and a) completeness, correctness, and adequacy with the cybersecurity
Recommendations - requirements from higher level; and
Refinement of b) consistency with the architectural design from higher level.
Cybersecurity
Requirements and
Architectural Design
Product Development - [RQ-10-08] The refined architectural design shall be verified to ensure:
Requirements and a) compliance with the refined cybersecurity requirements;
Recommendations - b) compliance with the architectural design from higher level; and
Refinement of c) for software development: compatibility with the target environment.
Cybersecurity NOTE 12: The target environment includes architectural constraints.
Requirements and EXAMPLE 9: Verification methods can include:
Architectural Design - review;
- analysis;
- simulation; and
- prototyping.
NOTE 13: If CAL is used, then Annex E (Table E.3) provides methods
of verification and criteria for applicability.
Product Development - [RQ-10-09] Vulnerability analysis in accordance with 7.5 shall be performed to
Requirements and identify vulnerabilities associated with the refined architectural design
Recommendations - and refined cybersecurity requirements, including the interactions
Refinement of between components that could impair the fulfilment of the refined
Cybersecurity cybersecurity requirements.
Requirements and
Architectural Design
Product Development - [RQ-10-12] Verification activities shall be performed to confirm that the
Requirements and implementation of the design and the integration of the components are
Recommendations - compliant with:
Integration and a) the refined cybersecurity requirements (result of [RC-10-01] to [RQ-
Verification 10-01]); and
b) the refined architectural design (result of [RQ-10-02] to [RQ-10-04]).
NOTE 1: This can include the vehicle integration and verification at
system level.
NOTE 2: The results of the hardware and software verification activities
can be considered at system level.
NOTE 3: Verification activities can include regression testing for
updates and changes and re-testing for patching of a discovered
vulnerability.
NOTE 4: Verification methods as part of standard engineering per a
quality management system can be used as a baseline. Additional
verification types or activities specific for cybersecurity can be used.
EXAMPLE 1: Methods for verification can include:
- requirements-based test;
- interface test;
- resource usage evaluation;
- verification of the control flow and data flow; and
- static analysis; for software: static code analysis.
NOTE 5: If CAL is used, then Annex E (Table E.4) provides methods of
verification and criteria for applicability.
Product Development - [RQ-10-13] The integration and verification specification for the verification activities
Requirements and of [RQ-10-12] shall be defined considering:
Recommendations - a) the refined architectural design;
Integration and NOTE 6: This includes assumptions on reused components.
Verification EXAMPLE 2: The hardware-software interface can require specific
consideration.
b) the refined cybersecurity requirements;
c) the vulnerability analysis of [RQ-10-09] and the results of
vulnerability management of [RQ-10-10];
d) configurations and/or calibration processes intended for production,
if applicable;
e) dependencies 1379 that are relevant for integration; and
f) sufficient resources to support the functionality specified in refined
cybersecurity requirements.
NOTE 7: The verification specification initiated during system
development can be further refined during hardware and software
development.
Product Development - [RQ-10-14] If testing is used for the verification activities of [RQ-10-12], test cases
Requirements and shall be specified that include pass/fail criteria.
Recommendations - EXAMPLE 3: Methods of test case specification can include:
Integration and - analysis of requirements;
Verification - generation and analysis of equivalence classes;
- boundary values analysis; and/or
- error guessing based on knowledge or experience.
NOTE 8: If CAL is used, then Annex E (Table E.5) provides methods of
test case specification and criteria for applicability.
Product Development - [RQ-10-15] Test coverage by test cases shall be determined for the completeness
Requirements and of testing activities using a defined test coverage metric relevant for
Recommendations - cybersecurity.
Integration and NOTE 9: Test coverage can be determined by the use of appropriate
Verification software tools.
NOTE 10: A target value below full test coverage can be sufficient if a
rationale is provided.
NOTE 11: Test coverage is only useful for determining whether all
requirements were transcribed into implementation and realization; e.g.,
software code in the case of software development, and whether the
implementation matches the requirements.
NOTE 12: Some weaknesses go beyond the fact that all possible
control flows are evaluated. For example, improper sequence of
operations, insufficient authentication. As a consequence, a review of
the coverage of common weaknesses by the tests can complement this
activity.
NOTE 13: Analysis of test coverage can reveal shortcomings in
requirements-based test cases, inadequacies in requirements, dead
code, deactivated code or unintended functionality.
EXAMPLE 4: Structural coverage metrics at the software unit level can
include:
- statement coverage; and/or
- branch coverage.
NOTE 14: For software development, if instrumented code is used to
determine the degree of structural coverage, it can be necessary to
provide evidence that the instrumentation has no effect on the test
results. This can be done by repeating representative test cases with
non-instrumented code.
EXAMPLE 5: Structural coverage at the software architectural level can
include:
- function coverage; and/or
- call coverage.
NOTE 15: If CAL is used, then Annex E (Table E.6 and Table E.7)
provide methods and criteria for applicability.
Product Development - [RQ-10-16] A verification that components do not contain any unspecified 1415
Requirements and functionality shall be performed.
Recommendations - NOTE 16: Unspecified functionality is not explicitly described in the
Integration and architecture design specification but is implemented for any reason.
Verification EXAMPLE 6: For software development, code used for debugging or
instrumentation.
NOTE 17: If the unspecified function is deactivated, this can be an
acceptable control.
NOTE 18: If the unspecified function is encapsulated in a separate zone
outside of the trust boundary, this can be an acceptable control.
Product Development - [RQ-10-17] If testing is used for the verification activities of [RQ-10-12], the test
Requirements and environment shall be suitable for achieving the test objectives.
Recommendations - EXAMPLE 7: Test environments can include:
Integration and - hardware-in-the-loop;
Verification - electronic control unit network environments; and/or
- vehicles.
NOTE 19: In software development, the target environment can be
considered. Depending on the scope of the tests and the hierarchical
level of integration, the appropriate test environments for the execution
of the software components can be used. Such test environments can
be the target processor for final integration, a processor emulator or a
development system for the previous integration steps.
NOTE 20: In software development, if the integration testing is not
carried out in the target environment, the differences between the test
environment and the target environment can be analyzed in order to
specify additional tests in the target environment during the subsequent
test phases.
NOTE 21: In software development, differences between the test
environment and the target environment can arise in the source or
object code, for example, due to different bit widths of data words and
address words of the processors.
Product Development - [RC-10-03] Component testing should be performed to search for unidentified
Requirements and vulnerabilities.
Recommendations - EXAMPLE 8: Test methods to search for vulnerabilities can include:
Integration and - penetration testing;
Verification - vulnerability scanning; and/or
- fuzz testing.
NOTE 22: If CAL is used, then Annex E (Table E.8) provides test
methods and criteria for applicability.
NOTE 23: In software development, different weaknesses can exist in
the test environment and the target environment, and their triggering
into vulnerabilities depends on the functionality or code that executes
on them. Thus, the studied differences between the test environment
and the target environment encompass also existing weaknesses and
how they can or cannot be triggered by the functionality or code that
executes on them.
Product Development - [RC-10-04] Design principles for software unit design and implementation at the
Requirements and source code level should be applied to achieve the following
Recommendations - characteristics:
Specific Requirements for a) correct order of execution of subprograms and functions within the
Software Development software units, based on the software architectural design;
b) consistency of the interfaces between the software units;
c) correctness of data flow and control flow between and within the
software units;
d) low complexity;
e) readability and comprehensibility;
f) robustness;
EXAMPLE 5: Methods to prevent use of tainted data.
g) suitability for software modification (unless ease of software
modification runs contrary to the cybersecurity requirements); and
h) verifiability.
NOTE 2: These characteristics can be achieved by applying and
enforcing coding guidelines.
NOTE 3: Coding guidelines can cover aspects such as safety and
overall code quality as well as the required cybersecurity properties.
Product Development - [RQ-10-21] The software unit design and the implemented software unit shall be
Requirements and 1488 verified to provide evidence for compliance with the coding
Recommendations - guidelines of [RQ-10-20], if applicable.
Specific Requirements for
Software Development
Cybersecurity Validation - [RQ-11-02] A validation specification for the validation activities of [RQ-11-01] shall
Requirements and be defined considering the configurations intended for production.
Recommendations
Cybersecurity Validation - [RC-11-01] Penetration testing should be performed to validate the cybersecurity
Requirements and goals as part of the validation activities of [RQ-11-01].
Recommendations NOTE: The extent of penetration testing can be defined based on risk
considerations.
Cybersecurity Validation - [RQ-11-03] Vulnerabilities revealed during the validation activities of [RQ-11-01]
Requirements and shall be managed in accordance with 7.6.
Recommendations
Cybersecurity Validation - [PM-11-01] If the residual risk is unacceptable, activities from 10 or, 9.4 and 9.5
Requirements and may be re-performed.
Recommendations
Cybersecurity Validation - [RQ-11-04] The validation of the item shall confirm that all the risks identified during
Requirements and the concept and product development phases are accepted or have
Recommendations been treated such that they are accepted, based on a rationale.
Cybersecurity Validation - [WP-11-01]Validation specification, resulting from [RQ-11-02].
Work Products
Cybersecurity Validation - [WP-11-02]Validation report, resulting from [RQ-11-01] and [RC-11-01] to [RQ-11-
Work Products 04].
Production - Requirements [RQ-12-01] A production control plan shall be created that applies the cybersecurity
and Recommendations requirements for post-development and includes:
a) the cybersecurity requirements for post-development allocated to
production;
b) an outline of the necessary installation procedures to achieve a);
NOTE 1: To manufacture an item or component and install the
hardware and software, the production process can use privileged
access. Such access can be used to introduce vulnerabilities in the item
or component if used in an unauthorized manner after production.
EXAMPLE 1: Removal of production access once the item or
component is produced.
c) description of protection measures for components to prevent
unauthorized alteration; and
NOTE 2: The protection measures can cover physical access and
logical access.
EXAMPLE 2: Physical measure that prevents physical access to
production servers holding software.
EXAMPLE 3: Logical measure that applies cryptographic techniques
and/or access controls.
EXAMPLE 4: Protected components can include:
- microcontrollers and processors;
- control units;
- systems;
- low-level programs;
- bootloaders;
- application software; and/or
- cryptographic material.
d) methods to confirm that the cybersecurity requirements for post-
development are met in the item or component.
NOTE 3: Methods can include verification, validation, inspection or
configuration and calibration checks.
NOTE 4: Methods can be conducted at the component level to give
assurance, and to reduce testing at the integrated item level.
NOTE 5: The production control plan can be included as part of an
overall production plan.
Operations and [RQ-13-05] Cybersecurity implications of recovery options for updates shall be
Maintenance -Updates - considered in accordance with 0.
Requirements and NOTE 3: Recovery options can negatively affect the cybersecurity of
Recommendations the item or component.
EXAMPLE 1: Recovery options can include:
- rollback of the update to restore the item or component to its
previous state; and/or
- replacement/repair of the item or component.
Distributed Cybersecurity [RC-15-01] To support the customer’s evaluation of supplier capability, the supplier
Activities - Requirements 1726 should provide a cybersecurity record of capability.
and Recommendations - NOTE 2: The supplier’s record of capability can include:
Demonstration and a) evidence of the organization’s capability concerning cybersecurity
Evaluation of Supplier (e.g., cybersecurity best practices from the development, post-
Capability development, governance, quality, and information security);
b) evidence of continuous cybersecurity activities in accordance with
Clause 7;
c) summary of previous cybersecurity assessments;
d) organizational audit results, if available;
e) evidence of an information security management system; and
f) evidence of the organization's management systems in accordance
with 5.4.6.
NOTE 3: An organization can outsource parts of running a
management system.
Distributed Cybersecurity [RQ-5-02] When cybersecurity activities are distributed, a request for quotation
Activities - Requirements from the customer to the candidate supplier shall include:
and Recommendations - a) a formal request to comply with this document;
Request for Quotation b) the expectation of cybersecurity responsibilities taken by the supplier
in accordance with 15.4.3; and
c) the cybersecurity goals or the set of relevant cybersecurity
requirements, including their attributes, depending on what the supplier
is quoting for.
EXAMPLE: Technical specification for integrating message
authentication.
Distributed Cybersecurity [RQ-15-03] The customer and the supplier shall specify the distributed
Activities - Requirements cybersecurity activities in a cybersecurity interface agreement including:
and Recommendations - a) the appointment of the customer’s and the supplier’s points of
Alignment of contact regarding cybersecurity;
Responsibilities b) if applicable, a joint tailoring of the cybersecurity activities in
accordance with 6.4.2;
c) the identification of the cybersecurity activities that are to be
performed by the customer and by the supplier, respectively;
EXAMPLE 1: Cybersecurity validation at the vehicle level performed by
the customer.
EXAMPLE 2: The distribution of cybersecurity activities regarding post-
development.
NOTE 1: The supplier, the customer or a third party can perform the
cybersecurity assessment concerning the components or work products
developed by the supplier.
NOTE 2: A RASIC table can be used, see Annex C.
d) the information and the work products to be shared, including
distribution, reviews and 1758 feedback mechanisms in the case of a
cybersecurity issue;
EXAMPLE 3: The shared information can include:
- information sharing strategy (see 5.4.5);
- information exchange procedures for cybersecurity vulnerability and
findings regarding cybersecurity risks;
- interface-related processes, methods and tools to ensure
compatibility between the customer and the supplier, such as proper
handling of data and securing the communication networks used to
pass that data;
- the definition of roles, the way of communicating and documenting
changes, and potentially a re-iteration of the risk determination;
- alignment on a tool for requirements management;
- process of reporting known vulnerabilities in a customer released
product; and/or
- results of cybersecurity assessments.
e) the target milestones regarding the cybersecurity activities of the
customer and the supplier; and
f) the definition of the end of cybersecurity support for the items or
components.
Distributed Cybersecurity [RC-15-02] The cybersecurity interface agreement should be concluded between
Activities - Requirements the customer and the supplier by the start of the distributed activities.
and Recommendations - EXAMPLE 4: Cybersecurity interface agreement for development,
Alignment of cybersecurity interface agreement for production.
Responsibilities
Distributed Cybersecurity [RQ-15-04] If a vulnerability report in accordance with 7.5 requires actions, the
Activities - Requirements customer and the supplier shall agree the actions required and who
and Recommendations - performs them.
Alignment of
Responsibilities
Distributed Cybersecurity [RQ-15-05] When there is a risk of not conforming to the agreed cybersecurity
Activities - Requirements planning, or a risk concerning cybersecurity, the other party shall be
and Recommendations - informed and both parties shall agree on a resolution.
Alignment of
Responsibilities
Distributed Cybersecurity [RQ-15-06] A party shall notify the other if there are conflicts concerning
Activities - Requirements cybersecurity requirements between cybersecurity and related
and Recommendations - disciplines (see [RQ-05-05]) such that appropriate action and decision
Alignment of can take place.
Responsibilities
Distributed Cybersecurity [RQ-15-07] If the customer’s cybersecurity requirements are unclear or not feasible,
Activities - Requirements the supplier shall consult the customer to come to a mutual
and Recommendations - understanding.
Alignment of
Responsibilities
Distributed Cybersecurity [RC-15-03] The definition of responsibilities should be specified in a matrix of
Activities - Requirements responsibility assignment.
and Recommendations - EXAMPLE 5: Template in Annex C.
Alignment of
Responsibilities
Distributed Cybersecurity [WP-15-01]Cybersecurity interface agreement, resulting from the requirements of
Activities - Work Products 15.4.3.
aft International Standard)
Section Category Requirement
For the assessment the Approval Authority or its
Technical Service shall verify that the vehicle
manufacturer has a Cyber Security Management
7.2.1 CSMS System in place and shall verify its compliance
with this Regulation
Threads to vehicles
regarding their external
connectivity and
connections
Hosted 3rd party software, e.g., entertainment
applications used as a means to attack vehicle
systems
Devices connected to external interfaces, e.g.
USB ports or OBD port used as a means to
attack vehicle systems
Threads to vehicle
data/code
Erasure of data/code
Introduction of malware
1.1
1.2
1.3
2.1
3.1
3.2
3.3
3.4
3.5
4.1
4.2
5.1
5.2
5.3
5.4
5.5
6.1
6.2
6.3
7.1
7.2
8.1
8.2
9.1
10.1
11.1
11.3
11.4
12.1
12.2
12.3
12.4
13.1
15.1
15.2
16.1
16.2
16.3
17.1
18.1
18.2
18.3
19.1
19.2
19.3
20.1
20.2
20.3
20.4
20.5
21.1
21.2
22.1
23.1
24.1
25.1
25.2
26.1
26.2
26.3
27.1
28.1
28.2
29.1
29.2
30.1
31.1
Description
Unauthorized internal access to the server (enabled, e.g., by backdoors, unpatched system software
vulnerabilities, SQL attacks or other means)
Unauthorized physical access to the server (conducted by, e.g., USB sticks or other media connecting
to the server
Attack on back-end server stops it functioning, for example it prevents it from interacting with vehicles
and providing services they rely on
Loss of information in the cloud/KMS/HSM. Sensitive data may be lost due to attacks or accidents
when data is stored by third-party cloud/KMS/HSM service providers.
Unauthorized internet access to the server (enabled, e.g., by backdoors, unpatched system software
vulnerabilities, SQL attacks or other means)
Unauthorized physical access to the server (conducted by, e.g., USB sticks or other media connecting
to the server
Information breach by unintended sharing of data (e.g., admin errors)
Spoofing of messages by impersonation (e.g., 802.11p V2X during platooning, GNSS messages)
Sybil attack (in order to spoof other vehicles as if there are many vehicles on the road)
Communication channels permit code injection, for example tampered software binary might be
injected into the communication stream
Communication channels permit introduction of data/code to the vehicle (write data code)
Accepting information from an unreliable or untrusted source
Replay attack, for example an attack against a communication gateway allows the attacker to
downgrade software of an ECU or firmware of the gateway
Sending a large number of garbage data to vehicle information system, so that it is unable to provide
service in the normal manner
Black hole attack, in order to disrupt communication between vehicles the attacker is ably to block
messages between the vehicles
An unprivileged user is able to gain privileged access, for example root access, access to ACL
Virus embedded in communication media infects vehicle systems
Malicious proprietary messages (e.g., those normally sent from OEM or component/system/function
supplier)
Compromise of over-the-air software update procedures. This includes fabrication the system update
program or firmware
Compromise of local/physical software update procedures. This includes fabrication the system
update program or firmware
The software is manipulated before the update process (and is therefore corrupted), although the
update process is firmware
Innocent victim (e.g., owner, operator or maintenance engineer) being tricked into taking an action to
unintentionally load malware or enable an attack
Manipulation of functions designed to remotely operate systems, such as remote key, immobilizer,
and charging pile
Corrupted applications, or those with poor software security, used as a method to attack vehicle
systems
External interfaces such as USB or other ports used as a point to attack, for example trough code
injection
Diagnostic access (e.g., dongles in OBD port) used to facilitate vehicle parameters (directly or
indirectly)
Unauthorized access to the owner's privacy information such as personal identity, payment account
information, address book information, location information, vehicle's electronic ID, etc.
Identity fraud. For example, if a user wants to display another identity when communications with toll
systems, manufacturer backend
Action to circumvent monitoring systems (e.g., hacking/tampering/blocking of messages such as ODR
Tracker data, or number of runs)
Data manipulation to falsify vehicle's driving data (e.g., mileage, driving speed, driving directions, etc.)
Unauthorized access of falsify the configuration parameters of vehicle's key functions, such as brake
data, airbag deployed threshold, etc.
Unauthorized access of falsify the charging parameters, such as charging voltage, charging power,
battery temperature, etc.
Combination of short encryption keys and long period of validity enables attacker to break encryption
Hardware or software, engineered to enable an attacker or fails to meet design criteria to stop an
attack
Software bug. The presence or software bugs can be a basis for potential exploitable vulnerabilities.
This is particularly true if software has not been tested to verify that known bad code/bugs is not
present and reduce the risk of unknown bad code/bug being present
Using remainders from development (e.g., debug ports, JTAG ports, microprocessors, development
certificates, developer passwords, …) can permit access to ECUs or permit attackers to gain higher
privileges
Circumvent network separation to gain control. Specific example is the use of unprotected gateways,
or access points (e.g., truck-trailer gateways), to circumvent protection and gain access to other
network segments to perform malicious acts, such as sending arbitrary CAN bus messages
Information breach. Personal data may be leaked when the car changes user (e.g., is sold or used as
hire vehicle with new hirers)
Replacement of authorized electronic hardware (e.g., sensors) with unauthorized electronic hardware
Manipulation of the information collected by a sensor (for example, using a magnet to tamper with
the Hall effect sensor connected to the gearbox)
Value
Impact Category Safety Financial Operational Privacy
Ne 0 0 0 0
Mo 10 10 1 1
Ma 100 100 10 10
Se 1000 1000 100 100
Risk Treatment
Strategy
Avoid
Mitigation
Transfer
Accept
To obtain the "Total", "AF Level" & "Risk Value" in "Attack Feasibility Assessment", drag from bottom ri
Negligible
Moderate
Major
Severe
Severe
Major
Moderate
Negligible
nt", drag from bottom right corner of the preceding box on top
Layman