1 - ISO 21434 준수 확인을 위한 사이버 보안 프로세스 심사의 이해와 대응 방안
1 - ISO 21434 준수 확인을 위한 사이버 보안 프로세스 심사의 이해와 대응 방안
1 - ISO 21434 준수 확인을 위한 사이버 보안 프로세스 심사의 이해와 대응 방안
V1.0 | 2021-10-26
1/20
Agenda
2/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
I. Overall plan of cybersecurity and status
Motivation : New UN Regulations for CSMS, SUMS
Source : https://unece.org/
u UN Regulation No. 155 : Cyber Security and Cyber Security Management System (CSMS)
u UN Regulation No. 156 : Software Update Processes and Software Update Management System (SUMS)
Additional certifications are required to ensure the integrity of future AD : CSMS and SUMS
3/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
I. Overall plan of cybersecurity and status
UN Regulation and Standards : schedules
4/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
Agenda
5/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
II. Referenceable standards for cybersecurity audit
Relationship between regulation and standards
u OEM will be required CSMS Certification for UNECE Regulation 155 to sell the vehicle in market
u OEM & Supplier need Cybersecurity Audit to judge the fulfilment of ISO 21434 requirements
PAS 5112
4
4
Overall concept
u VDA ACSMS Audit provides guidance for CSMS audit including main questionnaires and is being referenced by some OEMs.
u ISO PAS 5112 is providing more abundant auditing guideline, pass/fail criteria and examples of evidence regarding for each
work product. But it is still in development phase.
7/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
II. Referenceable standards for cybersecurity audit
Example : Overview of VDA ACSMS Audit
Risk assessment, categorization and Q3.1 Is a process established to assess and categorize cybersecurity risks for items and components across development, production and post-production? 1
management Q3.2 Is a process treat cybersecurity risks for items and components across development, production and post-production? 1
Consistency check Q4.1 Is a process established to verify that identified cybersecurity risks are managed adequately? 3
Q5.1 Is a process established to specify cybersecurity requirements? 2
Cybersecurity specification, Q5.2 Is a process established to validate the cybersecurity requirements of items or verify them on components during development phase? 3
verification, validation and release Q5.3 Is a process validate the cybersecurity requirements of items or verify them on components during production phase? 1
Q5.4 Is a process established to release items and components for post-development phases? 2
Updating the risk assessments Q6.1 Is a process established to keep the cybersecurity risk assessment current? 4
Q7.1 Is a process established to monitor for cybersecurity information? 1
Q7.2 Is a process established to detect cybersecurity events? 1
Q7.3 Is a process established to assess cybersecurity events and analyze vulnerabilities? 1
Cybersecurity incident response
Q7.4 Is a process established to manage identified vulnerabilities? 4
Q7.5 Is a process established to respond on cybersecurity incidents? 2
Q7.6 Is a process established to validate the effectiveness and adequacy of the response to a cybersecurity incident? 1
Reporting against authorities Q8.1 Is a process established to provide detected and relevant data from attempted or successful cyberattacks for analysis? 1
Cybersecurity management in the
Q9.1 Is a process established to manage dependencies that may exist with relevant contract partners regarding the Cybersecurity Management System? 1
supply chain
9/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
III. Approach for major cybersecurity audit area
Organizational process
u Organizational process can organically connect from top-level goal of management and to detailed
guideline and templates to support its realization
Process Framework
Process realization
Product Liability
Functional Safety Cybersecurity Homologation
u Generic E/E u Product u UNECE R155.
systems development: CSMS
Process manual
development: ISO 21434, u Goal of process
IEC 61508 SAE J3061 u UNECE R156. u Owner of process
u Automotive u Enterprise IT SUMS
functional safety Security:
u Entry/Exist Criteria
ISO 26262 ISO 27001, :
Category Sub process
u SOTIF: ISO TISAX :
21448 :
Process Maturity: ISO 330xx Project
Project Planning Project Control …
Policy & Manual
Application of methodological Frameworks, i.e. A-SPICE or CMMI management
Product Prototype Project Procedure
Product Development Process: ISO 9001, IATF 16949 Engineering development Development
.. (Definition)
purchase
Equipment/gener How to perform
Continuous improvement Purchasing
management
al purchase … a tasks
management
Supply Supplier Component
Management …
Responsibilities
management management development
Engineering Process
:
Requirements
Satisfaction
Team2
Customer
Customer
Department
Measurement Input Task Task Output
Resource
& analysis and
Management
Improvement
Forms & Forms &
Records Records
Team1
Task Output
Product Realization
input Product
How do I decide what to do and in How do I do it? Commitment Mindset Risk Business
what order? u For an effective, sustainable security effort Management Impact
u The following prerequisites must be in place prerequisites must be in place such as
for an effective, sustainable security effort: • Protect sensitive data. u Support from u Implementation of
• management commitment to security • Maintain a vulnerability management program. u Involvement u Policies acceptance management CS policy
• security policy • Implement strong access control measures
security risk assessment results • Maintain a security policy u Recognizing u Competence
• u Lesson-Learnt u compromise
• security strategy and plan : personal management between security
: responsibility Reporting Culture
u and business needs
u Collaboration with
How do I decide what to do next? u Understand of security team u Security
u The Act phase involves determining how best How do I know if what I did worked? impact of personnel
u The check phase involves regular Recognition
to sustain the current security state of action
systems and software while also monitoring, intrusion detection and other
accommodating changes and improvements. security alert mechanisms
u Continuous risk management shall be performed throughout the whole product lifecycle for
cybersecurity.
Concept phase Product development phase Post-development phase
As tier-1: Agree scope with OEM Threat analysis and risk assessment
Item identification As OEM: Collaborate with suppliers
Attack Feasibility
(Ease of Exploitation)
u Although some technical challenges remain in cybersecurity context, R&D activities in development
phase are not much different from those of functional safety context.
Production / Operation
Traceability and consistency are still the most important concerns during development phase.
13/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
III. Approach for major cybersecurity audit area
Continuous cybersecurity Activities Validation
report
Concept Specify cybersecurity goals Perform validation Cybersecurity
activities Validation
Chapter 9 State cybersecurity claims
Vulnerability report Chapter 11
Goals and Validation
claims specification
Cybersecurity events
SW/HW cybersecurity Integration and
requirements and verification specification
interface specification
Create software/hardware
Define integration and
architectural design
verification specification
Implement the design
Implementation
Vulnerability Analysis covers weaknesses and cybersecurity events from all activities.
14/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
III. Approach for major cybersecurity audit area
Cybersecurity activities during production phase
u The production control plan should include measures to verify the cybersecurity integrity of the
product.
u It should also be considered that vulnerabilities can be introduced into the product even during the
production process.
Product aspect Production process aspect
u Production control plan is created to : ▪ Example of threat in production
site
u Ensure that cybersecurity requirements for post-development are
applied to the item or component • Unpatched devices: Patching not
available or feasible
u Ensure that it cannot be exploited during production
• Insecure protocols: Unencrypted
u Ensure that additional vulnerabilities cannot be added during networks and/or systems
production.
• Shadow OT: Unknown devices and
u The production control plan should include : connections
u Related rules, specifications, analyses results, and validations • Insecure authentication: Flaws
arising from design or
u cybersecurity requirements for post-development and those Information Operational implementation oversights
included in production Technology Technology
• Insider threat: Unintentional
u description of the protection measures for components to prevent Image source : https://www.klimaoprema.com/en/digital- incidents delivered via infected
unauthorized alteration transformation-of-panel-production-for-cleanrooms/728 devices (such as USB sticks)
Follow the latest guidelines for operational technology security and the IATF 16949
as well as product-specific security measures.
15/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
III. Approach for major cybersecurity audit area
Cybersecurity incident response
u It is recommended to list available sources of cybersecurity information and define responsibility for
corresponding information.
u Project-independent cybersecurity incident monitoring should be performed continuously.
18/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
VI. Summary
Conclusion
u A safe & secure E/E function can be defined as the fulfillment of requirements given by standards.
u Continuous cybersecurity risk management and field monitoring are the highlights of CSMS.
u It is recommended that extending an existing process system rather than create additional measures
for cybersecurity.
19/20 © 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26
For more information about Vector
and our products please visit
www.vector.com
Author:
Kim, Youn Ho / Joo, Unggul
Vector Consulting
© 2021. Vector Consulting Services GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.0 | 2021-10-26