With the inter-connectivity of devices becoming ever more present in our lives, it’s vital to bring security standards up to par. In the automotive industry, this can be especially difficult owing to its many unique properties that make the problems of security unique to the industry.
Considering how different automotive domain is from all the others, it’s hard to come up with a suitable security assurance framework addressing the whole life-cycle. You can’t apply available approaches from other domains directly, but it’s still possible to use some of their core ideas. Let’s have a look at what those ideas may be and how to apply them to a possible automotive information security framework.
Information Security Standards
With the growing interconnectivity of modern cars, mobile integration and use of the internet, it’s safe to say that private networks in the car will soon be no more. It comes with increased functionality, cost-effectiveness, and comfort, but also new implications for functional safety. In those circumstances, it’s clear that we need to define sector-specific automotive security standards, but to do so, we must draw from existing security frameworks of other industries.
Goals of Automotive-Specific Information Security Standard
The main priority of any security standard is to make security a core part of the development process. Automotive systems need to be protected, so there should be an effort to do that by extending the existing quality systems. That includes identifying and managing risks as well as allowing for independent reviews of information security practices.
The Difference Between Automotive and IT Systems
It’s very likely that some IT-related practices can be applied to the automotive context when building a security framework. However, we need to take the differences between the two domains into account. Owing to their characteristics, automotive and IT systems face different threats. In automotive, adversaries may have physical access to devices. Also, there are specific resource constraints placed on automotive systems that are not an issue in IT systems. Additionally, automotive systems are expected to last a long time, working reliably with minimum maintenance for up to 20 years.
Challenges of Information Security Approach
The uniqueness of the automotive domain poses more interesting problems that need to be solved. Namely, how do we approach security processes? The solution could be a company-level implementation, which means that each company must ensure their product development processes have the same focus on security. However, the level of protection could be different for each product. Therefore it becomes a challenge to ensure an industry-wide security requirement level across different product classes.
What if we apply the Common Criteria Security Assurance Concept ?
We have learned a lot from the Common Criteria framework applied on IT products. It proved to be successful in some domains such as the financial and the government IT procurement area. Given the swift product life cycle and flexible nature of business operations nowadays, initiatives for improving the existing concept are taking place. Considering this, the elements of an efficient automotive security assurance framework should have the following properties:
Security Profiles/Protection Profiles — should outline the security goals “(e.g. strong authentication, firmware integrity, and human safety)” of the automotive product classes.These have to be based on well thought security risk analysis involving risk-owners, developers and cybersecurity experts. Standardizing these would provide an industry-wide application of common security goals for each given product class;
System Security Requirements — working in tandem with the security profiles, these would define security requirements focusing on the level of controls “(e.g.tamper resistant secure storage, certified RNG and Secure event logging)”. Each product would have a minimum of these security requirements to fulfill, establishing an expectation for the level of security it should possess;
Process Requirements — this will define all the activities related to product development and operational phase to comply with the security level requirement of the security profile “(e.g. ISO 26262, SDLC, GDPR, ISO 27000, etc.) ,”
Security Assurance Methodology — an optional step to establish the measures each internal or external evaluator should take to determine whether a product meets the needs of the security profile.
Coming up with an automotive security assurance framework is undoubtedly a challenge for security and automotive experts alike. However, the automotive domain could benefit significantly from it, making end users safer and propelling the progress of the entire industry.
Originally this article was published here.
This article was written by Roland Atoui, Managing Director & Founder of Red Alert Labs, expert in Information Security and Certification with more than 10 years of experience in the industry. From smart cards to smart phones to smart manufacturing, Roland is a new technology enthusiast with a current mission to bring trust to the Internet of Things.