SAE J 3061-2016 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems.pdf
《SAE J 3061-2016 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems.pdf》由会员分享,可在线阅读,更多相关《SAE J 3061-2016 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems.pdf(128页珍藏版)》请在麦多课文档分享上搜索。
1、 _ SAE Technical Standards Board Rules provide that: “This report is published by SAE to advance the state of technical and engineering sciences. The use of this report is entirely voluntary, and its applicability and suitability for any particular use, including any patent infringement arising ther
2、efrom, is the sole responsibility of the user.” SAE reviews each technical report at least every five years at which time it may be revised, reaffirmed, stabilized, or cancelled. SAE invites your written comments and suggestions. Copyright 2016 SAE International All rights reserved. No part of this
3、publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of SAE. TO PLACE A DOCUMENT ORDER: Tel: 877-606-7323 (inside USA and Canada) Tel: +1 724-776-49
4、70 (outside USA) Fax: 724-776-0790 Email: CustomerServicesae.org SAE WEB ADDRESS: http:/www.sae.org SAE values your input. To provide feedback on this Technical Report, please visit http:/www.sae.org/technical/standards/J3061_201601 SURFACE VEHICLE RECOMMENDED PRACTICE J3061 JAN2016 Issued 2016-01 C
5、ybersecurity Guidebook for Cyber-Physical Vehicle Systems RATIONALE To provide a cybersecurity process framework and guidance to help organizations identify and assess cybersecurity threats and design cybersecurity into cyber-physical vehicle systems throughout the entire development lifecycle proce
6、ss. Defines a complete lifecycle process framework that can be tailored and utilized within each organizations development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning. Provides high-level gu
7、iding principles. Provides information on existing tools and methods. Provides the foundation for further standards development. TABLE OF CONTENTS 1. SCOPE . 5 1.1 Purpose 6 1.2 When to Apply a Cybersecurity Process 6 2. REFERENCES . 6 3. DEFINITIONS AND ACRONYMS 8 4. RELATIONSHIP BETWEEN SYSTEM SAF
8、ETY AND SYSTEM CYBERSECURITY 17 4.1 Analogies between System Safety and System Cybersecurity Engineering . 18 4.2 Unique Aspects of System Safety and System Cybersecurity 18 5. GUIDING PRINCIPLES ON CYBERSECURITY FOR CYBER-PHYSICAL VEHICLE SYSTEMS (CPS) . 20 5.1 Know Your Systems Cybersecurity Poten
9、tial 20 5.2 Understand Key Cybersecurity Principles 20 5.3 Consider the Vehicle Owners Use of the System . 21 5.4 Implement Cybersecurity in Concept and Design Phases . 21 5.5 Implement Cybersecurity in Development it is up to an organization to determine what is considered low risk and whether low
10、risk safety-related threats need to be addressed. To help ensure that all potential safety-related threats are considered, the Cybersecurity experts should communicate with the safety experts. Note that the basis of decision for following the process is on the identified potential risk of the identi
11、fied safety-related threats rather than on whether a corresponding potential hazard is ASIL rated (A, B, C, or D). This is because the threat risk for a safety-related threat may be low, while the corresponding hazard may be assessed a high ASIL; there is no direct correspondence between an ASIL rat
12、ing and the potential risk associated with a safety-related threat. 2. REFERENCES 1. ISO 26262 Part 8 First Edition, “Supporting Processes, Road Vehicles Functional Safety”, 11-15-2011. 2. Barbara J. Czerny. “System Security and System Safety Engineering: Differences and Similarities and a System Se
13、curity Engineering Process Based on the ISO 26262 Process Framework”, SAE Technical Paper 2013-01-1419, SAE World Congress and Exhibition, 2013. 3. B. Potter. Microsoft SDL Threat Modelling Tool. In: Network Security 2009.1 (2009), pp. 1518. ISSN: 1353-4858. DOI:http:/dx.doi.org/10.1016/S1353-4858(0
14、9)70008-X. URL: http:/ (cit. on p. 37). 4. Ivn Arce, Kathleen Clark-Fisher, Neil Daswani, Jim DelGrosso, Danny Dhillon, Christoph Kern, Tadayoshi Kohno, Carl Landwehr, Gary McGraw, Brook Schoenfield, Margo Seltzer, Diomidis Spinellis, Izar Tarandach, and Jacob West. “Avoiding the Top 10 Software Sec
15、urity Design Flaws”, IEEE Computer Society, 2014. SAE INTERNATIONAL J3061 JAN2016 Page 7 of 128 5. Global Alliance, Global Automakers, “Consumer Privacy Protection Principles for Vehicle Technologies and Services”, November 12, 2014. 6. NIST, SP 800-88, Revision 1, “Guidelines for Media Sanitization
16、”, December, 2014. 7. ISO/IEC 15408 “Information Technology Security Techniques Evaluation Criteria for IT Security”, (3 Parts). 8. NIST, Version 1, “Framework for Improving Critical Infrastructure Cybersecurity”, February 12, 2014. 9. NIST SP 800-53, Revision 4, “Security and Privacy Controls for F
17、ederal Information Systems and Organizations”, April 2014. 10. FIPS Pub 199. “Standards for Security Categorization of Federal Information and Information Systems”, February 2004. 11. ISO (International Organization for Standardization). “ISO 12207 - Systems and Software Engineering - Software LifeC
18、ycle Processes”, 2008. 12. ISO (International Organization for Standardization). “ISO/IEC 27001: - Information technology - Security techniques - Information security management systems - Requirements“. International Organization for Standardization. 27 January 2015. 13. ISO (International Organizat
19、ion for Standardization). “ISO/IEC 27002: Information Technology - Security Techniques. Code of Practice for Information Security Controls” 2008. 14. ISO (International Organization for Standardization). “ISO/IEC 29119: The International Software Testing Standard”, September 10, 2014. 15. NIST 800-6
20、1 Revision 2, “Computer Security Incident Handling Guide”, August 2012. 16. NIST Special Publication 800-30 Revision 1, “Guide for Conducting Risk Assessments”, September 2012. 17. Chrysler Corporation, Ford Motor Company, General Motors Corporation, QS 9000 Third Edition, “Quality System Requiremen
21、ts”, October 1998. 18. ISO/TS 16949:2009 “Quality Management Systems” December 2008. 19. Ruddle, Alastair, Ward, David, et al, EVITA Project Deliverable D2.3: “Security requirements for automotive on-board networks based on dark-side scenarios” Version 1.1, 30 December 2009. 20. EVITA deliverable D2
22、.1: “Specification and evaluation of e-security relevant use cases”, 2009. 21. Woody, Carol. “Applying OCTAVE: Practitioners Report.” Software Engineering Institute, May 2006. 22. Caralli, Richard, James Stevens, Lisa Young, and William Wilson. “Introducing OCTAVE Allegro: Improving the Information
23、Security Risk Assessment Process.” Software Engineering Institute, May 2007. 23. M. Islam et al., Deliverable D2 Security models. HEAVENS Project, Deliverable D2, Release 1. Dec. 2014. 24. ISO (International Organization for Standardization). Road vehicles - Functional safety ISO 26262:2011. (cit. o
24、n pp. 17, 30, 40, 42, 44). 25. BSI-Standard 100-4, Version 1.0, 2009, Federal Office for Information Security (BSI), Germany. 26. Automotive Industry Action Group (AIAG), “Potential Failure Mode and Effects Analysis (FMEA)”, 2008. 27. “Privacy Impact Assessment Guideline”, 2011, Federal Office for I
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SAEJ30612016CYBERSECURITYGUIDEBOOKFORCYBERPHYSICALVEHICLESYSTEMSPDF

链接地址:http://www.mydoc123.com/p-1027794.html