Security evaluation of connected vehicles based on ISO/IEC 15408

Blog

10
- Sept
2019
Security evaluation of connected vehicles based on ISO/IEC 15408

During the last few months, jtsec has been working in the elaboration of a response to the Call of Contribution of the ISO/IEC JTC 1/SC 27/WG 3 workgroup for studying the impact and possible formulas for applying the ISO/IEC 15408 evaluation methodology to security evaluations of connected vehicles.

This contribution aims to provide an insight on the current problematic related to the application of the information security evaluations, when applied to the complex and new technology of the connected vehicles. Currently, the ISO/IEC 15408 standard (also known as Common Criteria) has been successfully applied to a wide variety of ICT products that require to be evaluated under a standard and well-recognized evaluation criteria for providing a guarantee that a determined level of security is achieved by the product. However, the scenario of smart vehicles connected in an Intelligent Transport System (ITS) involves a complex problem for the application of ISO/IEC 15408 evaluation criteria.

The important degree of connectivity of smart vehicles is one of the key factors that contribute to the complexity of this problem. V2V (vehicle-to-vehicle), V2I (vehicle-to-infrastructure), V2N (vehicle-to-network) and V2D (vehicle to device) are new mechanisms incorporated in the new paradigm of connected vehicles. At the same time, different communication technologies, such as LTE, DSRC or 5G is used depending on the application requirements.

One of the main difficulties of applying this standard is that the balance between security functions and vehicle safety must be considered. On the other hand, new security functional components need to be elaborated for the particularities of this type of technology. This makes the study necessary for determining whether the methodology is applicable and effective for connected vehicles

In this contribution, out teammate José Pulido has performed an in-depth analysis of the vehicle-to-everything (V2X) technologies involved in the current state of the art. The in-vehicle technologies have also been analyzed from the point of view of security. Based on the threat modelling for those scenarios, an ISO/IEC 15408 based design of security functionality has been formulated, allowing to understand which security functional requirements of the Common Criteria standard can be used as part of the solution to this problem.

Besides, it has been carried out a study of different approaches to the elaboration of protection profiles for the evaluation of the technological components involved in V2X technologies. As a part of that work, it was analyzed the possible advantages and disadvantages of the proposed models. This includes a deep analysis of the different composition methodologies that could be applied to this type of scenarios.

Finally, the study recommends the continuation of the existing work and the creation of working groups intended to make a formal definition of the components to be certified, and of the protection profiles designed for evaluation and certification. Those protection profiles define in detail all the functional and security assurance requirements that must be considered in the security evaluation of each vehicle component. As a conclusion to the previous work, it has been recommended to have the support of relevant authorities that dictate that connected vehicles must be security certified if they are intended to be part of connected intelligent transport systems.

From jtsec we hope that this work will serve to advance in the standardization security evaluations of modern connected vehicles.

José Pulido/Consulting Leader

Senior consultant of the Common Criteria, ISO 27001, SOC2 and ENS standards and expert security software developer. Systems administrator and technology consultant with more than 6 years of experience in the field of computer security. Jose is responsible for the development of the CCGen tool to help generating Common Criteria documentation.

He has participated in security assessment projects of technological products of multinational firms, being part of both the assessment and consulting teams, providing his expert point of view in strategic decision making for cybersecurity. As a developer, he has taken part in the development of integral security projects, carrying out works oriented from the most internal parts of the systems to the security in the user interaction.

Currently he is the consulting leader of jtsec's team of cybersecurity experts, focusing his work in the field of cybersecurity consulting, but continuing with the management of security-oriented software project development teams. His main motivation to work in cybersecurity is helping to protect users from cyberthreats and information theft.


Contact

Send us your questions or suggestions!

By sending your data you allow us to use it to resolve your doubts by sending you commercial information of interest. We will delete it when they are no longer necessary for this matter. Know your rights in our Privacy Policy.