BSI PD CEN ISO/TR 21186-3:2021
$215.11
Cooperative intelligent transport systems (C-ITS). Guidelines on the usage of standards – Security
Published By | Publication Date | Number of Pages |
BSI | 2021 | 136 |
This document provides guidelines on security applicable in Intelligent Transport Systems (ITS) related to communications and data access.
In particular, this document provides analyses and best practice content for secure ITS connectivity using ISO/TS 21177.
This document analyses and identifies issues related to application security, access control, device security and PKI for a secure ITS ecosystem.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 4 Symbols and abbreviated terms |
14 | 5 Security in C-ITS 5.1 General 5.2 Security design process for C-ITS applications |
15 | 5.3 Communications security mechanisms in C-ITS |
17 | 5.4 Source authentication and access control mechanisms |
20 | 5.5 Certificate authorities and certification processes |
21 | 5.6 Introduction to the rest of this document |
22 | 6 Security analysis and controls for an IDX device 6.1 Background 6.2 IDX device concept 6.2.1 General |
24 | 6.2.2 System architecture and device |
26 | 6.2.3 Threat modelling data scenarios and examples |
29 | 6.2.4 Assumed device functions and activities |
32 | 6.3 Device assets |
34 | 6.4 Threats 6.4.1 General |
35 | 6.4.2 Threat modelling process 6.4.3 Threat categories and actor motivations |
37 | 6.4.4 Scenario comparison of threats |
39 | 6.5 Security objectives 6.5.1 Summary and comparison by scenario |
41 | 6.5.2 Analysis |
42 | 6.6 SFR and rationales |
49 | 6.7 Comparison to other common criteria PPs 6.7.1 General 6.7.2 Summary and analysis of gaps 6.7.3 Gap analysis with Car2Car HSM PP |
51 | 6.7.4 Gap analysis against V-ITS base PP |
55 | 6.7.5 Gap analysis against V-ITS Comms Module PP 7 ISO/TS 21177 access control implementation guidance 7.1 General |
56 | 7.2 High level architecture and access scenario |
57 | 7.3 Application protocol architecture and ISO/TS 21177 integration 7.3.1 General 7.3.2 Example protocol architecture |
59 | 7.3.3 Protocol integration strategy |
60 | 7.4 Access control policy structure |
61 | 7.5 Access control approach |
64 | 7.6 Access control use cases and sequence diagrams 7.6.1 General 7.6.2 Define an access policy |
68 | 7.6.3 Load an access control policy |
72 | 7.6.4 Configure TLS |
74 | 7.6.5 Start a secure TLS session |
77 | 7.6.6 Secure access-controlled resource discovery |
83 | 7.6.7 Server controls access to UGP service based on role |
87 | 8 C-ITS CP security requirements gaps and needs 8.1 General |
88 | 8.2 Overview of European C-ITS CP |
89 | 8.3 PKI threat categories and mitigations |
100 | 8.4 European C-ITS CP changes to support news C-ITS applications 8.4.1 General 8.4.2 CP Section 1.6.1 |
101 | 8.4.3 CP Section 1.6.2 8.4.4 CP Section 6.1.5.2 |
102 | 8.4.5 CP Section 4.1.2.4 |
103 | Annex A (informative) Scenario threats |
117 | Annex B (informative) Scenario security objectives to security functional requirements mapping |
119 | Annex C (informative) Informative proposal for improvements of TS 21177:2019: CRL request |
126 | Annex D (informative) Informative proposal for complements to TS 21177:2019: Ownership and access policy |
130 | Annex E (informative) Informative proposal for improvements of TS 21177:2019: Errata, additional rationale material, and session persistence across certificate expiry |
134 | Bibliography |