{"id":372476,"date":"2024-10-20T02:29:28","date_gmt":"2024-10-20T02:29:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-iso-tr-21186-32021\/"},"modified":"2024-10-26T04:20:44","modified_gmt":"2024-10-26T04:20:44","slug":"bsi-pd-cen-iso-tr-21186-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-iso-tr-21186-32021\/","title":{"rendered":"BSI PD CEN ISO\/TR 21186-3:2021"},"content":{"rendered":"

This document provides guidelines on security applicable in Intelligent Transport Systems (ITS) related to communications and data access.<\/p>\n

In particular, this document provides analyses and best practice content for secure ITS connectivity using ISO\/TS 21177<\/span><\/span>.<\/p>\n

This document analyses and identifies issues related to application security, access control, device security and PKI for a secure ITS ecosystem.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Symbols and abbreviated terms <\/td>\n<\/tr>\n
14<\/td>\n5 Security in C-ITS
5.1 General
5.2 Security design process for C-ITS applications <\/td>\n<\/tr>\n
15<\/td>\n5.3 Communications security mechanisms in C-ITS <\/td>\n<\/tr>\n
17<\/td>\n5.4 Source authentication and access control mechanisms <\/td>\n<\/tr>\n
20<\/td>\n5.5 Certificate authorities and certification processes <\/td>\n<\/tr>\n
21<\/td>\n5.6 Introduction to the rest of this document <\/td>\n<\/tr>\n
22<\/td>\n6 Security analysis and controls for an IDX device
6.1 Background
6.2 IDX device concept
6.2.1 General <\/td>\n<\/tr>\n
24<\/td>\n6.2.2 System architecture and device <\/td>\n<\/tr>\n
26<\/td>\n6.2.3 Threat modelling data scenarios and examples <\/td>\n<\/tr>\n
29<\/td>\n6.2.4 Assumed device functions and activities <\/td>\n<\/tr>\n
32<\/td>\n6.3 Device assets <\/td>\n<\/tr>\n
34<\/td>\n6.4 Threats
6.4.1 General <\/td>\n<\/tr>\n
35<\/td>\n6.4.2 Threat modelling process
6.4.3 Threat categories and actor motivations <\/td>\n<\/tr>\n
37<\/td>\n6.4.4 Scenario comparison of threats <\/td>\n<\/tr>\n
39<\/td>\n6.5 Security objectives
6.5.1 Summary and comparison by scenario <\/td>\n<\/tr>\n
41<\/td>\n6.5.2 Analysis <\/td>\n<\/tr>\n
42<\/td>\n6.6 SFR and rationales <\/td>\n<\/tr>\n
49<\/td>\n6.7 Comparison to other common criteria PPs
6.7.1 General
6.7.2 Summary and analysis of gaps
6.7.3 Gap analysis with Car2Car HSM PP <\/td>\n<\/tr>\n
51<\/td>\n6.7.4 Gap analysis against V-ITS base PP <\/td>\n<\/tr>\n
55<\/td>\n6.7.5 Gap analysis against V-ITS Comms Module PP
7 ISO\/TS 21177 access control implementation guidance
7.1 General <\/td>\n<\/tr>\n
56<\/td>\n7.2 High level architecture and access scenario <\/td>\n<\/tr>\n
57<\/td>\n7.3 Application protocol architecture and ISO\/TS 21177 integration
7.3.1 General
7.3.2 Example protocol architecture <\/td>\n<\/tr>\n
59<\/td>\n7.3.3 Protocol integration strategy <\/td>\n<\/tr>\n
60<\/td>\n7.4 Access control policy structure <\/td>\n<\/tr>\n
61<\/td>\n7.5 Access control approach <\/td>\n<\/tr>\n
64<\/td>\n7.6 Access control use cases and sequence diagrams
7.6.1 General
7.6.2 Define an access policy <\/td>\n<\/tr>\n
68<\/td>\n7.6.3 Load an access control policy <\/td>\n<\/tr>\n
72<\/td>\n7.6.4 Configure TLS <\/td>\n<\/tr>\n
74<\/td>\n7.6.5 Start a secure TLS session <\/td>\n<\/tr>\n
77<\/td>\n7.6.6 Secure access-controlled resource discovery <\/td>\n<\/tr>\n
83<\/td>\n7.6.7 Server controls access to UGP service based on role <\/td>\n<\/tr>\n
87<\/td>\n8 C-ITS CP security requirements gaps and needs
8.1 General <\/td>\n<\/tr>\n
88<\/td>\n8.2 Overview of European C-ITS CP <\/td>\n<\/tr>\n
89<\/td>\n8.3 PKI threat categories and mitigations <\/td>\n<\/tr>\n
100<\/td>\n8.4 European C-ITS CP changes to support news C-ITS applications
8.4.1 General
8.4.2 CP Section 1.6.1 <\/td>\n<\/tr>\n
101<\/td>\n8.4.3 CP Section 1.6.2
8.4.4 CP Section 6.1.5.2 <\/td>\n<\/tr>\n
102<\/td>\n8.4.5 CP Section 4.1.2.4 <\/td>\n<\/tr>\n
103<\/td>\nAnnex A (informative) Scenario threats <\/td>\n<\/tr>\n
117<\/td>\nAnnex B (informative) Scenario security objectives to security functional requirements mapping <\/td>\n<\/tr>\n
119<\/td>\nAnnex C (informative) Informative proposal for improvements of TS 21177:2019: CRL request <\/td>\n<\/tr>\n
126<\/td>\nAnnex D (informative) Informative proposal for complements to TS 21177:2019: Ownership and access policy <\/td>\n<\/tr>\n
130<\/td>\nAnnex E (informative) Informative proposal for improvements of TS 21177:2019: Errata, additional rationale material, and session persistence across certificate expiry <\/td>\n<\/tr>\n
134<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Cooperative intelligent transport systems (C-ITS). Guidelines on the usage of standards – Security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n136<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":372486,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-372476","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/372476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/372486"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=372476"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=372476"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=372476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}