{"id":372476,"date":"2024-10-20T02:29:28","date_gmt":"2024-10-20T02:29:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-iso-tr-21186-32021\/"},"modified":"2024-10-26T04:20:44","modified_gmt":"2024-10-26T04:20:44","slug":"bsi-pd-cen-iso-tr-21186-32021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-iso-tr-21186-32021\/","title":{"rendered":"BSI PD CEN ISO\/TR 21186-3:2021"},"content":{"rendered":"
This document provides guidelines on security applicable in Intelligent Transport Systems (ITS) related to communications and data access.<\/p>\n
In particular, this document provides analyses and best practice content for secure ITS connectivity using ISO\/TS 21177<\/span><\/span>.<\/p>\n This document analyses and identifies issues related to application security, access control, device security and PKI for a secure ITS ecosystem.<\/p>\n Cooperative intelligent transport systems (C-ITS). Guidelines on the usage of standards – Security<\/b><\/p>\nPDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n undefined <\/td>\n<\/tr>\n \n 7<\/td>\n Foreword <\/td>\n<\/tr>\n \n 8<\/td>\n Introduction <\/td>\n<\/tr>\n \n 11<\/td>\n 1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n\n 12<\/td>\n 4 Symbols and abbreviated terms <\/td>\n<\/tr>\n \n 14<\/td>\n 5 Security in C-ITS
5.1 General
5.2 Security design process for C-ITS applications <\/td>\n<\/tr>\n\n 15<\/td>\n 5.3 Communications security mechanisms in C-ITS <\/td>\n<\/tr>\n \n 17<\/td>\n 5.4 Source authentication and access control mechanisms <\/td>\n<\/tr>\n \n 20<\/td>\n 5.5 Certificate authorities and certification processes <\/td>\n<\/tr>\n \n 21<\/td>\n 5.6 Introduction to the rest of this document <\/td>\n<\/tr>\n \n 22<\/td>\n 6 Security analysis and controls for an IDX device
6.1 Background
6.2 IDX device concept
6.2.1 General <\/td>\n<\/tr>\n\n 24<\/td>\n 6.2.2 System architecture and device <\/td>\n<\/tr>\n \n 26<\/td>\n 6.2.3 Threat modelling data scenarios and examples <\/td>\n<\/tr>\n \n 29<\/td>\n 6.2.4 Assumed device functions and activities <\/td>\n<\/tr>\n \n 32<\/td>\n 6.3 Device assets <\/td>\n<\/tr>\n \n 34<\/td>\n 6.4 Threats
6.4.1 General <\/td>\n<\/tr>\n\n 35<\/td>\n 6.4.2 Threat modelling process
6.4.3 Threat categories and actor motivations <\/td>\n<\/tr>\n\n 37<\/td>\n 6.4.4 Scenario comparison of threats <\/td>\n<\/tr>\n \n 39<\/td>\n 6.5 Security objectives
6.5.1 Summary and comparison by scenario <\/td>\n<\/tr>\n\n 41<\/td>\n 6.5.2 Analysis <\/td>\n<\/tr>\n \n 42<\/td>\n 6.6 SFR and rationales <\/td>\n<\/tr>\n \n 49<\/td>\n 6.7 Comparison to other common criteria PPs
6.7.1 General
6.7.2 Summary and analysis of gaps
6.7.3 Gap analysis with Car2Car HSM PP <\/td>\n<\/tr>\n\n 51<\/td>\n 6.7.4 Gap analysis against V-ITS base PP <\/td>\n<\/tr>\n \n 55<\/td>\n 6.7.5 Gap analysis against V-ITS Comms Module PP
7 ISO\/TS 21177 access control implementation guidance
7.1 General <\/td>\n<\/tr>\n\n 56<\/td>\n 7.2 High level architecture and access scenario <\/td>\n<\/tr>\n \n 57<\/td>\n 7.3 Application protocol architecture and ISO\/TS 21177 integration
7.3.1 General
7.3.2 Example protocol architecture <\/td>\n<\/tr>\n\n 59<\/td>\n 7.3.3 Protocol integration strategy <\/td>\n<\/tr>\n \n 60<\/td>\n 7.4 Access control policy structure <\/td>\n<\/tr>\n \n 61<\/td>\n 7.5 Access control approach <\/td>\n<\/tr>\n \n 64<\/td>\n 7.6 Access control use cases and sequence diagrams
7.6.1 General
7.6.2 Define an access policy <\/td>\n<\/tr>\n\n 68<\/td>\n 7.6.3 Load an access control policy <\/td>\n<\/tr>\n \n 72<\/td>\n 7.6.4 Configure TLS <\/td>\n<\/tr>\n \n 74<\/td>\n 7.6.5 Start a secure TLS session <\/td>\n<\/tr>\n \n 77<\/td>\n 7.6.6 Secure access-controlled resource discovery <\/td>\n<\/tr>\n \n 83<\/td>\n 7.6.7 Server controls access to UGP service based on role <\/td>\n<\/tr>\n \n 87<\/td>\n 8 C-ITS CP security requirements gaps and needs
8.1 General <\/td>\n<\/tr>\n\n 88<\/td>\n 8.2 Overview of European C-ITS CP <\/td>\n<\/tr>\n \n 89<\/td>\n 8.3 PKI threat categories and mitigations <\/td>\n<\/tr>\n \n 100<\/td>\n 8.4 European C-ITS CP changes to support news C-ITS applications
8.4.1 General
8.4.2 CP Section 1.6.1 <\/td>\n<\/tr>\n\n 101<\/td>\n 8.4.3 CP Section 1.6.2
8.4.4 CP Section 6.1.5.2 <\/td>\n<\/tr>\n\n 102<\/td>\n 8.4.5 CP Section 4.1.2.4 <\/td>\n<\/tr>\n \n 103<\/td>\n Annex A (informative) Scenario threats <\/td>\n<\/tr>\n \n 117<\/td>\n Annex B (informative) Scenario security objectives to security functional requirements mapping <\/td>\n<\/tr>\n \n 119<\/td>\n Annex C (informative) Informative proposal for improvements of TS 21177:2019: CRL request <\/td>\n<\/tr>\n \n 126<\/td>\n Annex D (informative) Informative proposal for complements to TS 21177:2019: Ownership and access policy <\/td>\n<\/tr>\n \n 130<\/td>\n Annex E (informative) Informative proposal for improvements of TS 21177:2019: Errata, additional rationale material, and session persistence across certificate expiry <\/td>\n<\/tr>\n \n 134<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2021<\/td>\n 136<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":372486,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-372476","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/372476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/372486"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=372476"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=372476"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=372476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}