Aerospace Security Framework Review - by - LDRA
Aerospace Security Framework Review - by - LDRA
Software Technology
www.ldra.com
© LDRA Ltd. This document is property of LDRA Ltd. Its contents cannot be reproduced, disclosed or utilized without company approval.
Introduction 3
The story so far 4
Security assessment and development process overview 6
Define the intended function of the system 7
Connectivity to external devices or networks 7
Create (the) data flow diagram(s) 7
Evaluate connectivity impact to safety, and develop mitigations 7
Conduct security assessment 8
Validation & verification of security architecture, design, and implementation 8
The security development and risk assessment process V-model 9
Using consultants for compliant projects 10
Structured consultancy 10
Support for projects compliant with the DO-326/ED-202 set 11
Summary 12
References 12
ARINC Aeronautical Radio, Incorporated GPS Global Positioning System VDLM2 VHF Data Link-Mode 2
ATC Air Traffic Controller HFDL High Frequency Data Link VHF Very High Frequency
ATN Aeronautical Telecommunications Network LAAS Local Area Augmentation System WAAS Wide Area Augmentation System
The issues that exist in the cyber world have migrated to the connected aviation network, where the
associated risks increase exponentially. Aerospace systems have not historically been developed with
security in mind, and so software upgrades for security requirements on the post facto certification baselines
are either costly or ineffective. Air travel has built an enviable reputation for reliability and trustworthiness
over the years, and this situation has the potential to compromise it.
The challenge is to establish a common security framework underpinned by most appropriate best-practice
guidelines to form a robust and secure ecosystem. For example, DO-326A based guidelines from RTCA would
be most appropriate for the development of a Line Replacement Unit (LRU), whereas ISO 270001 and NIST2
standards would be more applicable to the supporting Information Technology (IT) infrastructure.
1
ISO/IEC 27001 INFORMATION SECURITY MANAGEMENT https://www.iso.org/isoiec-27001-information-security.html
2
National Institute of Standards and Technology (NIST) https://www.nist.gov/topics/cybersecurity
Issuing Authority/
SN Document Name/Description Remark
Organization
3
FAA 14 CFR Part 25 – “AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY AIRPLANES”
4
EASA CS-25 “Certification Specifications for Large Aeroplanes”
5
EASA AMC 25.1309 “Acceptable means of compliance – System Design and Analysis”
6
AC 25.1309 - FAA Advisory Circular “System Design and Analysis”
7
Commission Regulation (EU) No 748/2012 of 3 August 2012 - Airworthiness and Environmental Certification
https://www.easa.europa.eu/regulations#regulations-initial-airworthiness
8
PART 21—CERTIFICATION PROCEDURES FOR PRODUCTS AND ARTICLES
https://www.ecfr.gov/cgi-bin/retrieveECFR?gp=&SID=2bc3151798fc28602bb9091abdd1b77c&mc=true&n=pt14.1.21&r=PART&ty=HTML#
se14.1.21_116
9
EASA Easy Access Rules for Airworthiness and Environmental Certification
https://www.easa.europa.eu/document-library/general-publications/easy-access-rules-initial-airworthiness
10
EASA NPA 2019-01 Aircraft cybersecurity
https://www.easa.europa.eu/document-library/notices-of-proposed-amendment/npa-2019-01
11
GUIDELINES AND METHODS FOR CONDUCTING THE SAFETY ASSESSMENT PROCESS ON CIVIL AIRBORNE SYSTEMS AND EQUIPMENT ARP4761,
SAE International, 1996-12-01 https://www.sae.org/standards/content/arp4761/
12
OWASP cheat sheet series – Threat Modeling Cheat Sheet https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
Figure 6: Security considerations as a sunset of the aircraft certification process (Image adopted from DO-356)
13
Functional Hazard Analysis - Duane Kritzinger, in Aircraft System Safety, 2017 https://www.sciencedirect.com/topics/engineering/functional-
hazard-analysis
14
System Safety Assessment - Peng Wang, in Civil Aircraft Electrical Power System Safety Assessment, 2017 https://www.sciencedirect.com/
topics/engineering/system-safety-assessment
Figure 7 illustrates how a security development life cycle can be represented in a V model-like requirement-
based, safety-critical system/software development lifecycle.
The top guiding document is a security compliance plan; it is like any system/software certification plan, but
the focus is entirely on the security layers within a defence-in-depth strategy (including embedded, system-
level and network-level layers). The security environment encompasses the surrounding external/internal
environment of the system under consideration.
Threats, vulnerabilities, and the probability of threat realization (leading to exploitation) are assessed
thereafter. Each potential exploitation is considered for its potential impact on functionality and safety, and
an initial risk assessment is carried out to know the extent of the impact of a possible attack/exploitation.
There are other security considerations aside from the aerospace connected system. Associated systems
could also be targeted, or sources of attack. These include:
• data centres for flight services
• database suppliers
• airline operations
• Maintenance, Repair and Overhaul (MRO) centres
• datalink service providers
• Central Maintenance Computer/Onboard Maintenance Systems (CMC/OMS)
• remote diagnostics units
The aerospace connected ecosystem is complex; due diligence and planning are required to ensure a
safe working system without compromising airborne safety.
Structured consultancy
When working within a context as clearly defined as a compliant flight system project, an expert
consultancy can be equipped to define in quite specific detail just how their advice will be delivered, and
what form it will take.
LDRA Certification Services (LCS)15 provides full life cycle solutions for suppliers, integrators and OEMs
(Figure 7). LCS solutions help clients achieve compliance with aerospace security standards (in their totality
or as tailored) and to safely clear their certification hurdles.
Support for projects compliant with the DO-326/ED-202 set
With specific reference to the DO-326/ED-202 set, LCS offers training on DO-326/ED-202 and associated
guidelines (DO-355/ED-204, DO-356/ED-203, and ED-201) compliance, lifecycle process implementation and
the creation of compliant life cycle data.
Process compliance support includes project and organizational Gap Analysis to determine the steps
required to achieve compliance with DO-326, and assistance with the development of cybersecurity
plans. Liaison services with interested parties including FAA, EASA, other government regulators, and
end-customers help to ensure that communication remains unambiguous and fruitful. And Independent
Verification and Validation (IV&V) services ensure end-customer and certification authority acceptance.
As development progresses through the lifecycle, more specific support is available for the specific actions
incumbent on the the development team. For example, assistance is available with tool qualification
(whether home-grown or Commercial Off-The-Shelf, or “COTS”), security assessments, and the development
of manuals. LCS can also supervise and guide applicants in the development of vulnerability assessments,
threat modeling, security design risk scoring (CVSS or FMECA – sidebar16 17), and security verification.
LCS can also call upon the integrated LDRA tool suite® for requirement traceability, static analysis, dynamic
analysis, structural coverage, and system-level testing, and to ensure compliance with security coding
standards including those from MISRA and CERT.
“The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics
of a vulnerability and produce a numerical score reflecting its severity. The numerical score can then be
translated into a qualitative representation (such as low, medium, high, and critical) to help organizations
properly assess and prioritize their vulnerability management processes.”
- The FIRST organization
“Failure Mode and Effects Criticality Analysis (FMECA) is an analysis technique which facilitates the
identification of potential problems in the design or process by examining the effects of lower level failures.
Recommended actions or compensating provisions are made to reduce the likelihood of the problem
occurring, and mitigate the risk, if in fact, it does occur.”
- FMEA-FMECA
15
LDRA Certification Services https://ldra.com/aerospace-defence/services-support/certification-services/
16
CVSS: Common Vulnerability Scoring System https://www.first.org/cvss/
17
FMECA: Failure Mode, Effects, and Criticality Analysis https://www.fmea-fmeca.com/what-is-fmea-fmeca.html
References
www.ldra.com
LDRA Technology Inc.
2540 King Arthur Blvd, 3rd Floor, 12th Main Lewisville Texas 75056
Tel: +1 (855) 855 5372
e-mail: info@ldra.com