15
www.thales-esecurity.com OPEN A Systematic Approach to Securing Automotive Systems Stuart Soltysiak and Pali Surdhar

A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

www.thales-esecurity.com OPEN

A Systematic Approach to Securing Automotive Systems

Stuart Soltysiak and Pali Surdhar

Page 2: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

2 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Introduction

▌ The evolution of the car into a connected vehicle is presenting the automotive industry with similar challenges to the Internet of Things (IoT)

Distributed ecosystem of vehicles, infrastructure and other processing Things

Data collection, collation and communication by Things with each other and back-end data systems

Much of the collected data can be considered sensitive – from many perspectives:

- Vehicle safety and performance

- Personally Identifiable Information

Reliance on cloud infrastructures to support scalability and performance for data processing

Multiple and disparate sources for creation and supply of components

▌ It is therefore ever more important that security is considered from a complete systems perspective

Essential to have trust for the protection of data

- At rest

- In transit

- Undergoing processing

Page 3: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

3 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Automotive Industry

▌ The automotive industry has several important aspects that affect security:

Long lifespan of systems in service

Long lead times to deliver new features/platforms into service

Cost efficiency

Complex supply chain

IoT like architecture

Increasing dependence on software

- On board

- Infrastructure (Cloud, Mobility solutions)

▌ Software continues to eat the world - major disruptors

Electric cars

Connected cars

Connected services

Vehicle becomes a platform – laptop on a car

Page 4: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

4 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Supply Chain Issues

▌There is a complex supply chain to take into account

Many suppliers per manufacturer

Connected car technologies expand the supply chain beyond the vehicle

to include the supporting IT systems (in their entirety – cf. system lifecycle

considerations)

Recent report indicates only 10% of suppliers worry about security1

Vulnerabilities in a supplier component are exploitable across large product

range – it is worse than a localised safety problem

Suppliers and manufacturers have a shared responsibility for security – now

acknowledged by UK Government guidance2

1. C. Bordonali, S. Ferraresi & W. Richter: Shifting gears in cyber security for connected cars. McKinsey & Company, February 2017

2. UK Government Guidance "The key principles of vehicle cyber security for connected and automated vehicles", 6 August 2017

Page 5: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

5 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Design Considerations

▌The need for a holistic approach to security

▌Security boundary

▌Root(s) of Trust

▌Open source software

▌Design for update

▌Newer architectures

Virtualisation – how long until ‘Docker in car’?

Orchestration

▌Support for mobility

Page 6: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

6 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Traditional Security Patterns

SAP

Checker Service 1

Service n

Data

Single Access Point and Checker

Page 7: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

7 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Threat Landscape

SAP

Checker Service

1

Service n

Data

ECU

N/W attacks

Vulnerabilities

Obsolescence

Close proximity

attacks

Hardware Trojans

Fake Chips

(more sophisticated)

Page 8: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

8 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Full Stack Security

Entropy source Emissions Firmware Integrity

Privileges Stack Protection Shared Code Crypto

Stored Data

Access controls Audit and Monitoring

Page 9: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

9 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Attack One, Attack All?

SAP

SAP

SAP

SAP

H/W + S/W

attacks

NW attacks

Supply Chain

Consumer Applications

PII

Aggregation

Supply Chain

Provider Trust

Third Party Code

Page 10: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

10 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Countermeasures?

The need for a holistic approach to security

Start with understanding the system

Page 11: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

11 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

System Security Analysis – Overview

▌ Pragmatic approach aligning security modelling with systems modelling

▌ Full system context: functional behaviour and operational process views

▌ Iterative approach, identifying

Key system elements and interactions

Security objectives

Threats and controls

▌ Underpinned by use of a modelling tool

Incremental refinement of underlying systems and security models

Builds re-usable domain-specific threat intelligence

Supports security accreditation

Page 12: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

12 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Systematic Approach to Security

Operational Context

Behavioural

Context

Security Context

Security Architecture

Systems

Analysis &

Modelling

Use Cases

Abuse Cases

Security

Objectives

Threats

Controls

Page 13: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

13 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Attack One, Attack All?

SAP

SAP

SAP

SAP

H/W + S/W

attacks

NW attacks

Supply Chain

Consumer Applications

PII

Aggregation

Supply Chain

Provider Trust

Third Party Code

Secure Development

Lifecycle

Access Control Policy

Security Awareness & Training

Malicious Code Protection

DoS Protection

Transmission Confidentiality

& Integrity

Application Partitioning

Audit Monitoring,

Analysis & Reporting

IS Monitoring Tools & Techniques

User Identification &

Authentication Device Identification &

Authentication

Baseline Configuration

Configuration Change Control

Cryptographic Key

Establishment & Management Trusted Path

Least Privilege Separation of Duties

Service Identification &

Authentication

Maintenance Policy &

Procedures

Physical & Environmental

Protection

Personnel Security Policy

Component Authenticity

Page 14: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

14 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Benefits of a Systematic Approach to Security

▌ Higher quality of system security:

A structured framework in which to explore the security landscape of a system – preventing ad-hoc or patchy analysis

▌ Effective demonstration of system security coverage:

The model provides a powerful basis for formal and informal security analysis. We can easily review whether security objectives are met and to what extent threats are mitigated by the implemented controls

▌ Knowledge transfer and education:

Developing the model with all engineers grows security knowledge and skills across all engineering disciplines; it builds a security mindset into the early phases of the development lifecycle

▌ Longer-term commercial benefit:

Artefacts and knowledge generated by development of the model can be re-used to evaluate changes in the environment, system functionality or deployment – removes the need for bespoke security analysis activities

▌ Compliance:

Threats and controls aligned with standards (e.g. ISO 27005, OWASP, NIST Controls, Open Security Architecture, Cloud Security Alliance) allows coverage and compliance to be reviewed easily, and provides supporting evidence for system certification and assurance activities

Page 15: A Systematic Approach to Securing Automotive Systems€¦ · A Systematic Approach to Securing Automotive Systems ... Connected services Vehicle becomes a platform – laptop on a

15 This document may not be reproduced, modified , adapted, published,

translated, in any way , in whole or in part or disclosed to a third party

without prior written consent of Thales - Thales © 2016 All rights reserved.

OPEN

Thankyou

We welcome your questions and feedback