BSI PAS 1885:2018
$54.60
The fundamental principles of automotive cyber security. Specification
Published By | Publication Date | Number of Pages |
BSI | 2018 | 56 |
This PAS sets out the fundamental principles for the provision and maintenance of cyber security in relation to reducing threat and harm to products, services and systems within increasingly connected and collaborative intelligent transport eco-systems. The concept of an automotive ecosystem encompasses:
-
the vehicles;
-
related infrastructure, including road-side and remote systems that provide services to the vehicles, their operators, occupants and cargo; and
-
the human elements, including vehicle owners and/ or operators, designers, manufacturers and service providers.
This PAS is applicable to the security and functional safety aspects of the entire automotive development and use life cycle, including specification, design, implementation, integration, verification, validation, configuration, production, operation, servicing and decommissioning. A lifecycle approach is required to address the risks arising from the constantly changing threat landscape, so as to protect vehicles and vehicle-related systems once they have been delivered to the market.
PAS 11281:2018 addresses the relationship between automotive safety and security and ISO 26262 addresses the functional safety of road vehicles.
This PAS is intended for use by vehicle manufacturers, Tier-1 and Tier-2 supply chain suppliers, authorized service centres, aftermarket suppliers, road/highways authorities and service providers both to the vehicle and to its occupants and/or cargo. It can also be informative for other stakeholders of the automotive supply chain and the operators of automotive vehicles.
It is recognized that at the date of issue of this PAS:
-
there is a large fleet of vehicles in use;
-
these vehicles will have varying degrees of connectivity and automation; and
-
the degree to which security has been considered as part of the design and manufacture will vary depending on the age, nature and complexity of the vehicle.
The PAS is intended to apply to new or modified products, systems and services and its adoption does not require vehicle manufacturers, suppliers or service providers to apply its provisions retroactively.
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | Contents |
4 | Foreword |
5 | _Ref499204369 0 Introduction |
7 | 1 Scope |
8 | 2 Normative references |
9 | 3 Terms, definitions and abbreviations |
14 | _Ref499204408 _Ref499204422 |
15 | _Ref507163304 _Ref506553570 4 Organization’s security context |
16 | _Ref507162764 Figure 1 – Holistic approach to security |
17 | _Ref506814679 _Ref506814688 _Ref506814698 |
18 | _Ref506814779 _Ref506814789 _Ref506814798 |
20 | _Ref500340922 _Ref506660677 _Ref498357364 _Ref499203816 _Ref504065847 _Ref506711654 _Ref498356539 5 Security governance |
21 | _Ref499203922 Figure 2 – Determining the organization’s security context |
22 | _Ref507163314 _Ref506660058 _Ref499547012 _Ref506713834 _Ref506731404 |
23 | _Ref506709095 _Ref506713554 _Ref506713069 _Ref499545948 |
24 | _Ref506713597 _Ref499554940 MultilevelList _Ref499548642 _Ref499631381 _Ref499548622 |
25 | _Ref506535713 _Ref499630674 |
26 | _Ref499549397 _Ref499549467 _Ref499549436 |
28 | _Ref506720477 _Ref498682501 _Ref499556227 _Ref506805366 _Ref506805245 6 Assessing and managing security risk |
29 | _Ref499570168 Figure 3 – Illustration of security concepts and relationships |
30 | _Ref506728228 |
31 | Figure 4 – Risk management approach |
32 | _Ref506732444 _Ref506732597 _Ref506732624 _Ref506732687 |
34 | _Ref499561195 _Ref499651492 |
35 | _Ref506742046 _Ref499643171 7 Security management over vehicle systems lifecycles |
36 | _Ref499644741 _Ref506743574 _Ref506743579 |
37 | ListBullet FixBullets _Ref499648824 |
38 | _Ref506751872 _Ref506756814 _Ref506756883 _Ref506759195 _Ref506759264 8 Working together to enhance system security |
39 | _Ref506761193 |
40 | 9 Applying a defence-in-depth approach |
41 | _Ref499656253 _Ref506796718 _Ref506796822 _Ref506796845 |
43 | _Ref506805038 10 Software trustworthiness |
44 | _Ref499657056 _Ref506797967 |
45 | _Ref499656833 _Ref506803018 _Ref506803021 _Ref499659693 _Ref506804354 11 Management of vehicle system data & information |
48 | _Ref499660244 12 Vehicle system resilience |
49 | 13 Bibliography |
51 | Annex A (informative) Security concepts and relationships |
53 | Figure B1 – Electric Vehicle Charging Annex B (informative) Case study |