Overview of the recommendations on software updates

Slides:



Advertisements
Similar presentations
ENTITIES FOR A UN SYSTEM EVALUATION FRAMEWORK 17th MEETING OF SENIOR FELLOWSHIP OFFICERS OF THE UNITED NATIONS SYSTEM AND HOST COUNTRY AGENCIES BY DAVIDE.
Advertisements

© Crown Copyright (2000) Module 3.1 Evaluation Process.
ICAO Provisions for Safety Management
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
PROPOSALS THE REVIEW OF THE 1958 AGREEMENT AND THE INTRODUCTION OF INTERNATIONAL WHOLE VEHICLE TYPE APPROVAL (IWVTA) IWVTA Informal Group WP th Session.
Transmitted by the representative of JAPAN Toward Realization of the “Mutual Recognition of International Whole Vehicle Type Approval (IWVTA)” under the.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Agreement concerning the adoption of uniform conditions for periodical technical inspections of wheeled vehicles and the reciprocal recognition of such.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
Common Understanding on Major Horizontal Issues and Legal Obstacles Excerpts from the relevant sections of the ToR: II. Working items to be covered (details.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 6 CH 5 ISO MANAGEMENT RESPONSIBILITY Philippe Bauwin Medical.
A LOOK AT AMENDMENTS TO ISO/IEC (1999) Presented at NCSLI Conference Washington DC August 11, 2005 by Roxanne Robinson.
Status report on the activities of TF-CS/OTA
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Outcome TFCS-05 // May OICA, Paris
REWG activities in LILIIA MALON REWG Chair Prague
Software Configuration Management
Status report on the activities of TF-CS/OTA
Common Understanding on Major Horizontal Issues and Legal Obstacles
Main problems of NL proposal for UN Software Regulation
OICA input on software updates to UN TF CS/OTA
Submitted by the expert form Japan Document No. ITS/AD-09-12
Chair: Jin Seop Park, Republic of Korea Secretary: Thomas Kinsky, OICA
Outcome TFCS-04 // March ITU, Geneva
Suggestion on software update
IDN Variant TLDs Program Update
Outcome TFCS-07 // August NH Den Haag, NL
Outcome TFCS-11// February Washington DC
Status report on the activities of TF-CS/OTA
Setting Actuarial Standards
Outcome TFCS-11// February Washington DC
Final Report of TF-CS/OTA September The Amba Hotel, London
Outcome of TFCS-12 - summary slides - (detailed meeting minutes will be provided separately) April The Shilla Seoul, ROK.
Transmitted by the IWVTA Informal Group
Summary of software update progress
Japan’s proposal for security regulation
Status report on the activities of TF-CS/OTA
Chair: Jin Seop Park, Republic of Korea Secretary: Thomas Kinsky, OICA
Outcome TFCS-06 // June TIA, Arlington/VA (USA)
Informal document GRVA nd GRVA, 28 Jan Feb. 2019
Operationalizing Export Certification and Regionalization Programmes
Status report from UNECE Task Force on Cyber Security &
New Assessment & Test Methods
Informal document GRVA st GRVA, September 2018
Replies by the Task Force to the comments provided by GRVA members
Input for Interpretation Document on Software Update
Task Force – Cyber Security, Data Protection and Over-the-Air issues
Status report of TF-CS/OTA
Discussion points for Interpretation Document on Cybersecurity
Safety concept for automated driving systems
Why a „test phase“? Overview
Informal document GRSG Rev.1
Software Update - Type approval related issues -
Chair: Jin Seop Park, Republic of Korea Secretary: Thomas Kinsky, OICA
Overview of the recommendations on cyber security
Highlights of the 177th WP.29 session and
Input for ad hoc on software update on 7th Dec. from Japan
Informal document GRSG
Progress Report by PSG IWG
Issues identified in connection with the work of TF-CS/OTA
Input for ad hoc on software update on 7th Dec. from Japan
Status report on the activities of TF-CS/OTA
Inputs Regard to “Test Phase” to TFCS
Computer System Validation
Report of Japanese Test Phase <Cyber Security>
Summary on initial findings
Access to data requirementS
FIA position on Lifecycle of a vehicle type* vs. Lifetime of a vehicle
Outcome of TFCS round robin testing
EDR/DSSAD IWG Status Report
Presentation transcript:

Overview of the recommendations on software updates Informal document GRVA-03-03 3rd GRVA, 3-4 June 2019 Agenda item 4(b) Submitted by the Chair of the Task Force on Cybersecurity and OTA (software updates) Overview of the recommendations on software updates

Ongoing work - the test phase Content Background Software updates Ongoing work - the test phase

The remit of the group was to produce Background The remit of the group was to produce a recommendation addressing software update issues develop outputs for use as a regulation or resolution How the recommendations were developed The group contained experts from Contracting Parties and NGO‘s (CITA, FIA, ITU, OICA, CLEPA, ISO and others) Thirteen meetings were held to agree the proposed recommendations plus twenty-one ad-hoc meetings Work started on 21 December 2016

2. The software update recommendation

Approach for Software Updates The group developed a split approach: Assessment of relevant vehicle manufacturer management system Assessment and certification of vehicles Implementation of a software identification scheme Software Update Management System Requirements Software Identification Requirements Vehicle Requirements Organizational structure & processes, incl. management of RxSWIN Requirements for safe execution, protection of RxSWIN and user information Implementation of RxSWIN in existing system regulations

Structure of the Recommendation on Software Update Processes Software “update guidance” (chapters 1-6) Guidance on processes and procedures for national administrations to manage post-production software updates, based on processes for “in production” software updates Guidance on what processes, tests and documentations might be expected in order to manage post-production software updates Software update processes Regulatory Proposals (Annex A and Annex B) Requires manufacturers to have a “software update management system” (SUMS) Configuration management and quality control processes at manufacturer Processes for ensuring updates are executed safely and will not affect the safety or certification of vehicles Processes for informing users of updates Approval of software update mechanisms for vehicles Software updates can be delivered safely and securely It is possible to identify the status of the software on the vehicle (Annex B) Requirements for being allowed to deliver over the air updates

How to obtain Software Update Process certification Step 1: Certification of the OEM‘s organization and processes - implementation and assessment of the Software Update Management System (SUMS) Organization & processes implemented as per requirements, requirements include: adequate documentation on impact assessments (whether a software update affects existing vehicle systems), evidence recording, processes to ensure security and safety for software updates, compatibility and interdependencies, user information, ... Management of software identification numbers (RxSWIN) OEM implements a SUMS Assessment of the OEM‘s SUMS National or Regional Authority assesses the SUMS of the vehicle manufacturer, whether it is compliant to the requirements The SUMS Certificate of Compliance is the prerequisite to obtain a software update process certification The SUMS Certificate of Compliance has a max. validity of 3 years National or Regional Authority may at any time verify its continued validity and act appropriately if the requirements are no longer met. Issuance of a SUMS Certificate of Compliance

How to obtain Software Update Process certification Step 2: Vehicle certification – electronic architecture and software updates to be in accordance with the SUMS Security requirements defined regarding software update processes implemented on the vehicle If a RxSWIN is implemented, requirements for how to protect and access them Requirements specific for the safe execution of over the air updates The effectiveness of security measures implemented needs to be tested and verified OEM develops the vehicle architecture Assessment of the vehicle National or Regional Authority assesses the vehicle type, whether it is compliant to the requirements defined in the Regulation Issuance of certfication Requirements are established to ensure conformity of vehicles being produced

Summary of the proposal What it does: Considers over-the-air updates and other delivery paths for software updates Provides a common process for how to assess the safety of software updates; their impact on vehicle systems and vehicle parameters; and how to record information about the software updates Provides assurance that the software update mechanism for a given vehicle is safe and secure Provides a method by which the software of a given system can be linked to the legal requirements for that system, this is called the RxSWIN What it does not do: Regulates how software updates are provided post-production. A process is recommended for managing this. The proposal contains requirements for supporting the recommended process. Enable verification at road worthiness inspections that the software on a vehicle is what should be there. It does enable relevant information to be available. A separate work stream would be needed to define the technologies and processes needed for such verification.

Questions & Answers Why is certification of software updates not in the proposal? Currently software updates that are applied during production or pre-production are covered by existing legislation. So further leglislation is not needed. Software updates that are provided post-production to vehicles in the market may be covered by national/regional legislation. Instead chapter 4 of the recommendation provides a recommended procedure for managing post-production software updates. This is based on the procedure for pre-production software updates. It may be adapted depending on national or regional processes/procedures and is therefore only guidance. Recommendation: The issue, if of interest, will have to be addressed by the national/regional jurisdictions or UNECE may decide to develop a harmonized framework on this topic.

Questions & Answers What is the recommended process for managing software updates? Based on diagram in 4.2.5 New software update OEM uses processes defined in the SUMS to evaluate update and record results If update may affect type approval(s) or certification criteria OEM consults relevant authority If update doesn’t affect type approval or certification criteria OEM need not consult relevant authority Relevant authority considers the need for extension or renewal of type approval/ certification Update delivered using certified system If applicable, RxSWIN(s) updated on vehicle Relevant authority periodically validates OEM decision making, using processes and records defined in the SUMS

Questions & Answers 3. How are over the air updates covered? They are covered both in the SUMS and the vehicle certification requirements The SUMS requirements ensure: There are processes and procedures to assess whether over the air updates will impact safety if conducted during driving (and will not be sent if they do) The processes and procedures to ensure that, when an over the air update requires a skilled person (such as a mechanic) in order to complete it, the update can only proceed when such a person is present The vehicle requirements ensure: The vehicle can cope in the event of a failed update There is adequate power for updates The user can be informed about an update before and after it is executed How the vehicle will ensure that, where an update may affect the safe driving of a vehicle, it is executed in a safe manner

Questions & Answers 4. How are non-compliances delt with? If a vehicle manufacturer fails to maintain their SUMS, or serious deficienes are noted in it the national or regional authority may take appropriate action. This may include withdrawing the certificate. Without a valid SUMS Certificate of Compliance the manufacturer would no longer able to apply for a new vehicle certification for software update processes. Continued provision of software updates may be affected as may continued production of existing certified vehicles.

3. Overview on the test phase

Aim is to assure the proposal and not to test the products! Next step – testing the proposal Aim of the „test phase“ => Provide guidance on how to assess the requirements and documentation required => Verify the effectiveness/robustness of the requirements => Verify that certification authorities are able to reach the same conclusions based on identical OEM documentation Aim is to assure the proposal and not to test the products!

Outputs of the „test phase“ Overview Outputs of the „test phase“ => Interpretation guideline => If necessary, proposals for clarifying the proposal => Report of the test phase to cover: - conclusions on the effectiveness /robustness of the proposal - verification that certification authorities/ are able to reach the same conclusions

Proposed timeline for the test phase TFCS-14 Paris 04-05 Dec. 2018 GRVA-02 Geneva 28 Jan. - 01 Feb. 2019 TFCS Web meeting March 2019 TFCS Web meeting June 2019 TFCS-15 July 2019 TFCS-16 TBC Sept. 2019 GRVA-03 Geneva 24-27 Sep. 2019 Identification of participants (latest feedback) 18 Jan. 2019 Coordination Meeting 1 Feb. 2019 Start Preparation Phase Feb. 2019 Start Assessment Phase May/June 2019 Coordination Meeting 2 Jun/Jul 2019 Final Evaluation Aug 2019 Preparation Phase Assessment Phase Reg. amendments Prep Report on TP Prep Final Interpret Doc V1.0