Presentation is loading. Please wait.

Presentation is loading. Please wait.

Report of Japanese Test Phase <Cyber Security>

Similar presentations


Presentation on theme: "Report of Japanese Test Phase <Cyber Security>"— Presentation transcript:

1 Report of Japanese Test Phase <Cyber Security>
Test Phase Coordination Meeting 2 17-18, July, 2019 Leiden, Netherlands

2 Outline 4 Manufacturers, 1 TS, 1 AA and the Government are actively involved in the Japanese Test Phase. Evidencing documents which have been developed with a format in the same manner with existing regulations were reviewed. Summary of results in the first round of the test phase will be shared in the later pages.

3 Cyber Security Evidences which are described in the current draft of “Interpretation Document” are sufficient in general in comparison with the results of Japanese test phase.

4 Cyber Security (Continued)
“Interpretation Document” “ID” will not define the criteria on quality of evidencing. “ID” will not define assets to be protected. Such assets shall be defined by OEM in their process for e.g. threats analysis. “ID” will not define boundary conditions on OEM’s process for risk assessment.

5 Cyber Security (Continued)
Interpretation of “Interpretation Document” (Post production phase) “-Additionally, the different phases ~” This interpretation means that CSMS could cover the lifetime considering reducing the risk of attacks through connection channels with disconnecting such channels? In addition, “lifecycle” and “lifetime” should be used carefully in the interpretation document. (“Lifecycle” => design, production, use, disposal…)

6 Cyber Security (Continued)
Interpretation of “Interpretation Document” (f) (The processes used for ensuring that the risk assessment is kept current.) “-Sources: Auto ISAC” It should be clarified here that “Auto ISAC” is just one of examples.

7 Cyber Security (Continued)
Interpretation of “Interpretation Document” (i) (The processes used to appropriately react to new and evolving cyber threats and vulnerabilities.) “-For vehicles not yet registered ” Does this mean the vehicles which are stored in e.g. motor pool? No difference between such vehicles and registered vehicles on cyber threats is seen. This should be deleted. If this context implies the concern for vehicles owned by nobody, this issue could be covered by the requirement of (post-production phase). This is also related to the software update management system. Relevant part: (SU regulation ) Documentation listing target vehicles for the update and verification of the compatibility of the registered configuration or last known configuration of those vehicles with the up date.

8 Cyber Security (Continued)
Interpretation of “Interpretation Document” 7.3.6 (The vehicle manufacturer shall describe what testing has been performed to verify the effectiveness of the security measures implemented and the outcome of those tests.) “-Methodology used and why” Japan understands that the purpose of such tests to confirm whether the security measures which CSMS had planned were implemented.

9 Cyber Security (Continued)
“Demonstration” The demonstration specified in paragraph 7.2, which will be conducted for the certification of OEM’s processes shall include audits on the sites, such as vehicle design department. Such auditing includes e.g. interviews. The demonstration for type approval specified in paragraph 7.3 shall be done from the viewpoint of investigation whether vehicle was actually designed in accordance with content of application form. This demonstration includes investigation of actual vehicle.

10 Cyber Security (Continued)
Referring ISO ISO xxxxx which are written in the current draft of “Interpretation Document” are examples as reference. Evidences to ISO requirements are not identical to evidences to TS and AA. “ISO21434” should be listed in e.g. reference part, should not be written at each requirement in chapter 7.

11 Summary of Test Results
TSs can accumulate sufficient evidences for each requirement in the standardized manner by the identified evidences in the current interpretation document. (More detailed evidences could be accumulated if necessary) TSs need to confirm processes implemented in the Management System by submitted documents evidencing each regal requirement. Detailed documents which may not be submitted to TS need to be stored in the Management System so that they are able to be traceable whenever TS demanded them.(Requirements 7.3.2(a)and(b) for SC / for SU could cover it.)

12 Proposal for amendments of draft regulations
 (e) The processes used for testing verifying the security of the system throughout its development and production phases;


Download ppt "Report of Japanese Test Phase <Cyber Security>"

Similar presentations


Ads by Google