WG72- ED127 Part 2 Working Paper 26 Part 2 Methodology Validation- EFB V0.3 30-Nov-2009 Daniel P. Johnson Honeywell 1 Purpose and Scope The purpose of this document is to validate and demonstrate the ED127 Part 2 Airworthiness Security Process (AWSP) by applying it to the Electronic Flight Bag (EFB) Use Case as developed within the ED127 Part 1 AISS Reference Model. EFB is used as a design example but not as a certification example, in that it does not honor the scope of the existing regulations and practices governing actual EFB certification and approval. References include: 1. ED-127, "Aeronautical Information System Security", V1.0.5, Aug 2009 2. FAA AC 120-76A, "Guidelines for the Certification, Airworthiness, and Operational Approval of Electronic Flight Bag Computing Devices", Mar 2003 3. WG72 Part 1 Working Paper 20, "EFB Use Case - Working Paper", V1.01, Jun 2009 There are three classes of EFB1) Purely portable devices not subject to the normal aircraft administration and maintenance control processes and not normally connected to aircraft systems; 2) Portable devices subject to the normal aircraft administration and maintenance control processes that are allowed to be connected to aircraft systems; and 3) Mounted devices subject to the normal aircraft administration and maintenance control processes that are normally connected to aircraft systems. These devices are certified under the Type Certification of the aircraft. Scoping: This study is limited to the consideration of Classes 2 and 3 EFBs. The reason is that AWSP involves the impact on flight safety of network connectivity to onboard aircraft systems due to the possibility of harm due to network attacks. Since Class 1 EFBs are not connected to the onboard aircraft systems, their consideration is not central to the purpose of AWSP, although the AWSP methodologies can be applied to Class 1 as well. 2 AWSP Preliminary Design Type Certification Airworthiness Security (AWS) Assessment Process AWS Requirements Management Process Aircraft Reqmnts Aircraft Security Requirements FHA Threat Identification Externalities Concepts of Operation Externalities Alloc to Systems Aircraft Security Architecture Type Certification Preliminary Aircraft Security Risk Assessment System Security Requirements PSSA Preliminary System Security Risk Assessment Syst Arch System Security Architecture Item Security Requirements Item Development Item Development Product Data Figure 1 : AWS Activities During Preliminary Design 2.1 Aircraft Security Requirements Activity: Aircraft Security Requirement Part of (overall Aircraft Development): Aircraft Requirements Purpose: Identify aircraft security needs, externalities, and requirements Actions: • • • • • Identify the aircraft/ aircraft system(s) security environment. Identify external information interfaces. Identify assumptions about the operational environment. Identify security domains and trust relationships. Identify existing security countermeasures. 2.1.1 Aircraft Requirements Before we can focus on the security requirements, we need to define the EFB system requirements. Normally, these are provided by the overall Aircraft Development Process, which the AWSP depends on. A critical assumption within this analysis is that the EFB is an advisory system to the flight crew. As such, it provides supplemental information to the flight crew to aid the flight crew during the flight phases. Note that the EFB does not provide information directly to the onboard automatic aircraft control systems- it is a crew advisory system only. An EFB provides an application platform for a variety of applications that in turn are classified into Types A, B, and C, each of which have different levels for operational approval. Scoping: The following application functions were identified as key within the EFB Use Case Study and will be used to define the EFB functionality. This design example will only consider this level of detail in the applications. Assessment of individual applications and interference between applications will not be considered in this design example. Identified EFB Functions: Take-off Provide aircraft performance during Take-off Landing Provide Approach Directions during Landing Provide taxi route and progress along route. Taxi Guidance This includes V speed limits, rotation rates, engine speed settings, pitch trim settings, wind direction and speed, runway conditions. This includes approach plates, wind direction and speed, airport conditions. This includes runway exit and aircraft position. <Taxi situation awareness, covered under another AC><taxi routes come verbally from ATC, may be provided electronically as part of nexgen> <Own ship position is application on EFB> 2.1.2 Externalities 2.1.2.1 External Security Domains and Security Environment Scoping: For this example, we are considering the EFB function within an aircraft. As a result, we are assessing the EFB system AND the aircraft security architecture within which the EFB system will operate. Hence assessment of the network architecture is within this scope, but only inasmuch as it affects the EFB function. Safety aspects of other systems are relevant only insofar as they cause an impact by having an impact on the EFB function. Operational Context: The EFB is operated by the flight crew as part of their flight procedures. Flight crew procedures include interaction with other flight crew, aircraft control systems, ATC systems and processes, airport systems and processes, operator flight training and processes, and environmental observations. Physical Security Context: Access to various areas of the aircraft, and to the aircraft itself, are subject to established airport security control processes and operator aircraft security control processes. Maintenance Context: The EFB software and hardware are controlled through the aircraft maintenance control processes. This example does not include use of the ANI for software or application updating, although the criticality of the databases and charts means that many of the same security concerns will be addressed. Administration Context: The EFB applications depend on charts and databases which are controlled through the aircraft administration control processes. Offboard Context: For Class 2 EFBs, this includes handling of portable EFBs offboard the aircraft. There are three external contexts that are potentially involved in offboard use: operational use by flight crew, maintenance use by maintenance control processes, and administrative use by administration control processes. Procurement and Development Context: This includes the procurement and development of the EFB hardware and software. Note on scope difference from ARP SAE 4754: All six contexts above represent safety aspects considered by Part 2 AWSP that are not included in the ARP SAE 4754 safety assessment process. Note that the purpose of AWSP is to assess dependence of the EFB system on the security controls of those external domains, not to assess the domains themselves. 2.1.2.2 External Information Interfaces For purposes of this example, the following electronic interfaces are assumed. External Interface <physical and logical> Mass Media Port User Interface Devices Aircraft Network Interface Description A physical port for electronic loading of applications and data Physical devices such as keyboards for use and administration of the EFB and its applications An active network connection between the EFB and one or more onboard networks. Gatelink <provide reference to standards><at ground communications> Airline <operator> Network Connection EFB Peer Connection ACARS/SWIM Peer External Connection Passenger Connection Flight Crew Laptop <note: not yet carried thru this example> An active network connection between one or more onboard networks through a Terminal Wireless LAN Unit to a Gatelink network hosted through the airport. The airport network is connected logically to the operator network as a part of aircraft administration control. An external (to aircraft networks) virtual dataflow between the EFB and the Airline Network used for aircraft administration control An internal (to aircraft networks, external to EFB) virtual dataflow between the EFB and other onboard aircraft systems used by applications An external (to aircraft networks) virtual dataflow between EFB and ATC service providers used by EFB applications, but mediated by an onboard Communications Manager An external (to aircraft networks) virtual dataflow between an onboard aircraft system and its external service provider There may be connections between onboard aircraft networks and passenger devices (e.g. IFE web services). There are no such connections to the EFB. The flight crew may have laptops that are either corrupted through offboard connection or have external connections to internet services, and that have connections to (limited) onboard aircraft hosts. These laptops are not the EFB laptop. <satcom instead of acars, e.g.inmarsat><airborne communications> More detailed data flows for the EFB itself are defined below. Data Item Take-off Landing Taxi Guidance Maint and Admin External Interface Databases (Table and Charts) Application Software Platform Software NOTAMs Weather Aircraft state FMS Taxi Route Load and Balance Data Crew Input and Check Taxi progress and position X X X X X X X X X X X X X X X X X Airline/gatelink/ through installed dataloader Mass Media/ through installed dataloader Mass Media ACARS/SWIM/UI/Airline ACARS/SWIM/UI/Airline FMS FMS FMS/UI//Airline X X X X X UI X Traffic Sensors and Navigation System 2.1.2.3 <Assumptions about the operational environment> This example assumes those aircraft-level controls that have been established as part of current aircraft certification practices dealing with EFBs. In current certified aircraft types, EFB applications and data have been consistently classified at DAL levels C (<?when interacting with FMS>), D, or E. The basis for this classification is the use of EFBs as advisory aids to existing systems and not as primary or secondary aircraft-level functions. Existing aircraft level functions which supersede EFB functions include: ATC ground dispatch procedures ATC ground monitoring ATC landing procedures ATC monitoring ILS systems Landing checklist Pilot control Pilot manual backup Pilot situation awareness Flight policies and pilot training Pilot-In-Command observation Crew management practices Runway markings Take-off abort procedures Take-off checklist This example is not tied to a particular aircraft architecture. The only technical security controls it assumes are in place are those associated with established external security domains. 2.1.2.4 External Security Domains and Trust Relationships Definition: A trusts B with respect to A's safety-related security objectives <??> if A chooses to demonstrate those objectives by demonstrating that: if B satisfies B's safetyrelated security objectives then A will meet A's objectives. B is trustworthy for A if B can demonstrate that B satisfies those B objectives that A cares about. Essentially, "A trusts B" means that A is claiming that A is secure because B is secure. Note that some would define this as "blind trust", not "trust". Operational Context Physical Security Context Maintenance Context Administration Context Offboard Context Procurement and Passengers are not trusted. Flight crew, cabin crew, and maintenance crew are trusted to a level that is consistent with the impact of their authorized activities (see Section 2.2.4 for more details). Flight crew laptops are not trusted. Physical security controls are assumed to be in place and can be trusted to a level that is consistent with established guidelines. Maintenance crew and maintenance control policies (including independent contracted entities) are trusted to a level that is consistent with the impact of their authorized activities (see Section 2.2.4 for more details). Administration personnel and administration control policies (including independent contracted entities) are trusted to a level that is consistent with the impact of their authorized activities (see Section 2.2.4 for more details). Level of dependence on trust for offboard control policies are to be determined through this example. Level of dependence on trust for procurement and development are to Development Context be determined through this example. 2.2 Threat Identification Activity: Threat Identification Purpose: Identify the information security threats to flight safety Actions: • Determine threat source profile(s). • Identify the threat conditions associated with the aircraft level functions. • Identify functional security dependencies between threat conditions and threats. • Categorize information asset classes. • Coordinate with FHA. • Assess safety impact of threat conditions. • Identify additional verification studies to validate assumptions involving issues that need to be resolved by data from later stages. Scoping: Since this example does not assume a particular aircraft architecture, we will not be including an assessment of the indirect threat that a compromised EFB might pose to other onboard aircraft systems. An actual aircraft assessment will include the consideration of indirect threats, which may or may not be allocated to the EFB system itself. Some of the issues involved will be discussed in this example as part of the consideration of the possible threat to the EFB of an attack on an EFB peer system. 2.2.1 Functional Hazard Analysis (FHA), Aircraft-level Considerations Before we look at the threat conditions, we need to extract the required safety hazard information from the aircraft-level FHA for the EFB. The table below extracts those aircraft-level hazards which can be attributed in part to an EFB failure condition. In addition, the table shows the aircraft-level controls which are considered the primary and secondary controls within this example. In aeronautical systems, no serious incident is the result of a single event or action but is the result of multiple failures and events. Hence "Safety Impact" is determined through the magnitude of the reduction in the safety margins and functional capabilities. Table from ED127 Part 2, Table 12, Allocated Safety Impact shows that since EFB is not a primary or secondary element, the lowest allowed classification of impact when there is a non-negligible effect on the safety margin is Level III. Impact I II Allocated Safety Impact for Independent Architectural Elements, based on analysis of security architecture Elements must include at least two independent security countermeasures with an allocated safety impact of II or higher, but no element should be lower than III. Elements must include at least two independent security countermeasures with an allocated safety impact of III or higher, III IV but no element should be lower than IV. Elements must include at least two independent security countermeasures with an allocated safety impact of IV or higher. Elements must include at least one security countermeasures with an allocated safety impact of IV or higher. EFB Function Aircraft level hazard Aircraft level Safety Impact EFB High-level Failure Condition Category EFB Externalities- Aircraft-level controls <reasons why> Take-off Underpowered Take-off Catastrophic Integrity CoPilot observation, Pilot situation awareness, Pilot training, Take-off abort procedures Take-off Underpowered Take-off Catastrophic Display incorrect V, et.al. for conditions to pilot Unable to display V, et. al. to pilot Availability Take-off Unstable at Take-off Catastrophic Integrity Take-off Unstable at Take-off Catastrophic Landing Controlled Flight Into Terrain Catastrophic Display incorrect trim for conditions to pilot Unable to display unstable condition to pilot Display incorrect landing approach Landing Controlled Flight Into Terrain Catastrophic Unable to display landing approach Availability Taxi Runway incursion Severe <catastrophic> Display incorrect taxi guidance Integrity Taxi Runway incursion Severe Unable to display taxi guidance Availability Pilot control, Pilot-In-Command observation, Pilot situation awareness, Pilot training, Takeoff checklist, Manual backup Pilot control, Pilot-In-Command observation, Pilot situation awareness, Pilot training, Takeoff abort procedures Pilot control, Pilot-In-Command observation, Pilot situation awareness, Pilot training, Takeoff checklist, Manual backup Pilot control, Pilot-In-Command observation, Pilot situation awareness, Runway markings, Pilot training, ATC landing procedures, ATC monitoring, ILS systems Pilot control, Pilot-In-Command observation, Pilot situation awareness, Runway markings, Pilot training, Landing checklist, ATC landing procedures, ATC monitoring, ILS systems, Manual backup Pilot control, Pilot-In-Command observation, Pilot situation awareness, Runway markings, Pilot training, ATC ground dispatch procedures, ATC ground monitoring Pilot control, Pilot-In-Command observation, Pilot situation awareness, Runway markings, Pilot training, ATC ground dispatch procedures, ATC ground monitoring, Manual backup Availability Integrity EFB Safety DAL <allocated impact> C E C E C E C E <clarify-- this is from FHA, this is use of FHA to generate EFB situation, better show how EFB hazard effect is related to aircraft level effect> 2.2.2 EFB Functional Hazard Analysis (FHA) The resulting reductions in the safety margins for the actual EFB and its functions are shown in the following table. EFB Functions EFB Hazard Take-off Display incorrect V, et.al. for conditions to pilot Unable to display V, et. al. to pilot Display incorrect trim for conditions to pilot Unable to display unstable condition to pilot Display incorrect landing approach Unable to display landing approach Display incorrect taxi guidance Unable to display taxi guidance Take-off Take-off Take-off Landing Landing Taxi Taxi Safety Impact Major Category No Effect Availability Major Integrity No Effect Availability Major Integrity No Effect Availability Major Integrity No Effect Availability Integrity Issue: Under current regulations, EFB and EFB applications are not evaluated through the SAE ARP 4754/AMC 25.1309 process. In practice, at best they would have the equivalent of a DAL D classification. 2.2.3 EFB Direct Threat Conditions Having identified the hazards, the direct threat conditions are those conditions of the EFB and its applications that can cause the hazards listed above. This is based on the EFB functional dependencies and data items. The following cross reference table matches the threat conditions of the data items to the EFB hazards.. Threat Condition Corrupted Database loaded in EFB Corrupted Application/Platform running in EFB Corrupted NOTAM in EFB Corrupted Weather in EFB Corrupted Aircraft State in EFB Corrupted Taxi Route in EFB Corrupted Taxi Progress in EFB Corrupted L&B Data in EFB Corrupted Crew Input and Check in EFB Portion of Databases loaded missing from EFB Portion of Application/Platform missing from EFB Portion of NOTAM missing from EFB Portion of Weather missing from EFB Portion of Aircraft State missing from EFB Portion of Taxi Route missing from EFB Portion of Taxi Progress missing from EFB Portion of L&B Data missing from EFB Portion of Crew Input and Check missing from EFB Application Take-Off Hazard Display incorrect V, et.al. for conditions to pilot Unable to display V, et. al. to pilot Display incorrect trim for conditions to pilot Unable to display unstable condition to pilot Display incorrect landing approach Unable to display landing approach X X X X X X X X X X X X X X X X X X X Landing X X X X X X Taxi Guidance Display incorrect taxi guidance Unable to display taxi guidance X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X The resulting direct threat conditions of the EFB applications and data can be summarized as below. Note: Corrupted data is data that is available, erroneous, but has not been detected as erroneous. It includes coherently corrupted data (data that is well-structured in terms of expected formats and checksums). Threat Condition Corrupted Databases (Tables, Charts) loaded in EFB Corrupted Application/Platform running in EFB Corrupted NOTAM in EFB Corrupted Weather in EFB Corrupted Aircraft State in EFB Corrupted Taxi Route in EFB Corrupted Taxi Progress in EFB Corrupted L&B Data in EFB Corrupted Crew Input and Check in EFB Portion of Databases (Tables, Charts) missing from EFB Portion of Application/Platform missing from EFB Portion of NOTAM missing from EFB Portion of Weather missing from EFB Portion of Aircraft State missing from EFB Portion of Taxi Route missing from EFB Portion of Taxi Progress missing from EFB Portion of L&B Data missing from EFB Portion of Crew Input and Check missing from EFB Impact Major Major Major Major Major Major Major Major Major No Effect No Effect No Effect No Effect No Effect No Effect No Effect No Effect No Effect Scoping: We will only consider those direct threat conditions which have a safety effect, i.e. we will not further analysis those direct threat conditions with "No Effect". We will continue to consider those direct threat conditions associated with maintenance actions such as software and databases. 2.2.4 Threat Exposure and Source Profiles Note: This design example is partially tutorial in nature. As a result, it will illustrate some cases where the initial analysis should be updated as a consequence of later analysis. Those cases will be noted below in this design example, but one should look at the material in the appendices (to be added later) for the actual final tables. The inherent vulnerabilities of the EFB are the means by which an attacker can cause a threat condition by using the intended functionality of the design. Inherent Vulnerability Mass Media Port User Interface Intended Use Software, Databases User input and checks, NOTAMs, Load Aircraft Network Interface Dataflow from ACARS/SWIM Dataflow from Aircraft Administration Organization Dataflow from FMS, Traffic Sensors, and Navigation System Offboard use of portable EFB Other external dataflows to EFB and Balance Support dataflows NOTAMs, Weather Database/Charts, NOTAMS, Load and Balance Aircraft State, Load and Balance, Taxi Route, Taxi Progress EFB maintenance and administration, use by offboard user Use not forbidden Without further countermeasures or assurances, this results in the following exposure and potential threat sources: Potential Exposed Vulnerability Access to EFB User Interface (offboard access considered separately) Access to FMS Access to Mass Media Port Access to onboard EFB Access to Traffic Sensors and Navigation Access to SWIM Access to ACARS Access to Aircraft Network External Countermeasures Aircraft physical access control Exposure with external countermeasures Flight crew, maintenance Aircraft physical access control Aircraft physical access control Aircraft physical access control Aircraft physical access control SWIM ground system access control ACARS ground system access control pending Flight crew, maintenance Flight crew, maintenance Flight crew, maintenance Flight crew, maintenance Authorized SWIM users Authorized ACARS users Access to EFB Aircraft Network Interface pending Access to NOTAM/Weather Upload Dataflow from ACARS/SWIM Host Access to FMS Data Upload Dataflow from FMS pending Access to Other EFB Peer Data Upload Dataflow from FMS Access to Gatelink/TWLU pending Access to Gatelink Network Access to Airline L&B Data Upload Dataflow From Airline Access to Database Upload pending pending Flight crew, cabin crew, maintenance, passengers, flight crew laptops Flight crew, cabin crew, maintenance, passengers, flight crew laptops Flight crew, cabin crew, maintenance, passengers, flight crew laptops Flight crew, cabin crew, maintenance, passengers, flight crew laptops Flight crew, cabin crew, maintenance, passengers, flight crew laptops Flight crew, cabin crew, maintenance, passengers, , flight crew laptops general airport population Anyone Anyone pending Anyone pending Airport physical access control Dataflow From Airline Access to NOTAM/Weather Upload Dataflow From Airline Access to offboard EFB Access to unintended External Dataflows to EFB Access within Airline Administration Access within development process pending Anyone pending pending Anyone Anyone Airline Administration access control pending Authorized airline administration Anyone 2.2.4.1 Threat Source Profiles The following threat populations can be identified from the analysis above: Population Flight Crew Cabin Crew Maintenance Crew Airline Administration ACARS/SWIM Users Developers Passengers Airport population Anyone Flight Crew Laptop Threat Likelihood pI pI pI pIII pIII pIII pV pV pV pV Supplemental information as needed for particular methodologies for threat assessment should also be defined. <scope of insider threat> Population Flight Crew (example) Motivation Error or Insider Cabin Crew Error or Insider Maintenance Crew Airline Administration ACARS/SWIM Users Developers Error or Insider Passengers Curious or Malicious Curious or Airport Error or Insider Error or Insider Error or Insider (example) Capability Threat Likelihood Full knowledge, portable attack tools, 1 flight cycle Full knowledge, portable attack tools, 1 flight cycle Full knowledge, portable attack tools, 1 ground cycle Full knowledge, general attack tools, indefinite Full knowledge, general attack tools, indefinite Full knowledge, general attack tools, indefinite General knowledge, portable attack tools, 1 flight cycle General knowledge, portable attack pI pI pI pIII pIII pIII pV pV population Anyone Flight Crew Laptop Malicious Curious or Malicious Inadvertent or Malicious tools, 1 ground cycle General knowledge, general attack tools, indefinite Autonomous malware (trojan, virus, bot), general knowledge, general attack tools, 1 flight cycle pV pV 2.2.5 Preliminary Aircraft Security Risk Assessment for "Do Nothing" Security Architecture Purpose: Assess information security risks and generate security objectives for items Actions: • Assess the system security architecture. • Assess vulnerabilities. • Categorize information assets. • Determine and classify threat scenarios. • Evaluate information security risks. • Determine risk treatment, including possible gaps in security architecture. • Identify item security levels, including those of external entities and interfaces (trust levels). • Allocate item threats and impact. • Develop preliminary external agreements (e.g., operator requirements, maintenance requirements). • Coordinate with Preliminary Safety Assessment. • Coordinate with System Security Architecture. Note, ED127 Part 2, Figure 18, Determination Of Final Risk Level. Risk Level Threat Likelihood Impact V IV III II I No Effect Minor Major Hazardous Catastrophic pV Frequent Low Medium Medium High High pIV Probable Low Low Medium Medium High pIII Remote Low Low Low Medium Medium* pII Extremely Remote Low Low Low Low Medium* pI Extremely Improbable Low Low Low Low Medium* * = Risk justification must include demonstrating the absence of a single point of security weakness In the absence of any other countermeasures or assurances, we can perform the following risk assessment. Threat Condition Potential Exposed Vulnerability Access to EFB User Interface Threat Exposure Impact Liklihood Risk Flight crew, maintenance III pI Low Access to FMS Flight crew, maintenance III pI Low Access to Mass Media Port Flight crew, maintenance III pI Low Access to onboard EFB Flight crew, maintenance III p Low Access to Traffic Sensors and Navigation Access to SWIM Flight crew, maintenance III pI Low Authorized SWIM users III pIII Low Access to ACARS Authorized ACARS users III pIII Low Corrupted Databases/ Load and Balance/ NOTAM/ Weather in EFB Corrupted Data/Databases in EFB Access within Airline Administration Authorized airline administration III pIII Low Access to Aircraft Network III pV Medium Corrupted Data/Databases in EFB Access to EFB Aircraft Network Interface III pV Medium Corrupted NOTAMS/Weather in EFB Access to NOTAM/Weather Upload Dataflow from ACARS/SWIM Host Access to FMS Data Upload Dataflow from FMS Flight crew, cabin crew, maintenance, passengers Flight crew, cabin crew, maintenance, passengers Flight crew, cabin crew, maintenance, passengers Flight crew, cabin crew, maintenance, passengers Flight crew, cabin crew, maintenance, passengers Flight crew, cabin crew, III pV Medium III pV Medium III pV Medium III pV Medium Corrupted NOTAM/Crew Input in EFB Corrupted Load and Balance/ Aircraft State/Taxi Route in EFB Corrupted Software/ Databases in EFB Corrupted Software/ Databases in EFB Corrupted Taxi Progress in EFB Corrupted NOTAMS/Weather in EFB Corrupted NOTAMS/Weather in EFB Corrupted Load and Balance/ Aircraft State/Taxi Route in EFB Corrupted Data in EFB Corrupted Data in EFB Access to Data Upload Dataflow from other EFB Peer Access to Gatelink/TWLU Corrupted Data in EFB Corrupted Load and Balance in EFB Corrupted Databases in EFB Corrupted NOTAMS/Weather in EFB Corrupted Software/ Databases in EFB Corrupted Software/ Databases in EFB Corrupted Software/ Databases in EFB Access to Gatelink Network Access to Airline L&B Data Upload Dataflow From Airline Access to Database Upload Dataflow From Airline Access to NOTAM/Weather Upload Dataflow From Airline Access to offboard EFB Access to unintended External Dataflows to EFB Access to Development Process maintenance, passengers, general airport population Anyone III pV Medium Anyone III pV Medium Anyone III pV Medium Anyone III pV Medium Anyone III pV Medium Anyone III pV Medium Anyone III pV Medium 2.2.6 Aircraft Security Architecture Activity: Aircraft Security Architecture Purpose: Establish aircraft security architecture and countermeasures Actions: • Determine aircraft security architecture and countermeasures. • Allocate security functions to systems. • Determine externalities (external to system) for each system. • Identify information assets. • Coordinate with Threat Identification, Preliminary Aircraft Security Risk Assessment, and System Security Objectives. • Coordinate with Aircraft Safety Architecture. From the architecture design and assessment, we can determine the security functional requirements and security levels for efficiency and assurance. From the security levels and requirements, we can set the software assurance and requirements. From the last analysis, there is a need to add security countermeasures. The following is a discussion of possible measures: 2.2.6.1 Candidate Security Countermeasures This section presents the set of security countermeasures to be considered in this design example. The selection of security countermeasures is part of the design process. ED1272 does not dictate a particular choice of countermeasures, rather it defines how to analyze whatever countermeasures the designers wish to consider, and how to determine if the defined countermeasures are sufficient and complete. Definition: Effectiveness is the ability of a security countermeasure to reduce the exposure of a vulnerability to the threat population. Efficiency is the effectiveness when the security countermeasure is operating as intended. Assurance is the evidence that the countermeasure will operate or is operating as intended. Scoping: This design example does not consider security architecture features based on the internal software architecture of the EFB, such as protected memory partitions or control of OS privileges and user rights, but is based on partitioning through use of separate aircraft hosts. Vulnerability/Risk Access to Aircraft Network Access to EFB Aircraft Network Interface Access to NOTAM/Weather Upload Dataflow from ACARS/SWIM Host Access to FMS Data Upload Dataflow from FMS Access to Data Upload Dataflow from other EFB Peer Access to Gatelink/TWLU Access to Gatelink Network Access to Airline L&B Data Upload Dataflow From Airline Access to Database Upload Dataflow From Airline Access to NOTAM/Weather Upload Dataflow From Airline Access to offboard EFB Access to Other External Dataflows to EFB Access to Development Process Note Passengers and Fight Crew laptop have inherent access, so this will be broken up into finer grained access, e.g. TWLU access, access to intended dataflows and network interface Subsumed by "intended EFB peer dataflow" and external trust of ACARS/SWIM Subsumed by " intended EFB peer dataflow" Subsumed by " intended EFB peer dataflow" Subsumed by " intended EFB airline dataflow" Subsumed by " intended EFB airline dataflow" Subsumed by " intended EFB airline dataflow" <in general, review level of definitions below. WEP/WPA is too detailed, some of the others need to be more technically oriented> 2.2.6.1.1 Access through TWLU wireless access point countermeasure efficiency requirement WEP authorization <authentication and encryption> WPA2 authorization Reduce exposure from "general airport population" to "general airport population possessing WEP attack tool" Reduce exposure from "general airport population" to "Gatelink users" potential vulnerabilities failure or defect, loss of security data assurance failure or defect, loss of security data implementation implementation Scoping: In this design case, we will judge WEP as ineffective due to lack of efficiency. Note that overall we are hoping to reduce a "pV" to a "pIII". There may be cases where the efficiency of WEP may be sufficient. 2.2.6.1.2 Access to Gatelink through Gatelink Network countermeasure efficiency requirement Trust Gatelink Network to control access Reduce exposure from "Gatelink Users" to "Authorized Gatelink Users" potential vulnerabilities failure assurance external agreement Note: Consider adding to Threat Source Profiles: Authorized Gatelink Users Curious or Malicious or Competitors or Uncertified Organization General knowledge, general attack tools, indefinite pV Note: This represents a large business risk due to competitive interests, which would also require a confidentiality security requirement. <issue: sometimes airlines will use TWLU to route to off-gatelink network> Scoping: In this design case, we will judge this as ineffective due to lack of efficinecy in that the "Authorized Gatelink Users" remains a large and significant threat source. In addition, this design case is going to use access to the Gatelink network as a proxy for dataflows though uncontrolled internet networks. 2.2.6.1.3 Access to the intended EFB dataflow from airline countermeasure efficiency requirement potential vulnerabilities assurance Integrity Check on Intended Airline Dataflow Reduce exposure from "Anyone" to "Airline Administration" cryptographic weakness, bypass at source or destination, loss of security data technical, assurance for source and destination 2.2.6.1.4 Access to Airline administration upload tools countermeasure efficiency requirement Trust Airline Organization to control access to EFB upload system Reduce exposure from "Anyone" to "Airline Administration" potential vulnerabilities failure assurance operational requirements 2.2.6.1.5 Access to Unintended External Dataflows to EFB countermeasure efficiency requirement Design forbids unintended external dataflows Security Domain to control external flows Reduce exposure from "Anyone" to "No one" Reduce exposure from "Anyone" to "No one" potential vulnerabilities unintended external dataflow failure, misconfiguration assurance implementation implementation Note: The dynamic addition of functionality to EFB applications or platform is considered to be software corruption and is allocated to that part of the assessment. <logical dataflows are application-level dataflows> Note: Requirement to forbid unintended external dataflows is part of standard implementation assurance requirements. 2.2.6.1.6 Access to intended EFB Dataflow from EFB Peer countermeasure Integrity Check on Intended Peer Dataflow efficiency requirement Reduce exposure from "Anyone" to "No one " (hostto-host security) Security Domain to prevent access to internal flows Reduce exposure from "Anyone" to "Security Domain Peer External Service Providers" potential vulnerabilities cryptographic weakness, bypass at source or destination, loss of security data failure, misconfiguration assurance technical, assurance for source and destination implementation Note: The process must now account for those Security Domain Peers with external dataflows. Also note a security requirement that the EFB security domain must not include the Passenger-accessible aircraft network host or the Flight Crew laptop. External Service Providers Error or Insider Full knowledge, general attack tools, indefinite pIII 2.2.6.1.7 Access to EFB Aircraft Network Interface countermeasure efficiency requirement Robustness with respect to all network interactions Security Domain to control external flows Reduce exposure from "Anyone" to "No one" Reduce exposure from "Anyone" to anyone with access to intended dataflow to EFB or access to security domain peer Reduce exposure from "Anyone" to anyone with access to security domain peers Communications Manager to manage all external flows to EFB potential vulnerabilities failure assurance failure, misconfiguration implementation failure implementation implementation Note: Remember that robustness is with respect to anyone who has some ability to interact with the EFB Aircraft Network Interface, which includes those with access to a EFB Dataflow (even when encrypted) such as the Authorized Gatelink Users. Note: Communications Manager would need to be added to assessment, and would likely inherit requirement for robustness. 2.2.6.1.8 Access to Offboard EFB countermeasure efficiency requirement Trust Airline Organization to control access to offboard EFB Preboard scanning and cleaning of offboard EFB Reduce exposure from "Anyone" to "Authorized Crew and Administration" Reduce exposure from "Anyone" to "Authorized Crew and Administration" potential vulnerabilities failure assurance failure operational requirements operational requirements Note: Preboard scanning and cleaning may imply technical features for the EFB. Discussion: Note that the previous two countermeasures control the same vulnerability, and also involve specifying how the trusted organization should safeguard the offboard EFB. They should be combined into a single trust relationship. countermeasure efficiency requirement Trust Airline Organization to protect offboard EFB Reduce exposure from "Anyone" to "Authorized Crew and Administration" 2.2.6.1.9 Access to Development Process potential vulnerabilities failure assurance operational requirements countermeasure efficiency requirement Trust Development Organization to protect EFB implementation Reduce exposure from "Anyone" to "Authorized Developers" potential vulnerabilities failure assurance implementation Note: This is really an inherent part of the overall process and does not require explicit considerations. The requirement to protect implementation is part of standard implementation assurance requirements. 2.2.6.2 Trusting the FMS The EFB has inherent vulnerabilities from the FMS, the ACARS/SWIM Communications manager, Traffic Sensors, and Navigation, because it accepts solesource data from those systems. However, in general an attack on the FMS that could then be used to stage an attack on the EFB already represents a direct threat condition on the FMS, and the safety impact of the FMS is as great or greater than the safety impact of the EFB. Thus the FMS can be trusted by the EFB- a FMS that complies with its own safety-related security objectives will also satisfy the safety-related security objectives of the EFB that are associated with the FMS itself. There could be exceptions- if the FMS accepted data that is less critical to the FMS than it is to the EFB, then an assessment of the FMS might miss the indirect threat to the EFB. As a result, the dependence of the EFB on the FMS must be included in an overall aircraft assessment. <this should be included as a countermeasure to be consitent with this example> 2.2.6.3 Candidate Architecture Approaches For this example, we will be evaluating three possible architectural approaches: Self-protection The EFB system is to provide all protection for itself. Delegated protection The Aircraft will provide all protection for the EFB system. Layered protection Both Aircraft and EFB will provide protection to minimize overall assurance requirements and to provide redundant layered protection. Note that layered protection could be achieved through multiple layers by the Aircraft alone, but this will not be pursued in this example. Self-protection is provided through integrity checks on the dataflows, and through robustness of the EFB ANI. Delegated protection is provided through security domains and a communications proxy. To simplify the analysis, we will do the following. Consider the Take-off application only. Combine application software and platform software into software, and assume it is only being loaded from the Mass Media Port. Assume that Weather and NOTAMs are being loaded from the FMS. Assume that Databases are being loaded either from the Mass Media Port, or through a remote link to the Airline. Assume that Load and Balance information are either being loaded from the FMS or through a remote link to the Airline. 2.2.6.4 Security Levels The Security Level is a classification of the effectiveness (comprising efficiency and assurance) of a system or item (which is a component of a specified security countermeasure) to reduce the threat likelihood of a threat population. It assumes a base threat population representative of a broadband connection to the general uncontrolled Internet. Security Level: A B C D E is the level of effectiveness necessary to take an attack likelihood of: pV (Frequent) pV (Frequent) pV (Frequent) pV (Frequent) pV (Frequent) and reduce it to a threat likelihood of: pI (Extremely Improbable) pII (Extremely Remote) pIII (Remote) pIV (Probable) pV (Frequent) In conjunction with the risk table, this implies the following association with Impact: Security is necessary to protect a against a threat Level: vulnerability with impact: likelihood of: A I* (Catastrophic) pV (Frequent) B II (Hazardous) pV (Frequent) C III (Major) pV (Frequent) D IV (Minor) pV (Frequent) E V (No Effect) pV (Frequent) * = with demonstration that there is no single point of security weakness 2.2.6.5 A Quick Look At Threat Trees A threat tree is an event-logic tree that sorts out the combinations of attacks, failures, and events that may result in a threat condition. The top level and the various "OR" gates collect alternate paths of attack: Incorrect Take-off Info displayed to pilot NEWTOP Corrupted Onboard EFB Coherently Corrupted Internal Peer Data in EFB (NOTAM /Weather, FM S L&B) G008 G052 Page 2 Page 46 Coherently Corrupted Database/Chart loaded in EFB Corrupted Airline L&B Data in EFB G001 G006 Page 25 Page 50 Corrupted software running in EFB Flight Crew enters corrupted data into EFB G002 G007 Page 43 Page 51 Coherently Corrupted Database/Chart loaded in EFB G001 Page 1 Page 50 8.00E-05 Corrupted Database/Chart Upload from M ass M edia Port Coherently Corrupted Database/Chart loaded from network interface G085 G060 2.00E-05 8.00E-05 Page 26 Page 29 A security countermeasure is represented by its intended function and its failed function: Access to offboard EFB Page 3 G089 Unauthorized access to offboard EFB Authorized aceess to offboard EFB G091 G092 Page 5 Page 7 Each leads to the threat population exposed by the intended security countermeasure: Authorized aceess to offboard EFB G092 Page 4 Flight Crew M aintenance A015 A029 and the event that the security countermeasure fails: Unauthorized access to offboard EFB Page 4 G091 Offboard EFB acccess failure Offboard Population G093 G094 Page 6 and the threat population that is exposed when the security countermeasure fails: Offboard Population G094 Page 5 Page 33 Page 41 1.00E+00 Gatelink Network cust omer M aintenance A044 A029 1.00E+00 1.00E-05 General AN Host Service Provider A104 A061 1.00E+00 1.00E-03 Airline Ground Systems user A048 1.00E-05 As another example, consider the external integrity check: Coherently Corrupted Database/Chart loaded from network interface G060 Page 25 8.00E-05 Database/Chart Integrity Check Failure Corrupted Database/Chart Upload Dataflow from Airline G068 G074 8.00E-05 1.00E+00 Page 30 Page 35 Database/Chart Integrity Check Failure G068 Page 29 8.00E-05 Database/Chart Integrity Check Bypassed Database/Chart Integrity Check Compromised (failure or loss of security data) G042 G059 7.00E-05 1.00E-05 Page 31 <note that this is comporomise at the tijme of database integrity check applied> Database/Chart Integrity Check Bypassed G042 Page 30 7.00E-05 Corrupted Onboard EFB Access to Airline operations ground syst em G008 G064 5.00E-05 2.00E-05 Page 2 Page 32 Corrupted Database/Chart Upload Dataflow from Airline G074 Page 29 1.00E+00 Corrupted Offboard Database/Chart Data Access to Database/Chart Dataflow or Tools G075 G076 1.00E+00 Page 28 1.00E+00 Page 23 Corrupted Offboard Database/Chart Data Page 35 Page 26 G075 1.00E+00 Anyone G026 1.00E+00 Page 19 In this case, the probabilities correspond to the threat likelihoods according to the following table, but the probabilities are not as useful as the cutsets (see below). pI pII pIII pIV pV 1E-9 1E-7 1E-5 1E-3 1 2.2.7 Assessment of Self-Protection Architecture We assume the following security countermeasures have been added to the EFB Function (see section 2.2.6.1 for additional information on each countermeasure). (Note that the actual process of determining these countermeasure was one in which countermeasure were introduced and exposed vulnerabilities assessed until a complete set of countermeasures was determined. This iterative process will not be illustrated here.) Every time a countermeasure is introduced into the security assessment, the modified assessment must then account for the effectiveness of the security countermeasure by accounting for the efficiency (how the countermeasure performs when operating as intended) and the assurance (how the countermeasure performs when it fails). So we introduce inherent and known vulnerabilities for efficiency, and potential vulnerabilities for assurance. Countermeasure 1: Trust Airline Organization to protect offboard EFB Countermeasure 2: Integrity Check on Intended Dataflow from Airline Countermeasure 3: Forbid unintended external dataflows in EFB applications. Countermeasure 4: EFB network stack is robust with respect to all network interactions. <clarify technical meaning of this> Countermeasure 5: Integrity Check on Intended Dataflow from EFB Peers A detailed Threat Tree is presented in the Appendices (see Section 3.1). 2.2.7.1 Self-Protection Security Assessment 2.2.7.1.1 An illustration of attack through Gatelink The following is the full threat tree representing the Self-Protection architecture (details are available in Section 3.1. In c o re c tT a k e -o f In fo d is pa l y edo t p ilo t N E WT O P 9 .00E -05 C o ru p te d O n b o a rd E F B G 008 Co h e e r n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d in E F B C o ru p te d s o ftw a re ru n n in g in E F B G 001 G 002 Pa g e 1 5 .00E -05 8 .00E -05 C o h e re n tly C o ru p te d In te rn a lP e e rDa ta in E F B (N O T A M/We a th e r, F MS L & B ) C o ru p te d A irln e L & B D a ta in E F B G 05 2 2 .00E -05 F lig h C t re w e n te rs c o ru p te d d a ta in to EFB G 006 6 .00E -05 G 007 8 .00E -05 1 .00E -09 Pa g e 1 C o ru p te d Da a t bas e /C h a rtU p lo a d fro mMa s Me d ia P o rt C o h e re n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d fro mn e tw o rk in te rfa c e G 08 5 G 06 0 2 .00E -05 C o ru p te d A p p lic a tio n /P la tfo rm U p lo a d F ro mMa s Me d ia P o rt In e t rn a lP e e rDa ta In te g rity Ch e c k F a ilu re C o ru p te d In te rn a l P e e rD a ta in EF B (N O T A M/We a th e r,F MS L &B) Co h e e r n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d in E F B F lig h tC re w G 05 8 G 005 G 001 A 01 5 G 05 4 8 .00E -05 2 .00E -05 6 .00E -05 1 .00E +00 8 .00E -05 1 .00E -09 Pa g e 1 Pa g e 1 Ac c e s to Ma s Me d ia P o rt C o ru p te d O fb o a rd D a ta b a s e /C h a rtD a ta G 01 7 G 07 5 2 .00E -05 D a ta b a s e /C h a rt In te g rity Ch e c k F a ilu re C o ru p te d Da a t bas e /C h a rtU p lo a d D a ta flo w fro mA irln e Ac c e s to Ma s Me d ia P o rt C o ru p te d O fb o a rd A p p lic a tio n /P la tfo rm D a ta In e t n r a lP e e rDa ta In te g rity Ch e c k By pas ed In e t n r a lP e e rDa ta In te g rity Ch e c k C o mp ro mis e d (fa ilu re o rlo s o fs e c u rity d a ta G 07 4 G 01 7 G 05 6 G 06 9 G 07 0 G 06 8 1 .00E +00 8 .00E -05 1 .00E +00 2 .00E -05 Pa g e 1 Ac c e s to O n b o a rd E F B 1 .00E +00 5 .00E -05 Ac c e s to A irc ra ft N e tw o rk D a ta b a s e /C h a rt In te g rity Ch e c k C o mp ro mis e d (fa ilu re o rlo s o fs e c u rity d a ta ) G 04 2 2 .00E -05 1 .00E -05 Pa g e 1 Ac c e s to Da a t bas e /C h a rt D a ta lo f w o rT o o ls G 07 5 An y one G 07 6 Pa g e 1 1 .00E +00 1 .00E +00 Pa g e 1 C o ru p te d O fb o a rd D a ta b a s e /C h a rtD a ta G 05 9 7 .00E -05 G1 2 3 1 .00E +00 Pa g e 1 D a ta b a s e /C h a rt In te g rity Ch e c k By pas ed G 01 0 U n in te n d e d a c c e s to EFBn e w t o rk n i te fa r ce G 09 6 1 .00E -05 G 008 Pa g e 1 Pa g e 1 1 .00E +00 Pa g e 1 Pa g e 1 C o ru p te d O n b o a rd E F B G 02 6 1 .00E +00 5 .00E -05 Pa g e 1 C o ru p te d O n b o a rd E F B Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s G 008 G 06 4 Pa g e 1 Pa g e 1 5 .00E -05 2 .00E -05 An y one Ac c e s to D a ta b a s e /C h a rtU p lo a d D a ta flo w G 02 6 G 07 9 1 .00E +00 Pa g e 1 U n a u th o riz e da c c e s to A irln e g ro u n d te m y s G 06 5 U n in te n d e d a c c e s to EFBn e w t o rk n i te fa r ce G 06 6 G1 2 3 1 .00E -05 Ac c e s to A irc ra ft N e tw o rk G 09 6 1 .00E +00 1 .00E +00 Pa g e 1 A irln e g ro u n d s te m y acces fa ilu re G 06 7 1 .00E -05 O fb o a rd P o p u la tio n A irln e G ro u n d Sy te ms s us er G 09 4 A 04 8 1 .00E +00 C o ru p e t d O fb o a rd EFB C o ru p te d O th e r Ex te rn a lD a ta flo w fro mO th e rE x te rn a l S o u rc e G 01 1 2 .00E -05 Ac c e s to O n b o a rd E F B G 01 2 2 .00E -05 E F B C o ru p te d th ro u g h n e tw o rk in te ra c tio n s G 01 0 Pa g e 1 1 .00E -05 G1 1 9 2 .00E -05 1 .00E -05 Pa g e 1 A u th o riz edacc es to A irln e g ro u n d s te m y 1 .00E -05 Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s G 06 4 1 .00E +00 Pa g e 1 Ac c e s to A irln e N e tw o rk Ac c e s to G a te lin k N e tw o rk Ac c e s to o fb o a rd EFB F a ilu re to p re v e n t unas es e d d a ta flo w N o n -c re w , n o n -ma in te n a n c e A u th o riz edacc es to EFBp h y ic a lmo u n tin s a irc ra ft E F B n o tro b u s to n e tw o rk in p u ts G 02 1 G 02 0 G 08 9 G 1 05 G 08 6 G 03 3 G1 2 0 Pa g e 1 1 .02 E -03 1 .00E +00 2 .00E -05 1 .00E -05 1 .00E +00 2 .00E -05 Ac c e s to E F B n e tw o rk in te fa r ce G1 2 1 1 .00E -05 1 .00E +00 Pa g e 1 U n a u th o riz e da c c e s to A irln e N e tw o rk A u th o riz e d Acc e s to A irln e N e tw o rk G 04 5 1 .00E -05 U n a u th o riz e da c c e s to G a te lin k N e tw o rk G 04 6 1 .00E -03 A u th o riz edacc es to G a te lin k N e tw o rk G 03 9 2 .00E -05 U n a u th o riz e da c c e s to o fb o a rd E F B G 04 0 1 .00E +00 A u th o riz edacees to o fb o a rd E F B G 09 1 1 .00E +00 A irln e G ro u n d Sy te ms s us er G 09 2 1 .00E -05 Pa s enger A 04 8 1 .00E -05 F lig h tC re w A 1 03 1 .00E -05 Ma in te n a n c e A 01 5 1 .00E +00 Ac c e s to In te rn a l P e e rD a ta flo w A 02 9 1 .00E -09 G 08 8 1 .00E -05 Ac c e s to Da a t bas e /C h a rt D a ta lo f w o rT o o ls G 07 6 1 .00E +00 Pa g e 1 U n in te n d e d a c c e s to E F B n e tw o rk in te rfa c e G1 2 3 Pa g e 1 1 .00E +00 P a g e 1 1 .00E +00 Pa g e 1 A irln e N e tw o rk acces fa ilu re An y one Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s Ga e t lin k N e w t o rk acces c o n ro t l fa ilu re O fb o a rd P o p u la tio n Ac c e s to A irln e N e tw o rk G a te in l k N e tw o rk cus to me r G 08 7 G 02 6 G 06 4 G 04 1 G 09 4 G 02 1 A 04 4 1 .00E -03 1 .00E +00 Pa g e 1 2 .00E -05 Pa g e 1 1 .00E +00 1 .00E +00 Pa g e 1 1 .02 E -03 O fb o a rd E F B a c c c e s fa ilu re G 09 3 1 .00E +00 O fb o a rd P o p u la tio n F lig h tC re w Ma in te n a n c e A N H o tS sev r ic e P ro v d i er G 09 4 A 01 5 A 02 9 A 06 1 Pa g e 1 1 .00E -05 P a g e 1 1 .00E +00 1 .00E -09 1 .00E -05 G e n e ra l C a b in c re w A 1 04 1 .00E -03 Ac c e s to A irc ra ft N e tw o rk A 02 7 1 .00E +00 Pa g e 1 Pa g e 1 Pa g e 1 1 .00E -05 Pa g e 1 G a te in l k N e tw o rk cus to me r Ma in te n a n c e G a te in l k N e tw o rk cus to me r A 04 4 A 02 9 A 04 4 1 .00E +00 1 .00E -05 G e n e ra l 1 .00E +00 1 .00E +00 Pa g e 1 G 04 3 1 .00E +00 Ex te rn a lA c c e s to A N Ho s t A 06 1 1 .00E +00 G 09 6 Ac c e s to A N Ho s t 1 .00E +00 A NHo s tS e rv ic e P ro v id e r A 1 04 Ac c e s to A irc ra ft N e tw o rk G 09 6 O n b o a rd P o p u la tio n G 1 01 1 .00E -03 G 05 0 1 .00E +00 A irln e G ro u n d Sy te ms s us er 1 .00E +00 U n u a th o riz e dEx te rn a l Ac c e s to A N Ho s t A 04 8 A u th o riz e d Ex te rn a l Ac c e s to A N Ho s t G 1 02 1 .00E -05 G 1 06 1 .00E +00 F lig h tC re w A 01 5 G1 1 1 1 .00E +00 1 .01 E -03 A NHo s tS e rv ic e P ro v id e r A irln e G ro u n d Sy te ms s us er A 06 1 A 06 1 A 04 8 1 .00E -03 1 .00E -03 1 .00E -05 A NHo s tS e rv ic e P ro v id e r C a b in c re w A 06 1 A 02 7 1 .00E -03 A NHo s tS e rv ic e P ro v id e r 1 .00E -09 C a b in c re w A 02 9 1 .00E -09 Ex te rn a lA c c e s P o p u la tio n G 02 6 Ma in te n a n c e A 01 5 1 .01 E -03 An y one Pa g e 1 Pa g e 1 Pa g e 1 F lig h tC re w 1 .00E -05 Pa s enger A 1 03 1 .00E -05 1 .00E +00 G a te in l k N e tw o rk cus to me r Let us show the potential consequences of an attack by someone who has access to the Gatelink Network. In the software used to generate this vent tree, this is done by setting the (single) basic event to "true". The software then propagates that wherever in the tree the it is connected. A 02 7 A 04 4 1 .00E -05 Ma in te n a n c e A 02 9 1 .00E +00 Pa s enger A 1 03 1 .00E -05 A irln e G ro u n d Sy te ms s us er A 04 8 1 .00E +00 G e n e ra l A 1 04 1 .00E -05 1 .00E +00 In c o re c tT a k e -o f In fo d is pa l y edo t p ilo t N E WT O P 9 .00E -05 C o ru p te d O n b o a rd E F B G 008 Co h e e r n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d in E F B C o ru p te d s o ftw a re ru n n in g in E F B G 001 G 002 Pa g e 1 5 .00E -05 8 .00E -05 C o h e re n tly C o ru p te d In te rn a lP e e rDa ta in E F B (N O T A M/We a th e r, F MS L & B ) C o ru p te d A irln e L & B D a ta in E F B G 05 2 2 .00E -05 F lig h C t re w e n te rs c o ru p te d d a ta in to EFB G 006 6 .00E -05 G 007 8 .00E -05 1 .00E -09 Pa g e 1 C o ru p te d Da a t bas e /C h a rtU p lo a d fro mMa s Me d ia P o rt C o h e re n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d fro mn e tw o rk in te rfa c e G 08 5 G 06 0 2 .00E -05 C o ru p te d A p p lic a tio n /P la tfo rm U p lo a d F ro mMa s Me d ia P o rt In e t rn a lP e e rDa ta In te g rity Ch e c k F a ilu re C o ru p te d In te rn a l P e e rD a ta in EF B (N O T A M/We a th e r,F MS L &B) Co h e e r n tly C o ru p te d D a ta b a s e /C h a rtlo a d e d in E F B F lig h tC re w G 05 8 G 005 G 001 A 01 5 G 05 4 8 .00E -05 2 .00E -05 6 .00E -05 1 .00E +00 8 .00E -05 1 .00E -09 Pa g e 1 Pa g e 1 Ac c e s to Ma s Me d ia P o rt C o ru p te d O fb o a rd D a ta b a s e /C h a rtD a ta G 01 7 G 07 5 2 .00E -05 D a ta b a s e /C h a rt In te g rity Ch e c k F a ilu re C o ru p te d Da a t bas e /C h a rtU p lo a d D a ta flo w fro mA irln e Ac c e s to Ma s Me d ia P o rt C o ru p te d O fb o a rd A p p lic a tio n /P la tfo rm D a ta In e t n r a lP e e rDa ta In te g rity Ch e c k By pas ed In e t n r a lP e e rDa ta In te g rity Ch e c k C o mp ro mis e d (fa ilu re o rlo s o fs e c u rity d a ta G 07 4 G 01 7 G 05 6 G 06 9 G 07 0 G 06 8 1 .00E +00 8 .00E -05 1 .00E +00 2 .00E -05 Pa g e 1 Ac c e s to O n b o a rd E F B 1 .00E +00 5 .00E -05 Ac c e s to A irc ra ft N e tw o rk D a ta b a s e /C h a rt In te g rity Ch e c k C o mp ro mis e d (fa ilu re o rlo s o fs e c u rity d a ta ) G 04 2 2 .00E -05 1 .00E -05 Pa g e 1 Ac c e s to D a ta b a s e /C h a rt Da a t flo w o rT o o ls G 07 5 An y one G 07 6 Pa g e 1 1 .00E +00 1 .00E +00 Pa g e 1 C o ru p te d O fb o a rd D a ta b a s e /C h a rtD a ta G 05 9 7 .00E -05 G1 2 3 1 .00E +00 Pa g e 1 D a ta b a s e /C h a rt In te g rity Ch e c k By pas ed G 01 0 U n in te n d e d a c c e s to EFBn e w t o rk n i te fa r ce G 09 6 1 .00E -05 G 008 Pa g e 1 Pa g e 1 1 .00E +00 Pa g e 1 Pa g e 1 C o ru p te d O n b o a rd E F B G 02 6 1 .00E +00 5 .00E -05 Pa g e 1 C o ru p te d O n b o a rd E F B Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s G 008 G 06 4 Pa g e 1 Pa g e 1 5 .00E -05 2 .00E -05 An y one Ac c e s to D a ta b a s e /C h a rtU p lo a d D a ta flo w G 02 6 G 07 9 1 .00E +00 Pa g e 1 1 .00E +00 Pa g e 1 U n a u th o riz e da c c e s to A irln e g ro u n d te m y s G 06 5 U n in te n d e d a c c e s to E F B n e tw o rk in te rfa c e G 06 6 G1 2 3 1 .00E -05 Ac c e s to A irc ra ft N e tw o rk G 09 6 1 .00E +00 1 .00E +00 Pa g e 1 A irln e g ro u n d s te m y acces fa ilu re G 06 7 1 .00E -05 O fb o a rd P o p u la tio n A irln e G ro u n d Sy te ms s us er G 09 4 A 04 8 1 .00E +00 C o ru p e t d O fb o a rd EFB G 06 4 G 01 1 2 .00E -05 C o ru p te d O th e r Ex te rn a lD a ta flo w fro mO th e rE x te rn a l S o u rc e Ac c e s to O n b o a rd E F B G 01 2 2 .00E -05 E F B C o ru p te d th ro u g h n e tw o rk in te ra c tio n s G 01 0 Pa g e 1 1 .00E -05 G1 1 9 2 .00E -05 1 .00E -05 Pa g e 1 A u th o riz edacc es to A irln e g ro u n d s te m y 1 .00E -05 Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s Ac c e s to A irln e N e tw o rk Ac c e s to G a te lin k N e tw o rk Ac c e s to o fb o a rd EFB F a ilu re to p re v e n t unas es e d d a ta flo w N o n -c re w , nonm - a in te n a n c e A u th o riz edacc es to EFBp h y ic a lmo u n tin s a irc ra ft E F B n o tro b u s to n e tw o rk in p u ts G 02 1 G 02 0 G 08 9 G 1 05 G 08 6 G 03 3 G1 2 0 Pa g e 1 1 .02 E -03 1 .00E +00 2 .00E -05 1 .00E -05 1 .00E +00 2 .00E -05 Ac c e s to E F B n e tw o rk in te rfa c e G1 2 1 1 .00E -05 1 .00E +00 Pa g e 1 U n a u th o riz e da c c e s to A irln e N e tw o rk A u th o riz e d Acc e s to A irln e N e tw o rk G 04 5 1 .00E -05 U n a u th o riz e da c c e s to G a te lin k N e tw o rk G 04 6 1 .00E -03 A u th o riz edacc es to G a te lin k N e tw o rk G 03 9 2 .00E -05 U n a u th o riz e da c c e s to o fb o a rd E F B G 04 0 1 .00E +00 A u th o riz edacees to o fb o a rd E F B A irln e G ro u n d Sy te ms s us er G 09 2 A 04 8 G 09 1 1 .00E +00 1 .00E -05 1 .00E -05 Pa s enger F lig h tC re w Ma in te n a n c e Ac c e s to In te rn a l P e e rD a ta flo w A 01 5 A 02 9 G 08 8 A 1 03 1 .00E -05 1 .00E +00 1 .00E -09 1 .00E -05 Ac c e s to D a ta b a s e /C h a rt Da a t flo w o rT o o ls G 07 6 1 .00E +00 Pa g e 1 U n in te n d e d a c c e s to E F B n e tw o rk in te rfa c e G1 2 3 Pa g e 1 1 .00E +00 P a g e 1 1 .00E +00 Pa g e 1 A irln e N e tw o rk acces fa ilu re An y one Ac c e s to A irln e o p e ra tio n s g ro u n d te m y s G a te lin k N e tw o rk acces c o n tro l fa ilu re O fb o a rd P o p u la tio n Ac c e s to A irln e N e tw o rk G a te in l k N e tw o rk cus to me r G 08 7 G 02 6 G 06 4 G 04 1 G 09 4 G 02 1 A 04 4 1 .00E -03 1 .00E +00 Pa g e 1 2 .00E -05 Pa g e 1 1 .00E +00 1 .00E +00 Pa g e 1 1 .02 E -03 O fb o a rd E F B a c c c e s fa ilu re G 09 3 1 .00E +00 O fb o a rd P o p u la tio n F lig h tC re w Ma in te n a n c e A NHo s tS e rv ic e P ro v id e r G 09 4 A 01 5 A 02 9 A 06 1 Pa g e 1 1 .00E -05 P a g e 1 1 .00E +00 1 .00E -09 1 .00E -05 G e n e ra l C a b in c re w A 1 04 1 .00E -03 Ac c e s to A irc ra ft N e tw o rk A 02 7 1 .00E +00 Pa g e 1 G a te in l k N e tw o rk cus to me r Ma in te n a n c e G a te in l k N e tw o rk cus to me r A 04 4 A 02 9 A 04 4 1 .00E +00 1 .00E -05 G e n e ra l 1 .00E +00 Pa g e 1 G 04 3 1 .00E +00 1 .00E +00 Ex te rn a lA c c e s to A N Ho s t A 06 1 G 1 01 1 .00E +00 G 09 6 1 .00E +00 Ac c e s to A N Ho s t A N H o tS sev r ic e P ro v d i er A 1 04 G 09 6 Pa g e 1 Pa g e 1 Pa g e 1 1 .00E -05 Ac c e s to A irc ra ft N e tw o rk 1 .00E -03 O n b o a rd P o p u la tio n G 05 0 1 .00E +00 A irln e G ro u n d Sy te ms s us er 1 .00E +00 U n u a th o riz e dEx te rn a l Ac c e s to A N Ho s t A 04 8 A u th o riz e d Ex te rn a l Ac c e s to A N Ho s t G 1 02 1 .00E -05 G 1 06 1 .00E +00 G1 1 1 1 .00E +00 1 .01 E -03 A NHo s tS e rv ic e P ro v id e r A NHo s tS e rv ic e P ro v id e r A irln e G ro u n d Sy te ms s us er A 01 5 A 06 1 A 06 1 A 04 8 C a b in c re w A 02 7 1 .00E -03 1 .00E -03 1 .00E -05 A N H o tS sev r ic e P ro v d i er C a b in c re w A 06 1 A 02 7 1 .00E -03 F lig h tC re w 1 .00E -09 A 02 9 1 .00E -09 Ex te rn a lA c c e s P o p u la tio n G 02 6 Ma in te n a n c e A 01 5 1 .01 E -03 An y one Pa g e 1 Pa g e 1 Pa g e 1 F lig h tC re w 1 .00E -05 Pa s enger A 1 03 1 .00E -05 1 .00E +00 G a te in l k N e tw o rk cus to me r A 04 4 1 .00E -05 Ma in te n a n c e A 02 9 1 .00E +00 Pa s enger A 1 03 1 .00E -05 A irln e G ro u n d Sy te ms s us er A 04 8 1 .00E +00 G e n e ra l A 1 04 1 .00E -05 1 .00E +00 In examining the tree, the vulnerabilities allowing the attack to propagate further are: G017: Access to Mass Media Port G068: Database/Chart Integrity Check Failure G093: Offboard EFB access G105: Failure to prevent unassessed dataflow G058: Internal Peer Data Integrity Check Failure G120: EFB not robust to network inputs would allow the attacker from physically uploading corrupt data into the EFB. would allow the attacker to use his access to Gatelink to corrupt the upload dataflow into the EFB would allow the attacker to directly corrupt the EFB when it is not mounted onboard would allow the attacker to use an undocumented and unevaluated external dataflow to the EFB would allow the attacker to use his access to Gatelink to access the Aricraft Network and corrupt the internal dataflow into the EFB would allow the attacker to directly hack into the EFB either by spoofing the external dataflow with malicious packets, or by accessing the Aircraft Network through an unprotected Aircraft Host with an external access and hacking the EFB through it. 2.2.7.1.2 Cutsets The process above- examine the tree for each possible attack vector- can be tedious and can lead to overlooking possible attack scenarios. However, standard event tree software can also generate a complete set of cutsets, which are the enumeration of the sets of possible events that would cause the top-level events. In this example, the complete cutset report is as follows: # 1 2 3 Event A027 A029 A044 Description Cabin crew Maintenance Gatelink Network customer Event Description G059 4 A044 G067 5 A044 Gatelink Network customer Gatelink Network customer Database/Chart Integrity Check Compromised (failure or loss of security data) Airline ground system access failure 6 A044 G093 7 A044 G105 Failure to prevent unassessed dataflow 8 A044 G120 EFB not robust to network inputs 9 A048 10 A103 Gatelink Network customer Gatelink Network customer Gatelink Network customer Airline Ground Systems user Passenger Internal Peer Data Integrity Check Compromised (failure or loss of security data Offboard EFB acccess failure G059 11 A103 Passenger G070 12 A103 13 A103 14 A104 Passenger Passenger General G105 G120 G059 15 A104 16 A104 General General G067 G070 17 18 19 20 A104 A104 A104 A061 General General General AN Host Service Provider G093 G105 G120 G059 21 A061 AN Host Service Provider AN Host Service G067 Database/Chart Integrity Check Compromised (failure or loss of security data) Internal Peer Data Integrity Check Compromised (failure or loss of security data Failure to prevent unassessed dataflow EFB not robust to network inputs Database/Chart Integrity Check Compromised (failure or loss of security data) Airline ground system access failure Internal Peer Data Integrity Check Compromised (failure or loss of security data Offboard EFB acccess failure Failure to prevent unassessed dataflow EFB not robust to network inputs Database/Chart Integrity Check Compromised (failure or loss of security data) Airline ground system access failure G070 Internal Peer Data Integrity Check 22 A061 G070 Provider 23 A061 24 A061 25 A061 26 A015 AN Host Service Provider AN Host Service Provider AN Host Service Provider Flight Crew G093 Compromised (failure or loss of security data Offboard EFB acccess failure G105 Failure to prevent unassessed dataflow G120 EFB not robust to network inputs The Self-Protection Architecture does not provide layered protection, so the vulnerabilities are single-layered. In a layered architecture (see Section 2.2.9), the cutsets will involve more than one vulnerability. 2.2.7.1.3 Threat Scenarios and Risk Assessment The Cutset Report can then be used to generate the Threat Scenarios with a Risk Assessment. Note: The Security Level is an attribute of a particular item, system, or security countermeasure. So it is a design variable and is not determined by the risk assessment, but is an input to the risk assessment. Threat Populations Someone with uncontrolled access to the Gatelink Network or to an Aircraft Host corrupts the Database/Chart upload Gatelink Network customer, AN Host Service Provider, Passengers, and General General Someone unauthorized corrupts the Database/Chart within the Airline Ground System Someone with uncontrolled access to the Gatelink Network or to an Aircraft Host corrupts the EFB data from an EFB Peer aircraft host Someone unauthorized corrupts the EFB while it is offboard Someone with undocumented (or unassessed) remote access to the EFB corrupts the EFB Someone with uncontrolled access to the Gatelink Network or to an Aircraft Host hacks the EFB Network Interface and corrupts the EFB Someone with authorized access corrupts the EFB Gatelink Network customer, AN Host Service Provider, Passengers, and General General Security Countermsr Database Upload Integrity Check Vulnerability Attck Likehd pV S L C Threat Likehd pIII Impact Risk III Low Airline Ground System Access Control EFB Internal Dataflow Integrity Check Airline ground system access failure Internal Peer Data Integrity Cryptographically Compromised pV C pIII III Low pV C pIII III Low Offboard EFB Access Control pV C pIII III Low pV C pIII III Low pV C pIII III Low pIII pIII III Low Database/Chart Integrity Cryptographically Compromised General Control of EFB configuration Gatelink Network customer, AN Host Service Provider, Passengers, and General Flight Crew, Cabin Crew, Maintenance, Airline Administration Robust EFB network stack Offboard EFB access control failure Failure to prevent unassessed dataflow EFB not robust to network inputs N/A Inherent 2.2.8 Assessment of Delegation Architecture (incomplete) We assume the following security countermeasures have been added to the EFB Function (see section 2.2.6.1 for additional information on each countermeasure). <integrity check include authentic part and unchanged> The first two are the same as the countermeasures for the Self-Protection Architecture because they involve threats that are external to the Aircraft. Countermeasure 1: Trust Airline Organization to protect offboard EFB Countermeasure 2: Integrity Check on Dataflow from Airline. Countermeasure 3: Use security domain to control access to EFB Aircraft Network Interface and to data flowing from EFB Peers Countermeasure 4: No direct remote dataflow access to EFB, use communications proxy to support external dataflows (e.g. a VPN server). Countermeasure 5: domain. Forbid unintended external dataflows into or out of the security 2.2.8.1.1 Threat Scenarios and Risk Assessment The Cutset Report was used to generate the Threat Scenarios with a Risk Assessment. Threat Populations Someone with uncontrolled access to the Gatelink Network corrupts the Database/Chart upload Gatelink Network customer Someone unauthorized corrupts the Database/Chart within the Airline Ground System Someone with uncontrolled access to the Gatelink Network or to an Aircraft Host hacks a security domain boundary host and corrupts the EFB data from an EFB Peer aircraft host Someone unauthorized corrupts the EFB while it is offboard General General Offboard EFB Access Control Someone with unintended remote access to the EFB compromises a security domain boundary host and corrupts the EFB General Security domain boundary control host Someone with uncontrolled access to the intended EFB remote dataflow hacks the Communications Manager and corrupts the EFB data from an EFB Peer aircraft host Gatelink Network customer, AN Host Service Provider, Passengers, and General Com Manager for EFB Gatelink Network customer, AN Host Service Provider, Passengers, and General Security Countermsr Database Upload Integrity Check Airline Ground System Access Control Security domain boundary control host Vulnerability Attck Likehd pV S L C Threat Likehd pIII Impact Risk III Low pV C pIII III Low pV C pIII III Low Offboard EFB access control failure Security domain access failure pV C pIII III Low pV C pIII III Low Com Mgr not robust to network inputs pV C pIII III Low Database/Chart Integrity Cryptographicall y Compromised Airline ground system access failure Security domain access failure 2.2.9 Assessment of Layered Protection Architecture (incomplete) Countermeasure 1: Trust Airline Organization to protect offboard EFB Countermeasure 2: In design and development, forbid all other external dataflows that have not been assessed with an acceptable risk level. Countermeasure 3: Integrity Check on Dataflow from Airline. Countermeasure 4: EFB network stack is robust with respect to network interactions. Countermeasure 5: Integrity Check on Dataflow from EFB Peers Countermeasure 6: Use security domain to control access to EFB Aircraft Network Interface and to data flowing from EFB Peers Countermeasure 7: No direct remote dataflow access to EFB, use communications proxy to support external dataflows (e.g. a VPN server). Countermeasure 5: domain. Countermeasure 3: Forbid unintended external dataflows into or out of the security Countermeasure 4: interactions. EFB network stack is robust with respect to all network Countermeasure 5: Integrity Check on Intended Dataflow from EFB Peers Forbid unintended external dataflows in EFB applications. 2.2.9.1.1 Cutsets 3 Appendix 3.1 Self-Protection Threat Tree Detail Threat trees serve four functions within Part 2: Manage of complex multi-stage attacks. Demonstrate completeness of security architecture (or determine gaps). Generate threat scenarios. Allocate risk when multiple security layers are present. For the self-protection architecture, multiple layers are not present, so demonstration of the fourth function will wait. We will show the threat tree in a tops-down fashion. The top level threat can be caused by any of six more specific threat conditions depending on the target of the attack. These are: A database or chart loaded on the EFB has been coherently corrupted (in a manner bypassing any standard CRC checks) at some point. A software part loaded on the EFB and being executed by the EFB has been coherently corrupted at some point. Data passed to the EFB from another aircraft host (e.g. FMS, Navigation System) and that is being used by an EFB application has been coherently corrupted at some point. Load and Balance data passed to the EFB from an airline ground system has been coherently corrupted at some point. The EFB has been corrupted through a direct hacking attack or by infection by malware. The Flight Crew has used the EFB User Interface to enter corrupted data or bypassed a check. Note: An implicit assumption here is that only the flight crew has access to the user interface due to the physical security of the cockpit. This assumption is part of the external trust relationships discussed in Sections 2.1.2.1 and 2.1.2.4. Incorrect Take-off Info displayed to pilot NEWTOP Corrupted Onboard EFB Coherently Corrupted Internal Peer Data in EFB (NOTAM /Weather, FM S L&B) G008 G052 Page 2 Page 46 Coherently Corrupted Database/Chart loaded in EFB Corrupted Airline L&B Data in EFB G001 G006 Page 25 Page 50 Corrupted software running in EFB Flight Crew enters corrupted data into EFB G002 G007 Page 43 Page 51 3.1.1 Coherently Corrupted Software This example assumes that software can only be uploaded through the Mass Media Port (although running software could be corrupted through the network interface, see the threat of a "Corrupted Onboard EFB"). Corrupted software running in EFB G002 Page 1 2.00E-05 Corrupted Application/Platform Upload From M ass M edia Port G054 2.00E-05 Page 44 Corrupted Application/Platform Upload From M ass M edia Port G054 Page 43 2.00E-05 Access to M ass M edia Port Corrupted Offboard Application/Platform Data G017 G056 2.00E-05 Page 27 1.00E+00 Page 45 At this point, we are not assuming any safeguards involving the software loading itselfthere are avionics boxes that do their own checking of their software before loading it into persistent storage, but Class 2 EFBs are typically not designed for that. Corrupted Offboard Application/Platform Data Page 44 G056 1.00E+00 Anyone G026 1.00E+00 Page 19 In the absence of any special design features, anyone with access to the onboard EFB has access to its ports, but access to onboard EFBs is controlled (note that the threat posed from access to an offboard EFB is covered under the top-level "corrupted onboard EFB" threat condition). Access to M ass M edia Port Page 26 Page 44 G017 2.00E-05 Access to Onboard EFB G010 2.00E-05 Page 10 Note that unauthorized access to the onboard EFB is not included within the scope of this security assessment, because access to the onboard EFB is limited by the cockpit physical security context (see Section 2.1.2.1). The only exposed population is the flight crew, cabin crew, and maintenance. Access to Onboard EFB G010 Page 2 Page 27 2.00E-05 Authorized access to EFB physical mount in aircraft G033 2.00E-05 Page 11 Authorized access to EFB physical mount in aircraft G033 Page 10 2.00E-05 Flight Crew M aintenance A015 A029 1.00E-09 1.00E-05 Cabin crew A027 1.00E-05 3.1.2 Coherently Corrupted Internal Peer Data In this example, data that is passed to the EFB from other aircraft systems are loaded through a dataflow on the aircraft network. The EFB peers themselves are already subject to assessment and so are not considered part of this security assessment (but see Section 2.2.6.2). However the aircraft network itself is allowed to include aircraft hosts that are "Level E" and may have little or no assurance associated with them, nor are we assuming any countermeasures that would prevent them from having external remote connections. Hence the desire to have the EFB "self-protecting" requires the security architecture to include some form of integrity check on the internal peer dataflow. So we have Countermeasure 5, Integrity Check on Dataflow from EFB Peers as defined in Section 2.2.6.4 and discussed in further detail in Section 2.2.6.1. As a result of this countermeasure, the threat condition where a corrupted database/chart has been accepted and loaded by the EFB requires an attack on the integrity check and the ability to inject the corrupted data into the dataflow. Coherently Corrupted Internal Peer Data in EFB (NOTAM /Weather, FM S L&B) G052 Page 1 6.00E-05 Internal Peer Data Integrity Check Failure Corrupted Internal Peer Data in EFB (NOTAM /Weather, FM S L&B) G058 G005 6.00E-05 Page 47 1.00E+00 Page 49 As before in Section 3.1.1, failure in the integrity check is either due to Vulnerability to a cryptographic attack Vulnerability to a bypass attack directly on the source or destination Internal Peer Data Integrity Check Failure G058 Page 46 6.00E-05 Internal Peer Data Integrity Check Bypassed Internal Peer Data Integrity Check Compromised (failure or loss of security data G069 G070 5.00E-05 1.00E-05 Page 48 The source and destination are the EFB and the EFB peer. Since the EFB peer is out of scope (see above), this leaves the possibility of an attack on the EFB itself, which is considered in Section 3.1.6 on "Corrupted Onboard EFB". Internal Peer Data Integrity Check Bypassed Page 47 G069 5.00E-05 Corrupted Onboard EFB G008 5.00E-05 Page 2 Access to the internal dataflow itself means that the attack can either affect the dataflow across the Aircraft Network, or can directly access the EFB Network Interface (which is the same thing, in the absence of any aircraft network security countermeasures as are discussed in the Delegated Protection Architecture.). Corrupted Internal Peer Data in EFB (NOTAM /Weather, FM S L&B) G005 Page 46 1.00E+00 Access to Aircraft Network Unintended access to EFB network interface G096 G123 1.00E+00 1.00E+00 Page 15 Page 24 Because this is the "Self-Protection" architecture, we are not assuming there are any internal protections preventing any host on the Aircraft Network from sending packets to the EFB Network interface (this assumption is changed in the "Delegated Protection" architecture defined in Section 2.2.6.3). Since we are also not forbidding unprotected hosts from accessing the Aircraft Network (another countermeasure added to the "Delegated Protection" architecture), this means that access to the Aircraft Network allows access to the EFB Network Interface. Unintended access to EFB network interface Page 13 Page 49 Page 36 G123 1.00E+00 Access to Aircraft Network G096 1.00E+00 Page 15 For the same reason, we assume that access to any host allows access to the Aircraft Network. Access to Aircraft Network G096 Page 14 Page 24 Page 49 ... see x-ref 1.00E+00 Access to AN Host G043 1.00E+00 Page 16 Finally, access to hosts comes either because someone is onboard the aircraft who has a legitimate right to access a host, or because they have external access to an aircraft host. Access to AN Host G043 Page 15 1.00E+00 Ext ernal Access to AN Host Onboard Population G101 G050 1.00E+00 Page 17 1.00E+00 Page 22 One of the assumptions of this design example is that Passengers have some form of access to an onboard system, even if only the IFE. Again, since the "Self-Protection" architecture does not assume any non-EFB assurances, the passengers are included as a threat source population. Onboard Population G050 Page 16 1.00E+00 Flight Crew M aintenance A015 A029 1.00E-09 1.00E-05 AN Host Service Provider Cabin crew A061 A027 1.00E-03 1.00E-05 Passenger A103 1.00E+00 As before, External Access is either Authorized or Unauthorized. Ext ernal Access to AN Host G101 Page 16 1.00E+00 Unuathorized Ext ernal Access to AN Host Authorized Ext ernal Access to AN Host G102 G106 1.00E+00 1.01E-03 Page 18 Page 20 Authorized includes the usual populations. Authorized External Access to AN Host Page 17 G106 1.01E-03 External Access Population G111 1.01E-03 Page 21 Ext ernal Access Population G111 Page 20 1.01E-03 AN Host Service Provider Airline Ground Systems user A061 A048 1.00E-03 1.00E-05 However, since we are not assuming any controls on external access to the other hosts, we are forced to admit Anyone as a potential attacker without any additional countermeasures. Unuathorized External Access to AN Host Page 17 G102 1.00E+00 Anyone G026 1.00E+00 Page 19 3.1.3 Coherently Corrupted Database/Chart In this example, the databases and charts can be loaded through two main dataflows Directly loaded through the mass media port of the EFB Remotely loaded through the EFB network interface from Airlines Operations through the Gatelink interface to the Aircraft Network Coherently Corrupted Database/Chart loaded in EFB G001 Page 1 Page 50 8.00E-05 Corrupted Database/Chart Upload from M ass M edia Port Coherently Corrupted Database/Chart loaded from network interface G085 G060 2.00E-05 Page 26 8.00E-05 Page 29 Because the remote dataflow includes non-proprietary network hosts and the desire to have the EFB "self-protecting", the security architecture includes some form of integrity check on the database/charts. This could be a digital signature integrity-only check, or integrity/encryption, or a VPN link hosted on the EFB itself- at this stage we are only concerned in determining how critical the strength of that integrity check is to the overall EFB safety-related security risk. So we have Countermeasure 4, Integrity Check on Dataflow from Airline, as defined in Section 2.2.6.4 and discussed in further detail in Section 2.2.6.1. As a result of this countermeasure, the threat condition where a corrupted database/chart has been accepted and loaded by the EFB is caused by a weakness in the integrity check and corruption in the database/chart itself. (Suppose for example a weak key sequence algorithm was used that could be predicted. That is a defect in the integrity check countermeasure. In addition, the attacker needs access to the dataflow itself to insert a false database using the guessed integrity keys.) Coherently Corrupted Database/Chart loaded from network interface G060 Page 25 8.00E-05 Database/Chart Integrity Check Failure Corrupted Database/Chart Upload Dataflow from Airline G068 G074 8.00E-05 1.00E+00 Page 30 Page 35 In general, integrity checks on dataflows can fail for one of two causes. Either the integrity protection on the dataflow packets is vulnerable to a cryptographic attack, Or the integrity check was bypassed through compromise of the source or the destination of the dataflow. Database/Chart Integrity Check Failure G068 Page 29 8.00E-05 Database/Chart Integrity Check Bypassed Database/Chart Integrity Check Compromised (failure or loss of security data) G042 G059 7.00E-05 1.00E-05 Page 31 Bypassing can either happen by an attacker attacking the EFB itself, or by attacking the ground systems where the remote dataflow originated. (There are more complicated ground architectures involving proxy VPN connections and so on. For this example, we look at the criticality at the point where the dataflow leaves the responsibility of the ground system.) Database/Chart Integrity Check Bypassed G042 Page 30 7.00E-05 Corrupted Onboard EFB Access to Airline operations ground syst em G008 G064 5.00E-05 Page 2 2.00E-05 Page 32 Note that the corrupted onboard EFB has already been noted as an important threat condition in and of itself. Such interdependence between threat conditions is endemic in analyzing complex attack scenarios and handling it is one of the advantages of the threat tree method. At any rate, we will defer further analysis of that threat until later in Section 3.1.6. Consideration of access to the Airline Ground System shows a very common motif in access control security countermeasures- one needs to consider authorized access and the possibility of unauthorized access. Access to Airline operations ground syst em G064 Page 31 Page 23 Page 39 2.00E-05 Unauthorized access to Airline ground syst em Authorized access to Airline ground syst em G065 G066 1.00E-05 1.00E-05 Page 33 Page 34 Authorized access is defined through the threat source population with access (see Section 2.2.4.1. Authorized access to Airline ground system Page 32 G066 1.00E-05 Airline Ground Systems user A048 1.00E-05 Unauthorized access occurs when access control fails and results in exposure to a larger set of threat source populations. Unauthorized access to Airline ground syst em G065 Page 32 1.00E-05 Airline ground syst em access failure Offboard Population G067 G094 1.00E-05 1.00E+00 Page 6 Offboard Population G094 Page 5 Page 33 Page 41 1.00E+00 Gatelink Network cust omer M aintenance A044 A029 1.00E+00 1.00E-05 General AN Host Service Provider A104 A061 1.00E+00 1.00E-03 Airline Ground Systems user A048 1.00E-05 Note that a more detailed analysis could attempt to discriminate between the types of population that failure of the on-ground access control would expose the EFB to, but that unless there is a specific assurance that a particular population is excluded, it is important to cast a wide net. Now we go back to the threat that someone is able to corrupt the database/chart dataflow in the first place. Formally, this requires both electronic access to the dataflow path (so as to be able to inject the corrupted data), and the ability to maliciously manipulate a database-- Corrupted Database/Chart Upload Dataflow from Airline G074 Page 29 1.00E+00 Corrupted Offboard Database/Chart Data Access to Database/Chart Dataflow or Tools G075 G076 1.00E+00 1.00E+00 Page 28 Page 23 However, we do not intend to take any assurance credit for "security through obscurity", so we will be assuming that most any attacker will be able to maliciously manipulate a database in such a way that the EFB will try to run it in the absence of the additional integrity checks we've already considered. Corrupted Offboard Database/Chart Data Page 35 Page 26 G075 1.00E+00 Anyone G026 1.00E+00 Page 19 Anyone Page 18 Page 38 Page 28 ... see x-ref G026 1.00E+00 Flight Crew AN Host Service Provider A015 A061 1.00E-09 1.00E-03 Cabin crew Gatelink Network customer A027 A044 1.00E-05 1.00E+00 M aintenance Passenger A029 A103 1.00E-05 1.00E+00 Airline Ground Systems user General A048 A104 1.00E-05 Electronic access to the dataflow itself is more interesting. 1.00E+00 Access to Database/Chart Dataflow or Tools Page 35 Page 13 G076 1.00E+00 Access to Database/Chart Upload Dataflow Access to Airline operations ground syst em G079 G064 1.00E+00 Page 36 2.00E-05 Page 32 Note that we've already considered "Access to Airline operations" above- this is yet another example of the complexity of threat scenarios, and that is managed correctly by standard Event Tree tools. Electronic access to the dataflow is dependent on the network topology, but we classify it into the dataflow path from the ground system tool through the Airline network to the Gatelink network to the onboard Aircraft network to the EFB network interface itself. Access to Database/Chart Upload Dataflow G079 Page 23 1.00E+00 Unintended access to EFB network interface Access to Airline Network G123 G021 1.00E+00 1.02E-03 Page 24 Page 37 Access to Aircraft Network Access to Gatelink Network G096 G020 1.00E+00 Page 15 1.00E+00 Page 40 Note that there might be public links to go from the Airline network to the Gatelink network, but since we are considering the Gatelink Network itself as being essentially uncontrolled (see the entry in Section 2.2.4.1), there is no additional benefit in modeling that as well. The resulting internal threat to the dataflows is included within the " Coherently Corrupted Internal Peer Data" top-level threat in Section 3.1.2. Unintended access to EFB network interface G123 Page 13 Page 49 Page 36 1.00E+00 Access to Aircraft Network G096 1.00E+00 Page 15 Now having covered the on-board attacks on the Database Upload Dataflow, there still remain the off-board attacks, through the Gatelink Network, and the Airline Network. The Gatelink Network has the usual access threats Access to Gatelink Network G020 Page 36 1.00E+00 Unauthorized access to Gatelink Network Authorized access to Gatelink Network G039 G040 1.00E+00 Page 41 1.00E+00 Page 42 The authorized population consists of the Airline customer itself, and all the other potential Gatelink customers. The Airline Network appears in two roles in this subtree- as a direct threat to the dataflow (since the dataflow passes through the Airline Network) and as an indirect threat to access the Gatelink Network and then pose a direct threat to the dataflow. Authorized access to Gatelink Network G040 Page 40 1.00E+00 Access to Airline Network Gatelink Network cust omer G021 A044 1.02E-03 1.00E+00 Page 37 The unauthorized population consists of anyone who is not on-board the aircraft itself. (already discussed above). Note that some form of Gatelink Access Control is included here. Unauthorized access to Gatelink Network G039 Page 40 1.00E+00 Gatelink Network access control failure Offboard Population G041 G094 1.00E+00 1.00E+00 Page 6 The Airline Network has a similar threat tree- authorized and unauthorized access. Access to Airline Network G021 Page 36 Page 42 1.02E-03 Unauthorized access to Airline Network Authorized Access to Airline Network G045 G046 1.00E-03 2.00E-05 Page 38 Page 39 In this example, authorized access is only for the Airline Operation Ground System. More complex analysis can be done if additional detail into the internal security architecture of the Airline Organization is found to be needed. The Airline Operations Ground System has already been analyzed above since they also own the source of the dataflow itself. Authorized Access to Airline Network Page 37 G046 2.00E-05 Access to Airline operations ground system G064 2.00E-05 Page 32 Unauthorized access has the usual structure, and we assume here that if the access controls fails, anyone might get access. Unauthorized access to Airline Network Page 37 G045 1.00E-03 Airline Network access failure Anyone G087 G026 1.00E-03 1.00E+00 Page 19 The last top-level threat involving the Database/Chart was the threat that a corrupted database is loaded directly into the EFB through the Mass Media Port. This threat is identical to the threat of corrupted software being loaded directly into the EFB through the Mass Media Port and will be considered in the next section. 3.1.4 Corrupted Airline Load and Balance Data The assumption in this design example is that Load and Balance data from the Airline Organization is subject to the same basic threats as the Database/Charts, and while it is certainly possible to require different channels and tools in practice, duplicating the security assessment of the Database/Charts channels and tools is not informative unless the security architecture intends to protect the L&B data in a manner significantly different from the Database/Chart data. Corrupted Airline L&B Data in EFB Page 1 G006 8.00E-05 Coherently Corrupted Database/Chart loaded in EFB G001 8.00E-05 Page 25 3.1.5 Flight Crew Enters Corrupted Data Examination of this threat serves little purpose except to point out an obvious point- that the authorized population is not subject to any security countermeasures other than those that resulted in the selection of that population itself. Otherwise, access to the onboard EFB itself is subject to the Physical Security Context that is part of the external trust relationships discussed in Sections 2.1.2.1 and 2.1.2.4. Flight Crew enters corrupted data into EFB Page 1 G007 1.00E-09 Flight Crew A015 1.00E-09 3.1.6 Corrupted Onboard EFB The threat condition of a corrupted onboard EFB in turn can be due to four threat conditions: The EFB was corrupted while it was offboard. The EFB was corrupted through some external dataflow for an application not already included in the list above (e.g. something other than software parts, database/charts, load and balance, NOTAMS, or weather data). The EFB was corrupted by someone with direct physical access to the EFB onboard. The EFB was corrupted through its network interface (e.g. through IP stack overflow or other network-based attacks.) Corrupted Onboard EFB Page 1 Page 27 Page 48 G008 Corrupted Offboard EFB Access to Onboard EFB G011 G010 Page 3 Page 10 Corrupted Other Ext ernal Dataflow from Other Ext ernal Source EFB Corrupted through network interact ions G012 G119 Page 8 Page 12 We will not assume any self-protection by the off-board EFB, so that access to the offboard EFB is the basic threat. Corrupted Offboard EFB G011 Page 2 Access to offboard EFB G089 Page 4 Access to the offboard EFB can be authorized or unauthorized. Access to offboard EFB Page 3 G089 Unauthorized access to offboard EFB Authorized aceess to offboard EFB G091 G092 Page 5 Page 7 Authorized access to the offboard EFB is only allowed by Maintenance (to administer the EFB) and the Flight Crew (to use the applications as part of preflight). Authorized aceess to offboard EFB G092 Page 4 Flight Crew M aintenance A015 A029 Unauthorized access involves Security Countermeasure 1 added as part of the selfprotection security architecture: Trust Airline Organization to protect offboard EFB. Our goal here is to determine our dependence on the Airline Organization by including the consequences of a potential failure of that countermeasure within our assessment. Potential failure of that countermeasure would result in the offboard EFB being exposed to the general offboard population, which is made up of several populations as documented in Section 2.2.4.1. Unauthorized access to offboard EFB Page 4 G091 Offboard EFB acccess failure Offboard Population G093 G094 Page 6 We have now dealt with the off-board threat to the EFB itself and so we will proceed to look at the on-board threat. There are three sources mentioned above (see the picture for G012). Corruption due to access to the onboard EFB itself Corruption due to someone attacking the network interfaces of the EFB (the onboard hacking threat). Corruption due to some external dataflow to the EFB that hasn't already been explicitly included. Access to the onboard EFB is limited by the cockpit physical security context (see Section 2.1.2.1) so the only exposed population is the flight crew, cabin crew, and maintenance. Corruption of the EFB through its network interface is probably the most complex threat condition, because it involves understanding the circumstance under which anyone might be in a position to touch network packets that are able to touch the EFB network stack. In the Self-Protection Architecture, there are no guarantees external to the EFB that might prevent an attacker from trying to corrupt the EFB through its network interface through buffer overflow attacks, or malicious packets intended to exploit vulnerabilities in the EFB IP stack. So the EFB itself must be robust against such attacks, requiring Countermeasure 3: EFB network stack is robust with respect to network interactions, specified in Section 2.2.6.3 and discussed further in Section 2.2.6.1. EFB Corrupted through network interact ions G119 Page 2 1.00E-05 EFB not robust to network inputs Access to EFB network interface G120 G121 1.00E-05 1.00E+00 Page 13 This countermeasure would not be necessary if access to the EFB network interface were sufficiently safe-guarded, but that is not true for the Self-Protection Architecture, as will be seen in the threat tree. In particular, access to the EFB network interface is available for three classes of access: Intended dataflows from other aircraft hosts to the EFB Intended dataflows from external hosts to the EFB (exemplified here by the Database/Chart Upload Dataflow) Unintended dataflows from any host (including routers and switches) on the same network as the EFB. Access to EFB network interface G121 Page 12 1.00E+00 Access to Internal Peer Dataflow Unintended access to EFB network interface G088 G123 1.00E+00 1.00E+00 Page 14 Page 24 Access to Database/Chart Dataflow or Tools G076 1.00E+00 Page 23 In the absence of aircraft network protections, any host on the aircraft network can potentially touch the internal peer dataflows or the EFB network interface. Access to the Aircraft Network has been discussed under Section 3.1.2, "Coherently Corrupted Internal Peer Data". Access to the external dataflows has been discussed under Section 3.1.3, "Coherently Corrupted Database/Chart". Access to Internal Peer Dataflow Page 13 G088 1.00E+00 Access to Aircraft Network G096 1.00E+00 Page 15 Unintended access to EFB network interface Page 13 Page 49 Page 36 G123 1.00E+00 Access to Aircraft Network G096 1.00E+00 Page 15 Finally, we consider the possibility that the EFB was corrupted through some external dataflow for an application not already included in the list above (e.g. something other than software parts, database/charts, load and balance, NOTAMS, or weather data). This is a general point- the system is potentially vulnerable to any external dataflow including standard network interactions such as DNS service. However, many of these are installation specific and not amenable to a generic analysis such as this design example. What we can do in this example is note that all external dataflows should be included in the Final Assessment and determine the potential vulnerability that an unaccessed dataflow could pose to the EFB. Corrupted Other Ext ernal Dataflow from Other Ext ernal Source G012 Page 2 1.00E+00 Failure to prevent unassessed dataflow Non-crew, non-maintenance G105 G086 1.00E+00 1.00E+00 Page 12 Non-crew, non-maintenance G086 Page 11 1.00E+00 Airline Ground Systems user Gatelink Network cust omer A048 A044 1.00E-05 1.00E+00 EFB Peer Service Provider Passenger A038 A103 1.00E-03 1.00E+00 AN Host Service Provider General A061 A104 1.00E-03 1.00E+00