201812_PocketGuideAutomotiveCSIR
201812_PocketGuideAutomotiveCSIR
Cybersecurity
Incident Response
Pocket Guide
Version 1.0
Preface
The automotive industry is facing new This pocket guide describes the necessary
challenges due to innovative information steps to build up such a process for an
and communication technologies and the Automotive Cybersecurity Incident Response
increasing connectivity of vehicles. The (Automotive CSIR). It provides checklists
security of vehicles and their protection for its implementation and questions for an
against cyber attacks is crucial for the assessment of the Automotive CSIR readiness
acceptance of these technologies and of a company. We hope that this guide helps
customer’s safety. In addition to the managers as well as security experts to
cybersecurity aware development of these improve their Automotive CSIR capabilities.
connected systems, the automotive industry Any feedback to improve this pocket guide
must ensure a fast and effective response on is welcome.
cyber attacks in case of emergency. Therefore,
a properly implemented process for an
Automotive Cybersecurity Incident Response
across the entire supply chain is required.
2
Content
Recommendations 37
3
4
The Automotive
CSIR Process
Definitions, Organisational & Processual Basics 6
5
Definitions
Automotive is an application of the CSIR for automotive products and services, i.e. it applies to products installed in or
Cybersecurity connected with road vehicles and services used by vehicle users. (drivers, passengers, vehicle owners or fleet
Incident owners)
Response The transition from the IT as a product or service for road vehicles to the enterprise IT is usually fluid. Each
(Automotive company must define the demarcation of Automotive CSIR to Enterprise CSIR appropriate to its organisation.
CSIR) Therefore, the concrete definition of automotive cybersecurity incident and thus Automotive CSIR may differ
among companies.The goal of Automotive CSIR is the fast and effective respond to automotive cybersecurity
incidents.
Automotive is a single or series of unwanted or unexpected automotive cybersecurity events that have a significant
Cybersecurity probability of compromising road vehicles, related systems and services and threatening automotive
Incident cybersecurity.For the sake of brevity, the term cybersecurity incident is used in this guide to denote
automotive cybersecurity incident.
Automotive is an identified occurrence of a system, service or network state indicating a possible breach of
Cybersecurity automotive cybersecurity policy or failure of controls, or a previously unknown situation that my
Event be automotive cybersecurity relevant. It might turn out that an automotive cybersecurity event is a
cybersecurity incident.For the sake of brevity, the term cybersecurity event is used in this guide to
denote automotive cybersecurity event.
Vulnerability is a weakness of an asset or control that can be exploited by one or more threats.
Threats is a potential cause of an unwanted cybersecurity incident, which may result in a harm to road users.
6
The Core Activities of Automotive CSIR
First, a company must After registration, a Next, a company must decide Finally, a company should
detect and register the company must assess and which countermeasures learn lessons from the
cybersecurity incident. For classify the cybersecurity to carry out and how to cybersecurity incident and
this purpose, discovered incident. The assessment respond the cybersecurity optimize its Automotive
cybersecurity events, consists of a technical and incident. Although a respond CSIR process. This phase
reported vulnerabilities and business impact analysis. can only be sustainable of the process might
newly identified threats are After this phase, the if the assessment of the trigger a sustainable
registered and forwarded cybersecurity incident is cybersecurity incident product or service
to the responsible technically well understood is completed, some optimization, too.
cybersecurity unit in the and all information of countermeasures should
company. a suitable response are be initiated immediately,
available. especially in case of
emergency.
According the German Federal Office for Information Security (BSI) this includes (IT-Grundschutz-
Kataloge, 2016):
A comprehensive guide on how to plan and prepare Automotive CSIR can be found from page NN.
8
The Automotive CSIR Team
(1/4)
9
The Automotive CSIR Team
(2/4)
The Automotive CSIR Team should possess or as well as organisational-legal expertise and
should have access to the required know- knowledge like:
how for a solid assessment and response
of automotive cybersecurity incidents. This • assessing cybersecurity incidents regarding
includes technical skills like: data protection acts, liability laws, financial
and organisational aspects
• technical analysing of cybersecurity incidents
• initiating non-technical measures like
• assessing the technical impact of communication with authorities, customers
cybersecurity incidents and the public
10
The Automotive CSIR Team
(3/4)
For example, the following persons might join the Automotive CSIR team of an OEM:
Technical Organizational-legal
System architect Member of the committee for product safety
Component manager Data protection officer
IT project manager / product owner Member of the legal department
Application officer Member of the HR department
Member of the PR department
11
The Automotive CSIR Team
(4/4)
The majority of the detected cybersecurity It is the CSIR Team that finishes the detect &
events, cybersecurity incidents, discovered register process by determining the occurrence
vulnerabilities and threats might not be of a cybersecurity incident. The CSIR Team
reported directly to the Automotive CSIR might be extended by further experts during
Team. Instead, many of those issues might the cybersecurity incident processing
be reported to a support organisation, which according the type and criticality of the
forwards them in case of suspicion of a cybersecurity incident.
cybersecurity incident to the CSIR Team.
12
Core Activities
13
Process Reference Model & Process
Performance Indicators for Automotive CSIR
In the following the core activities are described in more detail. For each process, there is an
overview of this activity followed by a formal description according SPICE (ISO/IEC 33020:2015):
Process reference model Process ID The individual processes are described in terms
Process name of process name, process purpose, and process
Process purpose outcomes to define the process reference model.
Process outcomes Additionally a process identifier is provided.
Process performance Base practices A set of base practices for the process providing
a definition of the tasks and activities needed to
indicators accomplish the process purpose and fulfill the
process outcomes.
Output work products A number of output work products associated
with each process.
While the process reference model defines the process and is essential, the process performance
indicators are not obligatory and should be considered only as recommendations for the process
implementation.
14
Detect & Register
(1/5)
The Automotive CSIR process starts with the detection and registration of cybersecurity events,
cybersecurity incidents, vulnerabilities and threats.
15
Detect & Register
(2/5)
16
Detect & Register
(3/5)
Base practices
CSIR.1.BP1 Check for cybersecurity events in systems and products. This activity aims for a systematic analysis of IT
Monitor systems and product-related data that may show intrusion attempts, anomalies in usage, and suspicious network
and services: traffic. It is best supported with tools that allow collecting, centralizing, aggregating, and visualizing
system monitoring data (such as SIEM tools) both in the field and in the IT infrastructure. [OUTCOME 1]
CSIR.1.BP2 Check for cybersecurity-related reports in public information pools, the press and other media. This
Monitor public activity consists of a systematic and periodic analysis of publicly available information on emerging
information pools: threats, new vulnerabilities, and new attack capabilities that are related to the organization’s services
and products. This may be complemented by dedicated threat intelligence services and tools which
actively push this kind of information into the organization. [OUTCOME 1]
CSIR.1.BP3 Accept and register cybersecurity events, cybersecurity incidents, vulnerabilities and threats. This
Accept and activity requires the availability of dedicated contact points that are known publicly and inside the
register incidents: organization. The contact points shall be available 24/7 and allow for initial registration of reports
related to cybersecurity events, cybersecurity incidents, vulnerabilities and threats. The registration
process shall be able to document all incident- or event-related information as well as information on
the reporter (such as their name, phone number, etc.) [OUTCOME 2]
CSIR.1.BP4 Assign reports on cybersecurity events, cybersecurity incidents, vulnerabilities and threats to internal
Assign and forward entities that can further validate, assess and, if required, respond to the reported cybersecurity
incident reports: incident. [OUTCOME 3, 4]
17
Detect & Register
(4/5)
Cybersecurity A cybersecurity incident report is the documentation of a disclosed cybersecurity incident. It contains
incident reports: information on the reporter (such as its name, contact details, etc.), the time (of registration and of
observation), the reporter’s observations of origin, effects and status, and any other information that is
initially available. [OUTCOME 1, 2, 3, 4]
18
Detect & Register
(5/5)
IT operation
Importer
Competitor
Supplier
Service Provider
Bug bounty operator
White Hacker
Public relation
Press/media
Legal department
Authorities
Example of a support organization and an information work flow for detecting and registering automotive cybersecurity
incidents at an OEM (italics: external reporters)
19
Assess & Classify
(1/4)
The Automotive CSIR team must assess the notified or discovered automotive cybersecurity
incident – technically and organisational-legally. It must found and understood the cause of the
cybersecurity incident and analyse the impact.
Analyse risk
The business, safety, legal and operational
impacts of cybersecurity incident are estimated
and classified. Their risks for safety, data
protection and functionality of the vehicles are
assessed.
20
Assess & Classify
(2/4)
21
Assess & Classify
(3/4)
Base practices
CSIR.2.BP1 This activity aims to analyze and assess the technical cause and impact of incidents. Each cybersecurity
Analyze incidents incident report is initially validated and assessed on whether the report contains information on a critical
technically: cybersecurity incidents or whether the reported cybersecurity events require further investigation. If
so, a full technical assessment of the incident is carried out. This includes a technical impact and a root
cause analysis as well as the identification which products or services are affected. [OUTCOME 1,2]
CSIR.2.BP2 Analyze and assess the business, safety, legal and operational impacts and risks of the incidents.
Analyze risks: Business, safety, legal and operational risk assessment and management units should be involved.
[OUTCOME 3]
CSIR.2.BP3 Distribute cybersecurity incident-related information to affected internal parties and stakeholders.
Inform internal [OUTCOME 4]
stakeholders:
22
Assess & Classify
(4/4)
23
Decide & Response
(1/4)
The Automotive CSIR team must decide which countermeasures should be carried out and how to
response to the automotive cybersecurity incident. The countermeasures can be technical as well
as organisational-legal.
24
Decide & Response
(2/4)
25
Decide & Response
(3/4)
Base practices
CSIR.3.BP1 Carry If required, this activity executes immediate actions that are required to prevent and contain damage and
out immediate preserve evidence in case of a critical or rapidly evolving threat. [OUTCOME 1]
countermeasures:
CSIR.3.BP2 Carry The aim of this activity is to define, decide, execute and monitor sustained countermeasures. This may
out sustained include technical actions, such as software updates, new or changed cybersecurity configurations
countermeasures: (such as firewall settings), application of custom configurations, creation of new accounts, and
application of access controls. Since these measures are intended to restore products and systems to
an operational, safe and secure state, appropriate testing and assurance of the product’s and system’s
integrity and stability must be performed before rollout. Moreover, the countermeasures’ effectiveness
with respect to the identified threats must be assessed and validated after rollout. [OUTCOME 2, 3, 4]
CSIR.3.BP3 Collect, preserve and archive forensic evidence that may be required to reject legal claims.
Preserve evidence: [OUTCOME 5]
CSIR.3.BP4 If required, users and other stakeholders are informed of the product or service failures as soon as
Inform external possible. This process may involve distributing other information of importance to stakeholders, such
stakeholders: as cybersecurity alerts. Effective customer service, including regular communication, ensures that
external stakeholders are kept informed on the mitigation and recovery process. [OUTCOME 6]
26
Decide & Response
(4/4)
27
Learn & Optimize
(1/4)
After the automotive cybersecurity incident is resolved, the Automotive CSIR team should carry
out a retrospective to capture the lessons learned and to optimize the CSIR process or trigger
product improvements regarding cybersecurity.
28
Learn & Optimize
(2/4)
29
Learn & Optimize
(3/4)
Base practices
CSIR.4.BP1 Evaluate cybersecurity incidents and the cybersecurity incident handling process with respect to policy
Improve and process changes and identify concrete measures and procedures that require improvements
cybersecurity to increase the efficiency and timeliness of the cybersecurity incident response process. This must
policies and include the identification of gaps in the qualifications or knowledge of personnel that could be
processes: remedied with training and education. [OUTCOME 1]
CSIR.4.BP2 Identify concrete improvements that will help to make the affected systems more resilient against
Identify product similar future cybersecurity incidents. This must include that development units and partners are
improvements: sufficiently informed about vulnerabilities and that similar vulnerabilities in software variants and
versions are addressed. This should include the identification of trends and patterns in threats and
vulnerabilities and develop means to address them and may include participation in a community to
exchange information on vulnerabilities, threats and incidents. [OUTCOME 2,3]
30
Learn & Optimize
(4/4)
31
Summary of the Automotive CSIR Process
Monitor systems
and services Improve
Analyse incident Analyse risk Inform internal
product security
technically stakeholders
In contrast to cases in which damage is caused vehicle-to-home, and other forms of vehicle
by mechanical components, the vulnerabilities networking. It may become necessary to
exploited in automotive cybersecurity involve the operators of these external IT
incidents may be situated in IT components components in the Automotive CSIR process
which are the responsibility of neither the OEM as well.
nor any of its suppliers or subcontractors. For
example, vulnerabilities in the IT systems of The term supplier is still used here. However,
the network operator or cybersecurity leaks this is not limited to suppliers of purchased
from mobile devices that are connected to the parts that are installed in road vehicles or IT
vehicle may lead to automotive cybersecurity systems outside the road vehicle as part of the
incidents. In the future, the attack surface entire communication infrastructure; rather, it
of the road vehicle is likely to increase even also includes the operators of digital services,
further with more external IT systems, such as which may lead to cybersecurity incidents.
vehicle-to-infrastructure, vehicle-to-vehicle,
33
Automotive CSIR across the Supply Chain
(2/3)
Within the Automotive CSIR process, suppliers A supplier should also have a CSIR team,
essentially take on the role of development known to the OEM’s Automotive CSIR team
departments. In other words, suppliers as a contact. The exchange of information
cooperate closely with the Automotive CSIR between the OEM’s technical Automotive
technical team to analyze vulnerabilities CSIR team and the supplier’s CSIR team in
identified in their systems and fix these addressing a vulnerability is shown in the
vulnerabilities themselves. In addition, the following table:
suppliers carry out risk assessments regarding
the identified vulnerabilities and inform any
other customers similarly affected by them.
34
Automotive CSIR across the Supply Chain
(3/3)
35
36
Recommendations
Recommendations to IT Operations 82
37
38
Recommendations
Based on the foundation described in the first part, this second part
recommends concrete activities for preparing and optimizing an
automotive cybersecurity incident response.
39
Recommendations to the upper management
The upper management should set the basic The definition should consider that existing
cybersecurity guidelines and define what organizational units are already processing
the company considers to be an automotive incidents. Here it must be checked whether
cybersecurity incident. The basic cybersecurity these existing organizational units are to
guidelines should describe the secure and be included in the automotive cybersecurity
rule-compliant normal state when using process or should work separately from the
vehicle IT so that an automotive cybersecurity Automotive CSIR process.
incident may be identified as a violation of
or deviation from this defined normal state.
Based on these guidelines, an automotive
cybersecurity incident can be distinguished
from other incidents and events.
40
Tasks Define basic automotive cybersecurity guidelines
41
Recommendations to the upper management
Establish basic Automotive CSIR process and build up Automotive CSIR team
The upper management should describe the technical and organizational-legal assessment
basic Automotive CSIR process, appoint an of automotive cybersecurity incidents and
Automotive CSIR team, and instruct them in to independently initiate countermeasures
the structure and detailed definition of the appropriate to the incidents’ criticality and
process. Upper management should further urgency in accordance with the cybersecurity
equip the Automotive CSIR team with the guidelines for automotive cybersecurity
necessary specialist competencies and/or incidents.
organizational rights to enable it to perform
42
Tasks Define and communicate the basic Automotive CSIR process
43
Recommendations to the upper management
The upper management should set up a support competitors, IT Operations and first-level
structure suitable for automotive cybersecurity support
incidents or adapt and expand the existing
support structure for automotive cybersecurity • Third-level support known and accessible
incidents. Support might include the following: to second-level support, the bug bounty
operator (if any), the PR department,
• First-level support in the form of a publicly and the legal department
accessible help desk accessible via hotline,
chat and/or e-mail, for example, and known • All support levels should be available
to all external and in-house bodies 24 hours a day, 365 days a year. The support
staff should have the necessary qualifications
• Second-level support known and accessible to detect and register automotive
to all component managers, field analysts, cybersecurity incidents and to carry
importers, suppliers, service providers, out defined countermeasures.
44
Tasks Define support structures
45
Recommendations to the upper management
Upper management should define guidelines at what time by whom, so that all necessary
for communication with external stakeholders information obligations are fulfilled, the
(including customers, authorities and the press) necessary confidentiality is maintained, and
in case of automotive cybersecurity incidents. efficient action is ensured.
It should clarify what is to be communicated
46
Tasks Identify and document communication channels
47
Recommendations to the upper management
Upper management should demand that also requires this from its IT component
suppliers of IT components provide a CSIR team suppliers, so that CSIR capability is present
and a CSIR process on the supplier side. This throughout the entire supply chain.
CSIR capability further implies that the supplier
48
Tasks Define CSIR process guidelines for contracting IT component suppliers
49
Recommendations to the upper management
Upper management should have the should be informed and it must be ensured
Automotive CSIR process tested. For this that genuine damage is avoided. If necessary,
purpose, critical incidents should be identified external experts are t o be commissioned
and described as test scenarios. When for this.
conducting a test, as few people as possible
50
Tasks Identify critical cybersecurity incidents and define a test scenario
51
Recommendations to the upper management
The upper management should inform the should be clearly illustrated and employees
employees of the company about the risks of should be sensitized to the subject. This
cybersecurity threats and provide necessary applies especially to employees who may be
training and support. The importance of involved in detecting automotive cybersecurity
automotive cybersecurity for the company incidents or eliminating vulnerabilities.
52
Tasks Explain the importance of automotive cybersecurity for the company
to the employees
Offer training courses on cybersecurity in general and automotive
cybersecurity in particular
53
Recommendations to the Automotive CSIR team
The Automotive CSIR team should stage, assess them initially, and provide
substantiate and communicate the basic effective support in the further processing of
cybersecurity guidelines approved by automotive cybersecurity incidents:
the upper management. The concrete
cybersecurity guidelines should contain • The secure normal state when using
guidelines for conduct regarding automotive vehicle IT
cybersecurity incidents for the various groups
• Possible automotive cybersecurity events
or organizational units.
• Basic safeguards in case of a automotive
The support staff and the managers of
cybersecurity incident
IT components should be familiar with
the following so that they can recognize • Validated vulnerabilities, their detection, and
automotive cybersecurity events at an early countermeasures
54
Tasks Specify cybersecurity guidelines for automotive cybersecurity
incidents and define guidelines for conduct for each group or
organizational unit
Document and classify automotive cybersecurity events
55
Recommendations to the Automotive CSIR team
The Automotive CSIR team should know and • Data protection or legal department
be able to integrate at any time the experts
and managers in the company necessary to • Product safety
assess automotive cybersecurity incidents,
• Component managers
mitigate the damage, remove the causes of
damage and/or restore the system. These may • Human Resources
be employees of any of the following business
units (among others): • Communication / PR
• IT Operations
56
Tasks Identify all experts and managers relevant to the Automotive CSIR
process
Agree upon and define communication structure with experts and
managers
Ensure availability of experts and managers in emergencies
57
Recommendations to the Automotive CSIR team
58
Tasks Review and prepare legal, organizational and logistical options for
accessing affected vehicles and vehicle components
Organize access rights to IT systems for members of the Automotive
CSIR team or have a facility secured in an emergency
Set up any necessary access software for IT systems
59
Recommendations to the Automotive CSIR team
60
Tasks Identify external experts and build up and maintain a network
61
Recommendations to the Automotive CSIR team
62
Tasks Know the contact persons at the external stakeholders
63
Recommendations to the Automotive CSIR team
64
Tasks Define risk assessment methods
65
65
Recommendations to the Automotive CSIR team
The Automotive CSIR team is to set up and evidence. The team must consider that the
operate systems for consistently documenting data collected must be kept confidential and
automotive cybersecurity incidents and stored for an extended period. The systems
forensic evidence (data and systems) as well used must be designed for this purpose.
as ensure professional processing of such
66
Tasks Define requirements for systems for documenting automotive
cybersecurity incidents and preserving evidence
Implement evidence preservation and documentation systems
Seek training in the use of the systems for securing evidence and
documentation
Organizationally and technically ensure the confidentiality of the
collected data
Search for automotive cybersecurity incidents and connect or link
automotive cybersecurity incident reports
Determine the processing status of automotive cybersecurity incidents
67
Recommendations to the Automotive CSIR team
68
Tasks Secure access to information about events in the field
69
Recommendations to the Automotive CSIR team
The Automotive CSIR team should actively process. Information sources include
inform themselves about new automotive cybersecurity conferences and publications
cybersecurity threats and, if necessary, on cybersecurity, among others.
integrate them into the Automotive CSIR
70
Tasks Screen sources and obtain information (for instance, by subscribing to
newsletters, attending conferences, etc.)
Install processes and tools for information gathering
71
Recommendations to the Automotive CSIR team
72
Tasks Know experts in penetration testing and be able to commission tests
promptly if necessary
If necessary, route the results of a penetration test into the Automotive
CSIR process as an automotive cybersecurity incident
73
Recommendations to the Automotive CSIR team
74
Tasks Develop a conceptual design (organizational, legal, financial, etc.) for
building a bug bounty platform
Operate the bug bounty platform
75
Recommendations to the Automotive CSIR team
76
Tasks Identify functions that should be capable of being disabled
77
Recommendations to component managers
The component manager should know the knows and has documented what data is
cybersecurity architecture and understand stored in the component and what levels of
the significance of the component for which confidentiality the data has.
they are responsible. The component manager
78
Tasks Be familiar with cybersecurity guidelines
79
Recommendations to component managers
80
Tasks Provide information about the vehicles with the component as needed
in a timely manner
81
Recommendations to IT Operations
IT Operations should be able to record Automotive CSIR process. For this purpose,
automotive cybersecurity events in the the company should take the necessary
vehicles and on the servers, to evaluate preparatory steps.
them initially and, if necessary, to initiate the
82
Tasks Define and implement requirements for logging and monitoring of
automotive cybersecurity events
Ensure that IT Operations staff is automatically alerted to automotive
cybersecurity events
Build up and expand expertise in assessing automotive cybersecurity
events
83
Recommendations to IT Operations
84
Tasks Ensure efficient verification of acceptance criteria
85
86
Evaluation of the Automotive CSIR Capability
87
Overview over Questions
The assessment of the Automotive CSIR
capability consists of the following questions:
Detect & Register Assess & Classify
To what extent can cybersecurity events and To what extent are cybersecurity incidents
cybersecurity incidents targeting vehicles technically analyzed and assessed?
and vehicle-related software and digital
services be monitored and detected?
To what extent are reports of vulnerabilities To what extent are the business, safety, legal
and threats monitored and evaluated? and operational impacts of cybersecurity
incidents assessed and classified?
To what extent can cybersecurity events, To what extent are internal stakeholders
cybersecurity incidents, vulnerabilities appropriately informed about cybersecurity
and threats be reported? incidents?
88
Decide & Response Learn & Optimize
To what extent can immediate To what extent are the findings and
countermeasures be carried out experiences from incident resolution
in case of an emergency? used to optimize new products?
To what extent can affected customers, To what extent are the findings and
authorities and other stakeholders be experiences from incident resolution used
properly informed and given instructions? to fine tune existing cybersecurity policies?
89
Capability to Detect & Register
(1/4)
90
Requirements This should include:
This must include: • Use of tools for cybersecurity event
• Awareness by organizational units other monitoring of vehicle systems and services
than dedicated incident response teams (intrusion detection systems, product
of the need to be on the lookout for monitoring).
cybersecurity events.
• Classification of products for cybersecurity
• Monitoring of cybersecurity events in our reasons, in order to determine the type and
own products and services. scope of the monitoring.
• Use of tools for cybersecurity event • Defined processes, roles and responsibilities
monitoring (e.g., SIEM tools) of backend for the monitoring of cybersecurity events
systems. in vehicle systems and services (intrusion
detection systems, product monitoring).
91
Capability to Detect & Register
(2/4)
92
Requirements • Continuous analysis of publicly available
This must include: information (e.g., in the press and other
• Continuously monitoring suppliers’ media on cybersecurity incidents) about
cybersecurity bulletins and public emerging new threats and new vulnerabilities
information pools on threats, vulnerabilities that may relate to the organization’s services
and cybersecurity incidents that are related and products.
to our own products and services.
• Defined processes, roles and responsibilities
This should include: for the monitoring of suppliers’ cybersecurity
• Use of dedicated threat intelligence services bulletins and public information pools.
and tools that actively feed these kinds of
information into the organization.
93
Capability to Detect & Register
(3/4)
94
Requirements This should include:
This must include: Defined processes, roles and responsibilities
• Contact details and/or methods for reporting to receive and register reported cybersecurity
cybersecurity events, cybersecurity incidents, events, cybersecurity incidents, vulnerabilities
vulnerabilities and threats that are available and threats.
to external stakeholders (such as partners,
• The education of employees in the internal
customers and authorities).
organization about automotive cybersecurity.
• An internal organization that accepts and
• Protecting the confidentiality and integrity
registers reported cybersecurity events,
of reports.
cybersecurity incidents, vulnerabilities
and threats. Additionally in case of high protection needs:
• Contact points with 24/7 availability.
• Active management of reports of
cybersecurity events, cybersecurity incidents,
vulnerabilities and threats.
95
Capability to Detect & Register
(4/4)
Requirements
This must include:
• The active assignment of reports of
cybersecurity events, cybersecurity incidents,
vulnerabilities and threats to internal
96
entities that can further validate, assess • Labelling of reports when they are related to
and, if required, respond to the reported cybersecurity.
cybersecurity events, cybersecurity incidents,
vulnerabilities and threats. • Distribution of the definitions and policies
related to automotive cybersecurity incident
• Awareness among service desk staff response among service desk staff and other
that critical systems may generate units.
considerable damage in the event of ongoing
vulnerabilities or cybersecurity incidents. • Defined processes, roles and responsibilities
to assess and classify reports of cybersecurity
• Service desk checklists to support events, cybersecurity incidents, vulnerabilities
the identification of product-related and threats.
cybersecurity events, cybersecurity incidents,
vulnerabilities and threats.
97
Capability to Detect & Register
(4/4 cont.)
98
99
Capability to Access & Classify
(1/3)
100
response, and thus whether they will be further Requirements
addressed within the cybersecurity incident This must include:
response process as a cybersecurity incident. • Classification of reports of cybersecurity
Cybersecurity incidents must be properly events, cybersecurity incidents,
prioritized so that effective countermeasures vulnerabilities and threats in respect to their
and immediate actions can be promptly and validity and criticality, as a basis for further
appropriately initiated in accordance with the investigation and treatment.
criticality of the security incident. The early
and proper analysis and preservation of the –A
classification scheme to support
causes of the incident (forensics) can help to decision-making about trustworthiness and
answer liability questions which may arise in criticality, vulnerability and cybersecurity
the aftermath of a cybersecurity incident. incident reports.
101
Capability to Access & Classify
(1/3 cont.)
–A
technical and organizational means of –D
edicated processes to analyze and assess
searching for reports that have similarities the root cause of cybersecurity incidents
(e.g., similar cybersecurity events,
cybersecurity incidents, vulnerabilities or –D
edicated processes to analyze and assess
threats). the technical impacts of cybersecurity
incidents
• Defined processes, roles and responsibilities
concerning the making of decisions about • Defined processes, roles and responsibilities
whether reports of cybersecurity events, that establish contact channels to technical
cybersecurity incidents, vulnerabilities staff who can provide details about each of the
and threats need further treatment and organization’s relevant products and services.
for managing and coordinating the related
• Defined processes, roles and responsibilities
security incident response activities.
that establish the interaction between the
• Root cause analysis and impact analysis for automotive cybersecurity incident response
cybersecurity incidents team and the risk assessment units.
102
• Documentation (i.e., creation of an incident • Contact channels to responsible roles and
record) and prioritization of cybersecurity units in the supply chain.
incidents in terms of their criticality, as a
basis for treatment measures and immediate This may include:
actions. • Defined processes, roles and responsibilities
that enable the secure preservation of data
This should include: from suspicious systems in a verifiable
• Access to forensics services that allow for manner.
the systematic assessment of compromised
systems and safekeeping of clues, traces, Additionally in case of high protection needs:
logging data and other forms of evidence. • An automotive cybersecurity incident
response team with dedicated forensics
• Dedicated processes for technical know-how.
cybersecurity risk assessment and
management.
103
Capability to Access & Classify
(2/3)
104
Requirements This should include:
This must include: •Involvement of the business, safety, legal
• Analysis and assessment of the business, and operational risk assessment and
safety, legal and operational risks of a management units.
cybersecurity incident.
105
Capability to Access & Classify
(3/3)
106
Requirements This should include:
This must include: • The existence of pertinent and appropriate
• Distribution of information about the templates for reports that provide information
occurrence of cybersecurity incidents to suitable for internal stakeholders.
affected internal parties and stakeholders.
107
Capability to Decide & Response
(1/4)
108
This should include: Additionally in case of high protection needs:
• Dedicated policies for handling ongoing • 24/7 availability of personnel that are needed
cybersecurity incidents and severe to carry out immediate response actions
vulnerabilities in the field. (e.g., external communications, informing the
press, deactivating systems, ...).
• Direct contact to the responsible roles and
units in the supply chain.
109
Capability to Decide & Response
(2/4)
110
• Policies to ensure that all affected or relevant • Policies to ensure that no unauthorized
external stakeholders are promptly informed person has access to information about the
about the occurrence of a cybersecurity cybersecurity incident.
incident and the mitigation and recovery
processes related to it. • Direct contact to the responsible roles and
units in the supply chain.
• Dedicated channels of communication to all
affected or relevant external stakeholders
who are required to be promptly informed
in case of a cybersecurity incident (e.g.,
an effective customer service system that
includes regular communications with
external stakeholders and users).
111
Capability to Decide & Response
(3/4)
Requirements
This must include:
• Policies to ensure that countermeasures are
properly defined and decided upon.
112
• Organizational roles and units that can This should include:
execute and control countermeasures, with • A regularly maintained list of customizable
the aim of returning to an operational, safe countermeasures and standard responses.
and secure state in products and systems.
• Continuous monitoring of the status of
–A
ppropriate testing, confirmation and efforts to address unresolved cybersecurity
assurance of the product’s and system’s incidents, so that additional countermeasures
integrity and stability before rollout. may be introduced as soon as possible if
threats are improperly addressed or if service
–A
ppropriate assessment and validation of levels are likely to be breached.
countermeasure effectiveness with respect
to identified threats after rollout.
113
Capability to Decide & Response
(4/4)
114
Requirements
This must include:
• Ensuring that countermeasures are executed
in their entirety and collecting, preserving
and archiving forensic evidence that may be
needed to reject legal claims.
115
Capability to Learn & Optimize
(1/2)
Requirements
This must include:
• The identification of improvements that
would make the affected systems more
resilient against existing or future threats,
vulnerabilities and cybersecurity incidents,
or the same or similar ones.
116
• Providing information to development This should include:
units and development partners about • The identification of trends and patterns with
vulnerabilities and other technical causes respect to threats and vulnerabilities and the
of a cybersecurity incident. means to address and manage new patterns.
117
Capability to Learn & Optimize
(2/2)
118
Requirements This should include:
This must include: • Deriving new patterns to be used for the
• The identification of gaps in personnel detection of cybersecurity incidents from
qualifications that could be resolved by most recent information about cybersecurity
training and education. incidents and the provision of this
information to the organizational units that
• A dedicated vulnerability management are responsible for incident detection.
process.
119
Authors Contact
Gunnar Harde AQI Automotive Quality Institute GmbH
(AQI Automotive Quality Institute GmbH) Französische Str 13-14
10117 Berlin
Dr. Jürgen Großmann Germany
(Fraunhofer-Institut FOKUS)
[email protected]
www.aqigmbh.de
This publication is based on the expertise of the AQI and its scientific partners. It represents a
consolidated position on the topic under examination.
This work including all its parts is protected by copyright. Any use not expressly authorized by
copyright law requires prior permission.