13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.1 EXTENDING ARP 4754 INTO NETWORKED ENVIRONMENTS.<br />

The primary differences between networked airborne environments and the highly <strong>in</strong>tegrated or<br />

complex aircraft systems for which ARP 4754 was designed is:<br />

• The <strong>in</strong>advertent <strong>in</strong>tegration between all networked entities, <strong>in</strong>clud<strong>in</strong>g possibly subtle fate<br />

shar<strong>in</strong>g relationships.<br />

• <strong>Networks</strong> are <strong>in</strong>herently hostile environments where any software bug may be attacked<br />

and potentially leveraged to corrupt or compromise that item. If compromised, the item<br />

may potentially be used to attack other networked items or their common network<br />

environment.<br />

There are two primary changes that are needed to extend ARP 4754 to address the challenges<br />

that occur with<strong>in</strong> networked environments:<br />

• ARP 4754 itself needs to become enhanced by the application of a security model so that<br />

the current ARP 4754 concepts could be assured to be extended <strong>in</strong> a mathematically<br />

viable manner <strong>in</strong>to networked environments. This study recommends that ARP 4754<br />

become extended by leverag<strong>in</strong>g the Biba Integrity Model.<br />

• Strategic security controls need to become <strong>in</strong>troduced <strong>in</strong>to an ARP 4754 deployment to<br />

provide IA protections that mitigate or reduce the efficacy of networked attacks,<br />

<strong>in</strong>clud<strong>in</strong>g restrict<strong>in</strong>g access to unauthorized humans and devices. As previously stated,<br />

these IA controls need to comply with best common IA practice, which is def<strong>in</strong>ed by the<br />

NSA’s IATF [50]. These controls need to be implemented <strong>in</strong> accordance with defense<strong>in</strong>-depth<br />

practices, which were discussed <strong>in</strong> section 5.1. Section 8.2 will apply best<br />

current SSE practices to the comb<strong>in</strong>ation of current <strong>FAA</strong> safety assurance policies and<br />

Biba Integrity Model concepts to def<strong>in</strong>e the rules and relationships that underlie this<br />

study’s recommended exemplar airborne network architecture, which is presented <strong>in</strong><br />

section 8.3. Section 8.3, therefore, will discuss each of a m<strong>in</strong>imal subset of security<br />

controls that are needed <strong>in</strong> airborne networked environments, <strong>in</strong>clud<strong>in</strong>g their<br />

recommended configurations to achieve a m<strong>in</strong>imal set of defense-<strong>in</strong>-depth protections.<br />

These two primary changes produce at least two secondary effects, which are also a component<br />

part of extend<strong>in</strong>g safety policy for networked environments. The first of these secondary effects<br />

is the need to require viable software life cycle <strong>in</strong>tegrity protections as an ARP 4754 system<br />

requirement. There are two constituent aspects for creat<strong>in</strong>g software <strong>in</strong>tegrity:<br />

• Load<strong>in</strong>g software onto aircraft needs to occur with<strong>in</strong> a secure <strong>FAA</strong>-approved software<br />

download system. (Please see <strong>FAA</strong> Order 8110.49 chapters of field-loadable software.)<br />

This system needs to ensure that only the correct versions of the correct software are<br />

loaded <strong>in</strong>to aircraft. This implies that a reliable mechanism of creat<strong>in</strong>g software and<br />

software updates is def<strong>in</strong>ed that <strong>in</strong>cludes a mechanism to securely store software with<strong>in</strong><br />

an authoritative ground-based software storage facility. Assured software version<strong>in</strong>g<br />

mechanisms and processes need to be established that provide nonrepudiation assurances<br />

94

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!