13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

exemplar airborne network architecture (see section 8.3) to only be a m<strong>in</strong>imal airborne network<br />

architectural subset that needs to be built upon to satisfy the actual safety and security<br />

requirements of specific NAS and airborne deployments.<br />

The <strong>in</strong>itial steps of the SSE process will be discussed <strong>in</strong> this section to exam<strong>in</strong>e the safety<br />

requirements of a generic networked airborne system environment. As previously observed,<br />

networked environments have both safety and security requirements. Although the SSE<br />

processes were orig<strong>in</strong>ally <strong>in</strong>tended to address security needs only, this section extends them to<br />

exist<strong>in</strong>g <strong>FAA</strong> (i.e., DO-178B and ARP 4754) safety policies applied with<strong>in</strong> a Biba Integrity<br />

Model context. As expla<strong>in</strong>ed <strong>in</strong> section 7, this policy foundation also leverages best current IA<br />

practices as articulated by the IATF, most notably, its defense-<strong>in</strong>-depth (see section 5.1)<br />

provisions.<br />

The first step <strong>in</strong> the SSE process is to determ<strong>in</strong>e the security policies of a deployment. The<br />

security policies are the current DO-178B and ARP 4754 safety processes mapped <strong>in</strong> terms of<br />

the Biba Integrity Model framework.<br />

The second step <strong>in</strong> the SSE process is to determ<strong>in</strong>e the security requirements that are derived<br />

from the security policies. Because this study uses exist<strong>in</strong>g <strong>FAA</strong> safety processes mapped to the<br />

Biba Integrity Model framework (i.e., step 1 of the SSE process), the result of this step produces<br />

the follow<strong>in</strong>g set of safety requirements:<br />

• Requirement 1: Networked entities that are classified at a software level that has<br />

potential safety repercussions to aircraft operation (i.e., Level A through Level D) shall<br />

be partitioned from the larger network environment and comb<strong>in</strong>ed <strong>in</strong>to a network enclave<br />

that functions at that specific software safety level with other entities classified at the<br />

same safety level (see figures 11 and 14). <strong>Networks</strong> or items at a different safety level<br />

from each other shall not be able to communicate together (see Requirements 6 and 8 for<br />

two specific exceptions to this general requirement). For example, Level B systems or<br />

software shall not be comb<strong>in</strong>ed <strong>in</strong>to the same partitioned network enclave with Level C<br />

systems or software.<br />

• Requirement 2: Because Level E software systems have no safety repercussions to the<br />

aircraft, they do not need be partitioned (i.e., formed <strong>in</strong>to common network enclaves).<br />

(Note: the <strong>FAA</strong> may want to study whether Level D software should be treated as a<br />

Requirement 1 or a Requirement 2 entity. Because this study did not know the most<br />

appropriate way to treat Level D entities, it is tentatively classify<strong>in</strong>g them as Requirement<br />

1 systems.)<br />

• Requirement 3: Physical network media and devices that operate at the physical or data<br />

l<strong>in</strong>k layer of the OSI Reference Model (i.e., data l<strong>in</strong>k layer and below), deployed with<strong>in</strong><br />

aircraft, must be assured at the same software (safety) level as the highest software level<br />

entity that they support. For example, if entities operat<strong>in</strong>g at software Level A are<br />

conveyed with<strong>in</strong> a physical airborne network, then the media, switches, and bridges that<br />

create that physical network system that transport Level A packets must also be assured<br />

at software Level A.<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!