13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

alerted the pilots because the failure was not a flight-critical item, leav<strong>in</strong>g mechanics to<br />

f<strong>in</strong>d the discrepancy when download<strong>in</strong>g the CFDIU at a ma<strong>in</strong>tenance stop. With the<br />

OMT, however, ground crews now would be alerted via ACARS and would be ready to<br />

fix the problem at the next stop rather than hav<strong>in</strong>g to f<strong>in</strong>d out about the problem later.<br />

Some military airplanes are designed so that classified mission critical functionality (not flight)<br />

resides on laptop computers. The configuration of these laptop computers must be ma<strong>in</strong>ta<strong>in</strong>ed to<br />

guarantee that they cannot corrupt other computer systems on the airplane network. This report<br />

presumes that EFB functionality must similarly be protected from unauthorized modification that<br />

could compromise the <strong>in</strong>tegrity of the data or affect other networked systems. The latter<br />

<strong>in</strong>cludes explicit protection aga<strong>in</strong>st the <strong>in</strong>troduction of viruses, worms, or other types of<br />

malware. Like military laptop computers, the EFB must be controlled through policies and<br />

procedures commensurate to its level of security (safety).<br />

This architecture requires that EFB devices must be certified and deployed <strong>in</strong> conformance with<br />

the architecture just like any other networked nonpassenger device with<strong>in</strong> the aircraft. Because<br />

these devices are COTS computers, this report states that they cannot themselves be certified at<br />

any higher-assurance level. Specifically, the viability of their security controls directly relies<br />

upon the vicissitudes of adm<strong>in</strong>istrative configuration and management oversight and they are<br />

directly vulnerable to the problems discussed <strong>in</strong> sections 4.1 through 4.4. For this reason, any<br />

coupl<strong>in</strong>g of EFB devices with<strong>in</strong> higher-assurance environments must occur via HAGs. S<strong>in</strong>ce<br />

HAGs are tailored for specific deployment environments, this requirement implies that EFP<br />

functionalities be directly coord<strong>in</strong>ated with specific HAG devices <strong>in</strong> an <strong>FAA</strong>-supervised manner.<br />

9.5 UPDATING SECURITY PROTECTION SOFTWARE.<br />

Higher-assurance devices need to be designed so that they cannot be mismanaged or<br />

misconfigured.<br />

By contrast, the security controls of lower-assurance devices have dependencies upon the<br />

vicissitudes of adm<strong>in</strong>istrative configuration and management oversight. They are also often<br />

directly vulnerable to the problems discussed <strong>in</strong> sections 4.1 through 4.4. Nevertheless, their<br />

security protection software and update policies and procedures should be assessed as part of the<br />

certification process. That process should directly assess all networked devices <strong>in</strong> terms of<br />

documented network threats. However, the process also needs to evaluate lower-assurance<br />

devices <strong>in</strong> terms of their participation with<strong>in</strong> a standard airborne defense-<strong>in</strong>-depth security<br />

architecture. That security architecture must conform to IATF-recommended and COTS<br />

supported protection mechanisms. These lower-assurance devices must be configured and<br />

managed so that they support the aircraft’s defense-<strong>in</strong>-depth security design and the certification<br />

process should ensure that this is possible.<br />

The IA security design shall also address life cycle control issues (see section 5.1). The<br />

criticality of assured software update procedures and their potential safety impact must be<br />

considered and acceptable procedures developed. Updates to antivirus software signature files<br />

occur regularly and do not change the executable software on the computer; therefore, the safety<br />

impact of this type of update may be considered low as long as the <strong>in</strong>tegrity of the software<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!