13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

environments. If the certification of networked nonpassenger airborne devices is trustworthy,<br />

the only security breaches that could directly affect aircraft safety would probably be associated<br />

with either the <strong>in</strong>tegrity or availability (or both) of networked airborne systems. Unfortunately,<br />

this also <strong>in</strong>cludes the possibility of (accidental) misconfigur<strong>in</strong>g networked devices (e.g.,<br />

misconfigur<strong>in</strong>g the aircraft’s ASBR). The danger from device misconfiguration is a very<br />

significant issue for networked systems <strong>in</strong> general. For this reason, high-assurance devices<br />

should be used for all network critical functions to the greatest extent possible because highassurance<br />

devices need to be designed so that they cannot be misconfigured.<br />

Because the critical airborne systems are protected with<strong>in</strong> VPN enclaves, any hostile <strong>in</strong>tegrity or<br />

availability attack upon those networks or systems would require considerable sophistication on<br />

the part of the attacker (unless the vulnerability was caused by device misconfiguration) and<br />

would directly reflect significant aircraft design or process deficiencies potentially affect<strong>in</strong>g<br />

other aircraft as well. Pilots and crew cannot be assumed to possess the computer and network<br />

knowledge to address these types of potentially sophisticated problems. Rather, pilot or crew<br />

members need aids that enable them to easily determ<strong>in</strong>e the nature of the problem (e.g., an error<br />

code or other monitor<strong>in</strong>g status event) so that they can contact experts on the ground to<br />

determ<strong>in</strong>e remedial responses, just as they do for mechanical failures. In any case, the<br />

stakeholders need to anticipate this possibility and determ<strong>in</strong>e how ground-based entities should<br />

automatically receive and log real-time reports of all airplane safety-related failures. Operational<br />

logs should also be ma<strong>in</strong>ta<strong>in</strong>ed and recorded with<strong>in</strong> the airplane itself (hopefully <strong>in</strong>tegrated with<br />

airl<strong>in</strong>e ma<strong>in</strong>tenance processes), but safety-related <strong>in</strong>cidents should also be reported to the ground<br />

<strong>in</strong> real time. If the aircraft crashes, there must be adequate <strong>in</strong>formation available to determ<strong>in</strong>e<br />

the root cause of the failure to prevent it from happen<strong>in</strong>g aga<strong>in</strong>.<br />

9.7 ACCESS TO AIRCRAFT DATA.<br />

Privacy is one of the elements of security eng<strong>in</strong>eer<strong>in</strong>g. A secure architecture does not<br />

necessarily guarantee privacy of all <strong>in</strong>formation stored on the system; rather, it will identify<br />

those data elements that must be kept confidential and will provide sufficient mechanisms to<br />

protect the data from credible threats. Airplane operators may have <strong>in</strong>formation that needs to be<br />

protected for bus<strong>in</strong>ess reasons; however, exposure of that <strong>in</strong>formation would not represent a<br />

safety concern for the airplane. The physical location of a plane or some other characteristics of<br />

its control channels may be considered sensitive. A credible threat scenario would generally be<br />

required as part of the safety and security methodology. Lack<strong>in</strong>g a credible threat scenario, no<br />

countermeasures would be recommended. Privacy-enforc<strong>in</strong>g mechanisms may still be warranted<br />

to protect sensitive company <strong>in</strong>formation or sensitive privacy <strong>in</strong>formation about humans <strong>in</strong><br />

conformance to <strong>in</strong>ternational or local law, but that would likely be outside of the certifier’s scope<br />

unless there was a safety issue <strong>in</strong>volved.<br />

9.8 ADEQUACY OF EXISTING REGULATIONS.<br />

Current certification guidel<strong>in</strong>es focus on safety of flight issues. These are dist<strong>in</strong>ct from security<br />

issues that are commonly addressed by a security eng<strong>in</strong>eer<strong>in</strong>g process. For this report, the focus<br />

was on processes and procedures for identify<strong>in</strong>g those security issues that may impact safety of<br />

flight. The addition of <strong>LANs</strong> to airplanes and <strong>in</strong>terconnections with external public networks<br />

129

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!