13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

14. NAS and airborne network architecture and design should follow best common IA<br />

security practices [20, 83, and 85].<br />

15. Approaches to authenticate and authorize network managers be carefully considered.<br />

This study recommends that adm<strong>in</strong>istrative personnel be authenticated by two factored<br />

authentication systems; e.g., the adm<strong>in</strong>istrator’s PKI identity coupled with either what he<br />

knows (e.g., pass phrase) or what he is (i.e., biometrics). It is also recommended that<br />

adm<strong>in</strong>istrative authorizations be restricted <strong>in</strong> terms of separation of duties with least<br />

privilege. For example, different people must work on airborne security topics than can<br />

work on other airborne adm<strong>in</strong>istrative topics.<br />

16. All activities performed by adm<strong>in</strong>istrators upon aircraft software and systems must be<br />

automatically logged. At a m<strong>in</strong>imum, the log files should: state exactly what the<br />

adm<strong>in</strong>istrator did; conta<strong>in</strong> the <strong>in</strong>dividual identification of the specific ma<strong>in</strong>tenance<br />

personnel who did it; and provide a timestamp and the identification of the networked<br />

device from which the adm<strong>in</strong>istration occurred. All log records must be protected aga<strong>in</strong>st<br />

modification or erasure. One possible approach is to keep the log <strong>in</strong>formation both on<br />

the aircraft and on the ground and create an alarm whenever the two copies conta<strong>in</strong><br />

different <strong>in</strong>formation (e.g., produced different hashes).<br />

17. The signals <strong>in</strong> space (e.g., radio or satellite communications) used for ground-to-air<br />

communications must use transport security cover (i.e., encryption of the wireless signal<br />

<strong>in</strong> space occurr<strong>in</strong>g at the OSI physical layer). This h<strong>in</strong>ders nonauthorized entities from<br />

eavesdropp<strong>in</strong>g upon these communications and discourages attempts to potentially <strong>in</strong>ject<br />

false communication signals <strong>in</strong>to the data stream (e.g., possible man-<strong>in</strong>-the-middle<br />

attacks). However, these l<strong>in</strong>ks will rema<strong>in</strong> potentially vulnerable to availability attacks<br />

caused by hostile jamm<strong>in</strong>g unless mitigation techniques such as AJ waveforms or<br />

LPI/LPD waveforms were also used.<br />

18. Airborne or NAS systems should not be designed us<strong>in</strong>g technologies that require<br />

significant policy complexity for all (or a majority of) the networked devices or a high<br />

degree of policy coord<strong>in</strong>ation between all of the networked elements (see section 5.7).<br />

19. <strong>Aircraft</strong> control and the cockpit (pilot) networks or their devices should not be physically<br />

accessible by aircraft passengers. If there is any possibility of passengers physically<br />

access<strong>in</strong>g the cockpit (pilot) network, then the high-assurance LAN with<strong>in</strong> the cockpit<br />

must be connected to the aircraft control network via the packet filter. Otherwise, the<br />

high-assurance LAN <strong>in</strong> the cockpit can use the same physical high-assurance LAN as<br />

aircraft control. The noncockpit crew network devices should also not be accessible by<br />

passengers, but the design could accommodate situations <strong>in</strong> which passengers are not<br />

always physically excluded from the area where those devices are located. If physical<br />

separation is not possible, crew members must be very careful to not leave open<br />

applications runn<strong>in</strong>g <strong>in</strong> situations when the crew member is not present (i.e., situations<br />

where passengers may access applications that have been opened with crew member<br />

authentications).<br />

143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!