1. Trang chủ
  2. » Kỹ Thuật - Công Nghệ

Tiêu chuẩn iso ts 17574 2017

60 2 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Technical Specification Iso/Ts 17574 2017
Trường học ISO
Chuyên ngành Electronic Fee Collection
Thể loại Technical Specification
Năm xuất bản 2017
Thành phố Geneva
Định dạng
Số trang 60
Dung lượng 2,48 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Cấu trúc

  • 5.1 General (11)
  • 5.2 EFC security architecture (11)
  • 5.3 Protection profile preparatory steps (12)
  • 5.4 Relationship between actors (13)
  • 6.1 Structure (15)
  • 6.2 Context (16)

Nội dung

Mos of the cont ent ofthis document is an ex mple shown in Annex A on how t o pr p r the se urity r q ir ment for EF eq ipment, in this case, a DSRC-b sed OBE with an IC card lo ded with

Trang 1

Electronic fee c ol ection — Guidelines

for security pr otection profiles

Pe c ption de télé é ge — Ligne s direc trice s co c rn nt les profils de

protection de la sécurité

Refer ence n mb r

T ir d edition

2 17-0

Trang 2

COPYRIGHT PROTECTED DOCUMENT

© ISO 2017, P blshed in Sw itz rlan

A ll rig hts r eserved Unles otherw ise spe ified, nopar of this p blc tion ma y be r epr od c d or utilz d otherw ise in an form

or b an me ns, ele tr onic or me hanic l, inclu in p oto opying , or postin on the internet or an intranet , w ithout prior

written permis ion Permis ion c n be req esed from either ISO at the ad r es below or ISO’s member bod y in the c u try of

the r eq eser

ISO c pyrig ht ofic

Trang 3

F reword i v

Introduction v

1 Sc ope 1

2 Nor mati ve r eferenc es 1

3 Terms and definitions 2

4 A bbreviated terms 4

5 EF C secur ity architecture and protection profie proc es es 5

5.1 General 5

5.2 EF se urity ar chite tur e 5

5.3 Pr ote tion profie prep r atory s eps 6

5.4 Relationship betwe n actors 7

6 Outlnes of Protectio Profie 9

6.1 Structur e 9

6.2 Contex t 1

A nne x A (informative)Proc edur es for pr eparing documents 11

A nne x B (informative)Example of thr eat anal ysis evaluation metho

.45 A nne x C (informative) Relevant security standar ds in the c onte x t of the EF C 50

A nne x D (informative) C mmon Criteria Rec og nitio A r rang ement (C RA ) .51

Biblog raphy 52

Trang 4

ISO (he Int ernational Org nization for Stan ardization) is a worldwidefede ation of national s an ards

b dies (ISO membe b dies) The work of pr p ring Int ernational Stan ards is normaly car ied out

through ISO t ech ical committ ees Each membe b dy int er st ed in a subje t for w hich a t ech ical

committ ee has be n es a lshed has the right t o be r pr sent ed on that committ ee Int ernational

org nizations, g ove nmental an non-g ove nmental, in laison with ISO, also take part in the work

ISO cola orat es closely with the Int ernational Ele trot ech ical C mmis ion (IEC) on al matt ers of

ele trot ech ical s an ardization

The proc d r s used t o develo this document an those int en ed for it furthe maint enanc ar

desc ibed in the ISO/IEC Dir ctives, Part 1 In p rticular the dife ent a pro al c it eria ne ded for the

dife ent ty es of ISO document should be not ed This document was draft ed in ac ordanc with the

edit orial rules of the ISO/IEC Dir ctives, Part 2 ( e www iso org dir ctives)

A tt ention is drawn t o the p s ibi ity that some of the element of this document ma be the subje t of

p t ent right ISO shal not be held r sponsible for identifying any or al such p t ent right Detais of

any p t ent right identified d ring the develo ment of the document wi be in the Introd ction an / r

on the ISO ls of p t ent de larations r c ived ( e www iso org p t ent )

Any trade name used in this document is information given for the convenienc of use s an does not

cons itut e an en orsement

For an ex lanation on the meaning of ISO spe ific terms an ex r s ions r lat ed to conformity as es ment,

as wel as information a out ISO’s adhe enc to the Wor ld Trade Org nization (WTO) principles in the

Te h ical Bar ie s to Trade (TBT) se the folowing URL: www iso org iso/ for word html

The committ ee r sp nsible for thisdocument is ISO/TC2 4, Intel gent tra s port sys tems

This third edition canc ls an r plac s the se on edition (ISO/TS 1 5 4:2 0 ), w hich has be n

t ech icaly r vised This edition inclu es the folowing significant chang es with r spe t t o thepr vious

edition:

— r q ir ment updat ed as t o r fle t the lat es ve sion of the ISO/IEC 1 40 se ies;

— a new Cla use 5 has be n added, comprising much of the t ext from the S o e of the pr vious

edition

Trang 5

Ele tronic fe cole tion (EF ) sy st ems ar subje t t o several way s of frau b th b use s an o e at ors

but also from peo le out ide the sy st em These se urity thr at ha e t o be met b dife ent ty es of

se urity measur s inclu ing se urity r q ir ment spe ifications

It is r commen ed that EF o e at ors or national org nizations, e.g highwa authorities or transp rt

minis ries, use the guidelne pro ided b this document t o pr p r their own EF / rot ection prof ile

(P ), as se urity r q ir ment should be desc ibed from the s an p int of the o e at ors an / r

o e at ors’ org nizations

It should be not ed that this document is of a mor informative than normative natur an it is int en ed

t o be r ad in conju ction with the u de lying int ernational s an ards ISO/IEC 1 40 (al p rt )

Mos of the cont ent ofthis document is an ex mple shown in Annex A on how t o pr p r the se urity

r q ir ment for EF eq ipment, in this case, a DSRC-b sed OBE with an IC card lo ded with c ucial

data ne ded for the EF The ex mple r fe s t o a Ja anese national EF sy st em an should only be

r g rded as an ex mple

Aft er an EF /P ispr par d, it can be int ernational y r gist er d b the org nization that pr p r d the

EF /P so that othe o e at ors or cou tries that want t o develo their EF sy st em se urity se vic s

can r fe t o an alr ady r gist er d EF /P

This EF -r lat ed document on se urity se vic framework and EF /P is b sed on ISO/IEC 1 40 (al

p rt ) ISO/IEC 1 40 (al p rt )inclu es a set of r q ir ment for the se urity functions an as uranc

of IT-r lev nt prod ct an sy st ems Ope at ors, org nizations or authorities def ining their own EF /P

can use these r q ir ment This wi l be simiar t o the dife ent P s r gist er d b seve al financial

ins itutions, e.g for p yment ins rument l ke ICcards

The prod ct and sy st ems that we e develo ed in ac ordanc with ISO/IEC 1 40 (al p rt ) can be

publcly as ur d b theauthentication of the g overnment or designat ed priv t e ev luation ag encies

Trang 7

Electronic fee c ol ection — Guidelines for security

This document pro ides guidelnes for pr p ration an ev luation of se urity r q ir ment

spe if ications, r fe r d t o as Prot ection Prof iles (P ) in ISO/IEC 1 40 (al p rt ) and in

ISO/IEC TR 1 4 6

By Prot ection Prof ile(P ), it means a set of se urity r q ir ment for a cat eg ory of prod ct or sy st ems

that me t spe if ic ne ds A ty ical ex mple would be a P for On-Bo rd E uipment (OBE) t o be used in

an EF sy st em Howeve , the guidelnes in this document ar supe seded if a Prot ection Prof ile alr ady

exis s for the subsy st em in conside ation

The targ et of ev luation (TOE) for EF is lmit ed t o EF spe if ic roles an int erfac s as shown in

rolesan int erfac s, they ar as umed t o be out ide the sco e of TOE for EF

Figure 1 — Scope of TOE for EF

The se urity ev luation is pe formed b as es ing the se urity-r lat ed pro e ties of roles, entities an

int erfac s def ined in se urity targ et ( STs), as o p sed t o as es ing complet e proc s es w hich oft en ar

dis ribut ed o e mor entities an int erfac s than those co e ed b the TOE of this document

NOTE As es ing security is ues for complet e proces es is a complimentary ap ro ch, which may wel b

b nef icial to ap ly when evaluating the security of a syst em

2 Normati ve r eferences

The e ar no normative r fe enc s in this document

Trang 8

3 Terms and definitions

F or the purposes of this document, the fol owing t erms and def initionsa ply

ISO an IEC maintain t erminolo ical data ases for use in s an ardization at the folowing ad r s es:

— IECEle tro edia: a aia le at ht p:/ www ele tro edia org

— ISO Onlnebrow sing plat orm:a ai a le at ht p:/ www iso org o p

3.1

as urance req irement

se urity r q ir ment t o as ur con denc in the implementation of functional r q ir ment

3.2

audit

in epen ent r view an ex mination in orde t o ensur compl anc with es a l shed p lcy an

o e ational proc d r s and t o r commen as ociat ed chang es

3.3

avai abi ity

pro e ty ofbeing ac es ible an usa le up n deman b an authoriz d entity

right an o lg tions of in ivid als an org nizations with r spe t t o the cole tion, use, r t ention,

disclosur an disp sal of pe sonal information

[ SOURCE:ISO/TS1 2 9:2 1 , 3.3 ]

3.7

Evaluation As urance Level

EAL

set of as uranc r q ir ment , usualy inv lving documentation, analy sis an t es ing, r pr senting a

p int on a pr def ined as uranc scale, that form an as uranc p ckag e

3.8

functio al req irement

r q ir ment or a fu ction that a sy st em or sy st em comp nent is a le t o pe form

3 9

integrity

Trang 9

key manag ement

g ene ation, dis ribution, st orag e, a plcation an r v cation of enc y tion key s

proc s det ermining that a prod ct of each phaseof the sy st em lfe ycle develo ment proc s fulfils al

the r q ir ment spe ified in the pr vious phase

3.1

relabiity

a i ity of a devic or a sy st em t o pe form it int en ed function u de given conditions of use for a

spe if ied pe iod of time or n mbe of cycles

Trang 10

entity w hich levies t ol for the useof vehicles in a t ol domain

Not e 1t o entry: In other documents, the terms operat or or t ol operator can b used

[ SOURCE:ISO 1 5 3:2 1 , 3.1 , modified]

3.24

tol service provider

TSP

entity pro iding t ol se vic sin oneor mor t ol domains

Not e 1t o entry: In other documents, the terms is uer or contract is uer might b used

Not e 2 t o entry: T e t ol service provider can provide the OB or might provide only a ma netic card or a smart

card to b used with an OB provided by a third party (like a mo ile telep one an a SIM card can b o tained

from diferent parties)

Not e 3t o entry: T e t ol service provider is responsible for the operation ( fu ctioning)of the OB

[ SOURCE:ISO 1 5 3:2 1 , 3.2 , modif ied]

4 A bbreviated terms

C RA C mmon Crit eria R eco nition Ar ang ement

CN c lular networks

DSRC dedicat ed short-rang e commu ication

EAL Ev luation As uranc Level

EF ele tronic fe cole tion

GNS glo al na ig tion sat el t e sy st ems

HMI h man machine int erfac

ICC int egrat ed cir uit (s) card

IT information t ech olo y

OBE On-Bo rd Eq ipment

P Prot ection Profile

Trang 11

SFP se urity fu ction polcy

SOF s r ngth of function

ST se urity targ et

TOE targ et of ev luation

TSF TOE se urity fu ctions

5 EF C security architecture and pr otection profi e pr oc es es

5.1 General

This clause gives an o e view of the cont ext an use of this document in t erms of the EF se urity

ar hit ectur an prot ection profile proc s es

This document is int ended t o be r ad in conju ction with the u de lying s andards ISO/IEC 1 40 (al

p rt ) an ISO/IEC TR 1 4 6 Although a la man could r ad the f irs p rt of the document t o ha e an

o e view on how t o pr p r a Prot ection Prof ile for EF eq ipment, the an ex es, p rticularly A.4 an

an int egrat ed cir uit (s) card (ICC)as an ex mple t o desc ibe b th the s ructur of the PP, as wel as the

pro osed cont ent

prod ct The commu ication lnk (betwe n the OB an the RSE) is b sed on DSRC

An ex Bgives an ex mple of how a thr at analy sis can be done, w hie An ex C pro idesan o e view of

the r lev nt se urity s an ards in the cont ext of the EF , w hich pro ides the b ckgroun of EF roles

an int erfac s

5.2 EFC secur ity ar chitecture

b x es ar the aspe t mos ly r lat ed t o the pr p ration of P s for EF syst ems

Trang 12

Figure 2 — Overal view of security ar hitecture

5.3 Protection profi e preparatory steps

The main purp se of a P is t o analy se the se urity environment of a subje t and then t o spe ify the

r q ir ment me ting the thr at that ar the output of the se urity environment analy sis The subje t

s u ied is caled the targ et of ev luation (TOE) In this document, an OBE with an IC is used as an

ex mple of the TOE

The pr parat ory work of EF /P consis s of the st eps shown in Figur 3 ( in lne with the cont ent

desc ibed in Clause 6)

Trang 13

Figure 3 — Proces of preparing a Protectio Profie for E C equipment

A PP ma be r gist er d publcly b the entity pr p ring the P in orde t o make it known an a aia le

t o othe p rties that ma use the same PP for their own EF sy st ems

5.4 Relationship between actor s

By se urity targ et ( ST), it means a set of se urity r q ir ment an spe if ications t o be used as the

b sis for ev luation of an identified TOE Whi e the P could be lo ked upon as the EF t ol se vic

pro ide s’ r q ir ment , the ST could be lo ked up n as the documentation of a supple as for the

complanc with an fulfilment of the P for the TOE, e.g an OBE

the EF eq ipment supple an an ev luat or F or an int ernational r gis ry org nization, i.e Common

Crit eria R eco nition Ar ang ement (C RA) and cur ent r gist er d P s, r fe t o An ex D

Trang 14

Figure 4 — Relatio ships betwe n o erator , suppler and evaluator

The ST is simiar t o the P , ex cept that it contains ad itional implementation-spe ific information

detai ing how the se urity r q ir ment ar r al z d in a p rticular prod ct or syst em Henc , the ST

inclu es the folowing p rt not ou d in a P :

— a TOE summary spe if ication that pr sent the TOE-spe if ic se urity functions and as uranc

measur s;

— an o tional P claims the p rtion that ex lains P s with w hich the ST is claimed t o be conformant

( if any);

— a rationale containing ad itional evidenc es a lshing that the TOE summary spe if ications

ensur satis action of the implementation-in epen ent r q ir ment an that claims a out P

conformanc ar satisf ied;

— actual se urity fu ctions of EF prod ct wi be designed b sed on this ST ( e ex mple in Figur 5)

Trang 15

Figure 5 — Example of design based o a PP

6 Outl nes ofPr otection Pr ofi e

6.1 Structure

The cont ent of a Prot ection Prof ile for a part or int erfac of an EF sy st em is shown in Figur 6

Figure 6 — C ntent of a Protectio Profi e

Trang 16

6.2 Contex t

Guidelnes for pr p ring P ar as folow s:

a) Ove view ( e A.1)

b) Targ et of ev luation (TOE, se A.2)

The sco eof the TOE shal be spe if ied

c) S curity environment ( e A.3)

Develo ment, o e ation an control methods of the TOE ar desc ibed in orde t o clarify the

working o e ation r q ir ment R eg rding these r q ir ment , IT as et , for w hich the TOE mus be

prot ect ed, an the se urity thr at t o w hich the TOE is ex osed, shal be spe if ied

d) S curity o je tives ( e A.4)

S curity p lcies for thr at t o the TOE ar det ermined The p lcies ar divided int o t ech ical polcy

an o e ational/control p lcy

S curity o je tives should be consist ent with the o e ational aim or prod ct purpose of theTOE

Ope ational/control p lcy is defined as pe son el an phy sical o je tives in the s atus for w hich the

TOE is used or o e at ed The o e ational/control p lcy inclu es control and o e ational rules for

o e at ors

e) S curity r q ir ment ( e A.5)

In ac ordanc with the se urity o je tives def ined in A.4, conc et e se urity r q ir ment for se urity

thr at s at ed in A.3 ar spe if ied The se urity r q ir ment consis of functional r q ir ment

(t ech ical r q ir ment ) an as uranc r q ir ment for se urity q alty

Fu ctional r q ir ment ar pro ided, sele ting ne es ary r q ir ment from ISO/IEC 1 40 - 2 an

det ermining p ramet ers

R eg rding as uranc r q ir ment , as uranc r q ir ment designat ed in ISO/IEC 1 40 -3 ar ado t ed

b det ermining ev luation levels for as uranc r q ir ment , w hich ar pro ided in ISO/IEC 1 40 - 2

an ISO/IEC 1 408-3

f) Rationale of jus if ication/efe tivenes ( e A.6)

The cont ent of P ar che ked w hen ne es ary and co e se urity r q ir ment for the TOE The

che ked it ems ar as folow s:

1) al se urity environment ne ded ar co e ed;

2) se urity o je tives should complet ely me t the se urity environment ;

3) se urity r q ir ment should implement se urity o je tives

Trang 17

A g ene al outlne of the document for Prot ection Profile (P ) is desc ibed.

It should be not ed that this cla use is informative in natur Mos of the cont ent is an ex mple on how

t o pr par the se urity r q ir ment for EF eq ipment, in this case, an OBE with a smart card (ICC)

lo ded with c ucial data ne ded for the ele tronic fe col e tion

A 1.2 Identification infor mation

Identification information for the document is as folow s:

a) document itle;

b) ve sion/ release n mbe ;

c) pr paration dat e;

d) pr par d b

E AMP E Identif ication information:

1) document itle: E C On-Bo rd E uipment S curity Protection Prof ile;

2) reference /ver ion n mb r: 1.0;

3) preparation dat e: 2 0 -1 -2 ;

4) prepared by: ABC As ociation

A 1.3 Tar g et of evaluation (T OE) des ription

TOE is identif ied as folow s:

a) prod ct ;

b) ve sion/ release n mbe ;

c) develo e

E AMP E TOE des ription:

1) prod ct: E C On-Bo rd E uipmen

2) ver ion/rele se n mb r: 1.0;

3) developer: AB Co Ltd

Trang 18

A 1.4 In ac c ordanc e w ith ISO/IEC 15408 (al parts)

The pr p r d “ Prot ection Prof ile” in ac ordanc with ISO/IEC 1 40 (al p rt ) is s at ed ex lcitly

The ve sion an pr p ration data of r fe enc d ISO/IEC 1 40 (al p rt ) ar also s at ed

E AMP E ISO/IE 1 40 (al parts)conformance stat ement ac ording to:

— ISO/IE 1 40 -1 T ird E ition 2 0 -1 -1 ;

— ISO/IE 1 40 -2 Third E ition 2 0 -0 -1 ;

— ISO/IE 1 40 -3 T ird E ition 2 0 -0 -1

F or use s of se urity “ Prot ection Prof ile” , the ty es of devic desc ibed in “ Prot ection Prof ile” ar

desc ibed ex lcitly t o help them det ermine the a plcation

E AMP E

1.4.2TOE fu ctional outline (OB for E C system)

The fu ctionaloutline is as fol ows

a) E C fu ction:

1) mutual authentication with IC card;

2) trans ription (caching)of IC card data t o OB ;

3) enc y tion of radio commu ication with RSE;

4) as urance of mes a e inte rity;

5) mutual authentication with RSE;

6) stora e of secured information (enc y tion key)used in OB d ring E C transaction

b) S t-u fu ction:

1) authentication of set-u card;

2) caching of vehicle information from IC card t o OB

c) HMI fu ction:

1) report of E C biling results to user ;

2) guidance of E C lane

Trang 19

A 1.5.3 Evaluatio A ssuranc e Le vel (EA L)

Ev luation As uranc Levels for o je tives ar sele t ed Each EAL def ines a p ckag e consis ing of

as uranc comp nent an det ermines the degr e of as uranc r q ir ment on se urity sy st ems The

jus if ication for the sele t ed EAL is s at ed

E AMP E

A.1.5.3 E C OB (EAL is 5)

OB fu ctions as eq ipment for e-Commer e in E C transactions T e security sy st ems of E C OB are v lnera le

to at ack u der the control of in ivid al user T erefore, a high as urance level (EAL) wil b req ired for E C OB

A 2 Tar g et ofevaluation (T OE)

A 2.1 T OE objecti ves and methodolog y

A 2.1.1 T OE use o jecti ves

The folowing indicat es o je tives for TOE use an the ty e of environment in w hich it is used

E AMP E E C memb r (users) use the E C syst em at t ol g tes by inserting the IC card with E C memb r

contract information for set lement Vehicle information such as an aut omo ile inspection certif ication is st ored

in OB b forehan For storing vehicle information, a per onalization card for initialization is used T e OB

(TOE), which re ds/writes data t o IC cards for set-u s/set lements an transmits/receives data to ro d side

eq ipment for t ol col ection transactions, prot ects interface an internal data from e ternal thre ts

A 2.1.2 T OE use method log y

User req est an operat or t o instal an OBE an set u vehicle information such as aut omo ile inspection

certif ication t o OB In ad ition, user receive the IC with E C memb r contract information

b) Operat or preparations:

Operat or is ue set-u information in response t o user’ s req ests

c) Operation proced res:

Trang 20

When user are pas ing through t olg t es, the t ol s are bil ed to the IC cards for set lement with E C memb r

contract information, which is inserted in the instal ed On-Bo rd E uipment with vehicle information When a

le itimate IC card for set lement is inserted in the OB with cor ect vehicle information, the t ol fe is calculated

in the commu ication zone of RSE at t olg t es

F or a chang or u date of E C memb r contract information, such as vehicle information, set-u cards an IC

are u dated (reis ued/rere istered)

d) Use proced res:

User use the E C system of inserting IC cards with E C memb r contract information at t olg tes ac ording to

the E C memb r contract or OB man als

e) Limitations of use:

In g neral, 24 h use is availa le,as long as E C lanes are open at tol g t es

A 2.2 T OE functions

A 2.2.1 F nctio s pr ovided b T OE

Fu ctions, w hich ar pro ided b the TOE, ar desc ibed Al fu ctions for data transactions, w hich

shal be prot ect ed, ar lst ed

E AMP E

a) E C transactions:

1) E C commu ication control fu ction;

2) non-secure data record fu ction;

3) HMI in ut/outp t control fu ction;

4) IC card insert status detect fu ction;

5) On-Bo rd E uipment self-check fu ction

b) S curity mod le:

1) data st orag e or prot ection fu ction;

2) user ac es control fu ction;

3) authentication fu ction (DSRC, IC );

4) enc y tion/dec y tion fu ction;

5) IC interface fu ction;

6) E C transaction interface fu ction;

7) set-u card re d fu ction

A 2.2.2 F nctio s not provided b T OE

When the TOE fu ction is a p rt of the fu ctions of an entir sy st em, the sco e of the TOE in the w hole

sy st em should be shown as in Figur A.1 w hich show s an ex mple w he e the OBE is the sco e of the TOE

F or the purpose of r fe enc , Figur A.2 showing the o e al se urity p lcy sco e should be inclu ed

Trang 21

E AMP E

Figure A.1 — E ample w here the TOE is shown in its co text

Figure A.2 — Overal security pol cy s o e

A 2.2.3 Mis ing functio s

When fu ctions, w hich usual y should be pro ided b the TOE in this se tion, ar not inclu ed in the

TOE, the fu ction cont ent an r asoning for ex clusion should be desc ibed

A 2.3 T OE str ucture

A 2.3.1 Har d war e structure

The s ructur with r lat ed hardwar unit on TOE o e ation is desc ibed The sco e of TOE in the

Trang 22

E AMP E

Figure A.3— Example of TOE hardware structure

Figure A.4 — E C sy stem model of the E C S curity Framewor k

Trang 23

A 2.3.2 Sof ware str ucture

The s ructur with r lat ed sof war in the o e ation of the TOE is desc ibed In the s ructur , the sco e

of the TOE in the s ructur should be s at ed Espe ialy, w hen the o e ation of the TOE depen s on

o e ating sy st em (OS) an data control pro rams, the dis ribution of functions should be desc ibed

A 2.3.3 Rationale

It should be ve ified that the desc ibed it emsar consist ent

a) Absenc of inconsist ent pro ision it ems

b) Absenc of un efined or u clear se tionsof pro ided cont ent in this subclause

A 3 Security environment

A 3.1 Operation/ perational environment ofT OE

A 3.1.1 General

S curity r q ir ment t o det ermine se urity o je tives for the TOE o e ation ar pro ided

A 3.1.2 Operatio al envir onments

The methodolo y of the use of the TOE such as the o e ational environment, o e ational time,

o e ational sit e, use proc d r an location of use is desc ibed The desc ibed cont ent of A.2.1.2 ar

desc ibed in detai from the aspe t of fu ctionalty

a) Ope ational proc d r s

R eg rding the o e ational proc d r s of the TOE, the o e ation of an int egrat ed EF sy st em inclu ing

the r lat ed vehicles and ICC for p yment ar desc ibed

b) Ope ational time

The o e ational time zone of the TOE is desc ibed

E AMP E T e operational time is an time that E C vehicles use on E C tol ro ds

c) Ope ational sit es

Ope ational sit esof the TOE ar desc ibed

d) Use proc d r s

The proc d r sfrom the pur hase (o tain) t o the disp sal of the TOE b use s ar desc ibed inclu ing

ins al ation of the TOE, set-up of the TOE an o e ation at t ol ro ds

E AMP E 1 User p r hase E C OB at OB de ler (car de ler , car shops) An OB is instal ed in a vehicle

In ad ition, the on-b ard information ne ded for the E C operation such as vehicle information is stored as

on-b ard information

E AMP E 2 Afer an E C memb r contract is esta lished, user g t an IC , which is is ued by c edit card

companies

E AMP E 3 User wil b a le t o use the E C syst em by inserting an IC in an OB instaled in a vehicle T e

vehicles, which are capa le of using E C syst ems,are cal ed E C vehicles

E AMP E 4 User use tol ro ds with the IC inserted in an OB in an E C vehicle an pas through the

t olg t es without stop ing

Trang 24

e) Use sit es

Sit es, w he e use s ar a le t o use TOE, ar desc ibed

E AMP E Tol ro ds, along which E C RSE are instal ed

f) Limit an r q ir ment in use such asa ai a le n mbe s of TOE ar desc ibed

E AMP E 1 T e n mb r of OB instaled per vehicle is limited to one

E AMP E 2 OB is f ix ed (built-n) in a vehicle

E AMP E 3 OB can b used 24 h a day as long as E C lanes are open for operation

A 3.1.3 Physical c ontrol

P y sical control r lat ed t o the o e ation of the TOE is desc ibed

a) Ins al ation sit es an control

Ins alation sit es and phy sical control of the TOE ar desc ibed

E AMP E 1 OB is f ix ed (built-n) in a vehicle

The pe sonnel r q ir ment for the r sp nsibi ity an confidenc of the TOE o e ations ar desc ibed

In ad ition, the r q ir ment for p t ential uses, motiv tions, methods an ex e tise of at acks ar

pro ided

a) TOE-r lat ed ag ent

The folowing it ems r g rding the man factur rs, o e at ors an use s of TOE ar s at ed

E AMP E 1 Per on el req irements:

T pe: Man facturer of On-Bo rd E uipment

Trang 25

Risk of ilicit use: There are risks of il icit use since the responsibility for security control is a sent.

Expertise: No ne d of e pertise for security

Trail Ne ative list check is implemented while E C vehicles are pas ing through t olg tes

b) A ttacke s

The folowing it ems ar desc ibed for i icit use r q ir ment a ains w hich cou t ermeasur s ar

taken b the TOE

T pe: Ilicit hird party among E C user

P rpose of il icit use: OB data forg ry, manip lation, o taining of per onal information F org ery an il icit

modif ication of OB medium

Motivation: To red ce tol fe s or avoid t ol fe claims by il icit use of information S le of forg d OB

Me ns: Forg ry of vehicle information on On-Bo rd E uipment Forg ry of I/F data b tween OB an IC

t o cou terfeit some ne’ s card F org ery of E C OB by analysing OB int ernal y

Expertise: Comprehen the int ernal transaction by analysing E C On-Bo rd E uipment internal y

A 3.1.5 Co necti vity/operatio al environments

The environment for TOE con e tivity an o e ation is pro ided Only the s ructur , w hich is pro ided

in this subclause, shal be TOE

a) Conne tivity

Transactions for RSE at t ol g t es an ICC ne ded for the o e ation of the TOE ar desc ibed

E AMP E

— OB ex chang information via radio commu ication (5,8G z)with RSE at t olg t es

— OB re d IC card data (card n mb r, E C memb r contract information) b fore vehicles pas through

tolg tes When vehicles pas through t ol g t es, OB sen ap lica le IC card internal data to RSE t o transmit

bil ing an transaction record data

b) Ope ational r q ir ment

Hardware /sof war r q ir ment (CPU implementation spe d, r q ir d memory, input/output

devic s)ne ded for o e ation of the TOE ar desc ibed

A 3.1.6 Rationale

It isve if ied that the desc ibed it ems ar consist ent

a) Absenc of inconsist ent pro ision it ems

Trang 26

A 3.2 S cur ity thr eats

A 3.2.1 Deter minatio of tar g et resourc es for pr otectio

a) S le tion of targ et r sour esfor prot ection

Targ et r sour es for prot ection, t o be prot ect ed b the TOE, ar det ermined R esour es, w hich neg tively

imp ct se vic s of the TOE b falsification, alt eration an los , ar targ et ed for prot ection R eg rding

det ermined in ivid al targ et ed r sour es for prot ection, the lfe ycle such as g ene ation, transaction,

st orag e an disposal ar clearly desc ibed If the e ar in ir ct r sour es for a TOE transaction, the

in ir ct r sour esar det ermined as wel

E AMP E 1

1) Targ t protection resour es to b prot ected by the TOE:

— E C memb r contract information: IC internal data (i.e IC card n mb r);

— vehicle information: OBE internal data such as vehicle clas if ication codes;

— t ol g te information: e it/enter information,b r ier information an transaction record information;

— information stated a ove, transmitt ed by radio commu ication through OBE b tween ro d side u its at

t ol g tes an IC ;

— t ol information: st ora e in IC such as bil ing information

2) Targ t resour es for prot ection such as lifecycle:

— OB instal ation in a vehicle;

— trans ription of vehicle information int o OB ;

— OB operation at tol ro ds;

— OB disposal

b) Ev luation of targ et r sour es for prot ection

The v lues of det ermined targ et r sour es for prot ection ar ev luat ed The ev luation is divided int o

thr e levels as fol ow s:

Level 1: se urity pro lems’ imp ct on the entir syst em for the TOE, e.g the sy st em might be

malfu ctioning or down

Level 2: se urity pro lems dras ical y compromise the v lue of the sy st em for the TOE, e.g the

social r sp nsibi ty for the sy st ems is imp ir d;howeve , r st oration ofsy st ems is at aina le

Level 3: se urity pro lems hin e the o e ation of the TOE, e.g o e ation of the sy st em is

t emp rari y int er upt ed, r sulting in se ious impact on the use s

E AMP E 2

E aluation of targ t resour es for protection:

Level 1: None (no targ t resour e for protection, which impacts sy stems such as destroying E C syst ems);

Level 2: E C memb r contract information;

Level 3: Vehicle information, t olg te information, t ol information

Trang 27

how (cou t erfeiting, ta ping, des ruction), means (a ai a le r sour es, int erfac , ex e tise), thr at

(falsification, ex osur , se vic int er uption)an r asons

major thr at ar as folows:

1) lack of con dentialty;

2) lack of prot ection;

3) lack of a aia i ty;

4 ) lack of r sp nsibi ity;

5) lack of int egrity;

se urity weak es es ar s at ed

Thr at analy sis for l fe ycle of targ et data for prot ection is shown in Ta le A.1

Trang 28

Table A.1 — Thre t analy sis for l fecycle of ETC On-Board E uipment data for protection —

information

A 3.2.3 Rationale

It isve ified that the desc ibed it ems ar consist ent

a) Absenc of inconsist ent pro ision it ems

b) Absenc of un ef ined or u clear se tionsof pro ided cont ent in this subcla use

A 3.3 S cur ity pol cy of operational entity

A 3.3.1 General

S curity it ems for o e ational entities for the TOE ar pro ided in ac ordanc with the rules an

p lcies The document names desc ibing conc et e rules ar desc ibed

A 3.3.2 Identification of secur ity polcies of operatio al entities

a) Use p lcy of targ et r sour e for prot ection

Use p l cy (t o w hom, w hat ca a i ty, w hen, w he e) of targ et r sour e for prot ection is pro ided

b) Maint enanc p lcy (updat e, disp sal)of targ et r sour e for prot ection

c) Ope ational rules an a plca le laws for se urity

i.e se urity polcy b sed on “ Law for prohibiting i lcit ac es ” ispro ided

d) Sy st em an r sponsibi ity d ty for se urity p lcy

Trang 29

A 3.3.3 Rationale

Among se urity polcy it ems of each o e ational entity, it is che ked that the e is no contradiction in

the pro ision cont ent with the methodolo y an r sult being desc ibed

a) Absenc of inconsist ent pro ision it ems

b) Absenc of un efined or u clear se tionsof pro ided cont ent in this subclause

A 4 Security objecti ves

A 4.1 General

R eg rding se urity thr at l st ed in A.3.2, se urity o je tives ar det ermined from b th aspe t of

t ech ical o je tives, w hich ar pro ided b EF sy st ems or the o e ational environment ofthe EF

sy st em, an o e ation control o je tives

A 4.2 Technical security objecti ves

Te hnical se urity o je tives pro ide se urity o je tives, w hich ar implement ed b se urity fu ctions

such as enc y tion of data an control of ac es authentication

a) F or det ermination of se urity o je tives, t echnical se urity o je tives a ains thr at ar clearly

desc ibed

b) S curity o je tives ar det ermined from the aspe t of “control” , “ pr vention” , “det ection” an

“ re o e y

Control: the g ene ation of se urity thr at is controled

E AMP E 1 Bil ing resour e information such as E C contract information is stored so securely in IC an

SAM instaled in OB for caching that it is protected from tampering

Pr vention: pr vent e urity des ruction w hen se urity thr at is g ene at ed

E AMP E 2 Data are protected by enc y ted data of radio commu ication information

Det ection: se urity thr at ar det ect ed

E AMP E 3 Data falsif ication is detected by ad ing an authentication code t o the mes a e data

R eco e y: w hen se urity thr at ar det ect ed, the original se ur s atus wi l be r st or d

E AMP E 4 When a forg ery of OB or IC is detect ed, ne ative information is recorded an the use is

terminated For le itimate user , a new OB or IC is reis ued

The folowing ar some of the b sic element of se urity o je tives

a) Av i a i ity

Information transaction r sour e is efe tively used anytime anyw he e, w hen ne ded Major

se urity o je tives ar as fol ows

1) Te m of v ldity: set ing the t erm of v l dity for IC cards, IC cards ne d t o be chang ed

pe iodicaly

2) Damag e control: eq ipment at t olg t es control ng t ol bi lng information should ha e d al

configuration t o a oid being damag ed

Trang 30

3) A ut omation:pe sonnel int ervention for pr p ration of bi s is el minat ed.

b) Confidential ty

Information is prot ect ed from i eg l ac es

1) A cc s control:

— o e ation ca a i ity of eq ipment is che ked;

— commu ication p ths ar che ked

2) Confidentialty of data: data of EF membe contract information/ i lng information ar

enc y t ed

3) Enc y tion key manag ement: g ene ation of c y t ogra hic key, dis ribution and st orag e ar

manag ed

c) Prot ection

Information is prot ect ed from i icit alt eration or faci tation

1) A cc s control: usag e ca a i ity of data and pro ram lbrary ar che ked

2) Data flow control: lo ic sp c for data flow is pro ided; between int ernal networks an

ext ernal networks, t ele ommu ication data ar filt er d

3) Data prot ection: data falsif ication an i leg l ad ition of data inse tion of forwarding blocks

ar det ect ed

d) Legitimacy

Original information is ve ified Commu ication document is ve if ied t o be the same original

document In ad ition, the r cords for r sour e use ar ve if ied

1) Trace /au it: information for radio t ele ommu ication is r corded as lo data t o be used t o

det ect pro lems and for se urity o je tives

2) Det ection of se urity int ervention: i icit int erventions ar det ect ed in adv nc

e) Trac a i ty

Use s atus of targ et r sour e for prot ection is analysed and any u usual s atus is det ect ed

1) Identification/a uthentication: t ol fe s ar charg ed t o actual EF use s through

identif ication/ uthentication

2) S s ion control:radio commu ication p ths ar prot ect ed from i icit int ervention

3) Priv cy: EF contract information an use information ar prot ect ed from ex osur

4 ) S curity entity prot ection: se urity entities ar che ked for b p s or int erfe enc

f) Common r q ir ment

Common r q ir ment for se urity o je tives ar as fol ow s

1) Digital signatur :E-signatur is r q ir d for ve if ication for EF contract information

Ngày đăng: 12/04/2023, 18:19