IT-Sicherheitsprüfverfahren im Automotive-Umfeld

Size: px
Start display at page:

Download "IT-Sicherheitsprüfverfahren im Automotive-Umfeld"

Transcription

1 Informationstag "Das Automobil als IT-Sicherheitsfall" Berlin, IT-Sicherheitsprüfverfahren im Automotive-Umfeld Markus Bartsch

2 IT Security und IT Safety Security SECURITY Security Safety SAFETY Safety Threats by man Protection of IT Hazards by IT Protection of man 5/11/2012 TÜV Informationstechnik GmbH Member of TÜV NORD Group 1

3 Hintergrund 2 Studien Experimental Security Analysis of a Modern Automobile Comprehensive Security Analysis of Automotive Attack Surfaces 2011 Embedded Systems ECU (Electronic Control Units) und Interaktionen Telematic Bedrohungsmodell Physikalischer Zugang Virtueller Zugang Normgerechte Prüfmethoden. 2

4 Experimentelle Security Untersuchungen Vorgehen: Test einzelner ausgebauter Komponenten stehendes Fahrzeug (Stationary Testing) Fahrzeug während der Fahrt (Road Testing) Monitoring Tool (CarShark) Komponenten: ECM EBCM TCM BCM Telematics Module RCDLR HVAC SDM IPC/DIC Radio TDM 3

5 Einfache Angriffszenarien Intra Vehicle Network Security CAN Bus Broadcast Nature DoS Denial of Service keine Authentisierung Schwache Access Control Firmware Updates offene Diagnose Abweichung von Standards Component Security Angriffsmethoden Sniffing / Probing Fuzzing Reverse Engineering Testing (Stationary / Road) Radio / Display IPC Instrument Panel Cluster BCM Engine Brakes HVAC generic DoS 4

6 Komplexe Angriffszenarien Speedometer Lights Out Self-Destruct Bridging Hosting / Wiping Code 5

7 Angriffsvektoren virtueller Zugang Indirekter physikalischer Zugriff Media Player OBD Short Range wireless - Bluetooth Indirect Direct Long Range wireless 6

8 IT Security und IT Safety Security SECURITY Security Safety SAFETY Safety Threats by man Protection of IT Hazards by IT Protection of man IEC ISO /11/2012 TÜV Informationstechnik GmbH Member of TÜV NORD Group 7

9 Common Criteria CONFIDENCE in implemented Security Measures TÜV Informationstechnik GmbH Unternehmensgruppe TÜV NORD 8

10 CC Recognizing Countries (CCRA) Certificate Authorizing Certificate Consuming 9

11 Common Criteria CCRA Certificate Issuing and Consuming Nations Certificate Consuming Nations 10

12 Automotive Anwendungen der CC Beispiele von PP Digital Tachograph (Vehicle Unit, Tachograph Card) Alcohol Interlock Boordcomputer Taxi 11

13 CC Paradigm - 1 Assets Usually information/data stored, processed and transmitted by IT products Threats Threat agent (e.g. hacker) act adverse (e.g. remotely copying) on an asset (e.g. data on HD) Countermeasures Security mechanisms to protect assets Assurance Confidence in correct and effective implementation of countermeasures 12

14 Evaluation Methodology: Life Cycle Review Specification (Security Target) Tests Installation/ Configuration Design Start Up Implementation Security Analyses Operation Development Environment Operational Environment 13

15 Functional Requirements Overview Security Audit Communication Cryptographic Support User Data Protection Identification and Authentication Security Management Privacy Protection of the TSF Ressource Utilisation TOE Access Trusted Path/Channels 14

16 Evaluation Assurance Levels - EAL 15

17 Fazit Automobil als vernetzte Maschine IT Security / Automotive Security ist essentiell IT Security Komponenten müssen verbaut werden Safety Anforderungen müssen beibehalten werden IT Security in Real-Time Nachvollziehbarkeit der IT Security Nutzung bestehender Standards (CC) Anpassung von Standards Security vs Safety 16

18 Vielen Dank! TÜV Informationstechnik GmbH Unternehmensgruppe TÜV NORD Markus Bartsch IT Security Langemarckstr Essen Germany Phone: Fax: URL: Referenzen: /11/2012 TÜV Informationstechnik GmbH Member of TÜV NORD Group 17

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile Experimental Security Analysis of a Modern Automobile Matthias Lange TU Berlin June 29th, 2010 Matthias Lange (TU Berlin) Experimental Security Analysis of a Modern Automobile June 29th, 2010 1 / 16 Paper

More information

German Industrial Security Standard and Application Status. RAMI - ICS - SQ Markus Bartsch

German Industrial Security Standard and Application Status. RAMI - ICS - SQ Markus Bartsch German Industrial Security Standard and Application Status RAMI - ICS - SQ - 62443 Markus Bartsch German Approach 3 parallel Activities Legal Framework / CIP Models & Methods Technologies 1 TÜV Informationstechnik

More information

Experimental Security Analysis of a Modern Automobile

Experimental Security Analysis of a Modern Automobile hyväksymispäivä arvosana arvostelija Experimental Security Analysis of a Modern Automobile Matti Valovirta Helsinki HELSINGIN YLIOPISTO Tietojenkäsittelytieteen laitos HELSINGIN YLIOPISTO HELSINGFORS UNIVERSITET

More information

Security Concerns in Automotive Systems. James Martin

Security Concerns in Automotive Systems. James Martin Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its trust service D-TRUST qualified

More information

Safety and Security for Automotive using Microkernel Technology

Safety and Security for Automotive using Microkernel Technology Informationstag "Das Automobil als IT-Sicherheitsfall" Berlin, 11.05.2012 Safety and Security for Automotive using Microkernel Technology Dr.-Ing. Matthias Gerlach OpenSynergy TwoBirds withonestone Safety

More information

Markus Bartsch. German Smart Metering and European Privacy Needs

Markus Bartsch. German Smart Metering and European Privacy Needs Markus Bartsch German Smart Metering and European Privacy Needs Smart Grid (and Metering) Customer Satisfaction 3 Years 3 10 Years Identity Management Asset Management Feeder Automation Smart Meters Privacy

More information

SIZ Informatikzentrum der Sparkassenorganisation GmbH Simrockstraße Bonn, Germany. Sicherer IT-Betrieb, Basisvariante, version 1.

SIZ Informatikzentrum der Sparkassenorganisation GmbH Simrockstraße Bonn, Germany. Sicherer IT-Betrieb, Basisvariante, version 1. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company SIZ Informatikzentrum der Sparkassenorganisation GmbH Simrockstraße 4 53113 Bonn, Germany to confirm

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Interamerican 240 Doiranis street 17680 Kallithea, Greece to confirm that its application software OnE

More information

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate.

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Qingdao Haier Joint Stock Co., Ltd. Qianwangang Road, Haier Industrial Zone, Qingdao, Shandong 266510,

More information

IT Security Evaluation : Common Criteria

IT Security Evaluation : Common Criteria AfriNIC-9 MEETING Mauritius 22-28 November 2008 IT Security Evaluation : Common Criteria Ministry of Communication Technologies National Digital Certification Agency Mounir Ferjani November 2008 afrinic

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 4 pages.

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 4 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Stadt Zürich Albisriederstrasse 201 8022 Zürich, Switzerland to confirm that its OIZ Rechenzentrum Hagenholz

More information

TÜV Informationstechnik GmbH

TÜV Informationstechnik GmbH 9ICCC IT security starts here: At the building structure and its mission critical infrastructure Joachim Faulhaber & Wolfgang Peter TÜV Informationstechnik GmbH Agenda Scope Risc potentials Physical security

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company SK ID Solutions AS Pärnu avenue 141 11314 Tallinn, Estonia to confirm that its trust service EID-SK

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company SKAT Østbanegade 123 2100 Copenhagen, Denmark to confirm that its system software Common Reporting Standard

More information

to confirm that the usability engineering process consisting of the sub-processes

to confirm that the usability engineering process consisting of the sub-processes The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Haier Innovation Design Center Haier Industial Park No.1 Haier Road 266101 Qingdao, P. R. China to confirm

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company PeopleCert International Ltd. 40 Themistocles Dervi Str. 1066 Nicosia, Cyprus to confirm that its application

More information

Module 6: Network and Information Security and Privacy. Session 3: Information Security Methodology. Presenter: Freddy Tan

Module 6: Network and Information Security and Privacy. Session 3: Information Security Methodology. Presenter: Freddy Tan Module 6: Network and Information Security and Privacy Session 3: Information Security Methodology Presenter: Freddy Tan Learning Objectives Understanding the administrative, physical, and technical aspects

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Microsec Ltd. Záhony utca 7. H-1031 Budapest, Hungary to confirm that its trust service e-szignó Qualified

More information

Procedure for Network and Network-related devices

Procedure for Network and Network-related devices Lloyd s Register Type Approval System Type Approval Requirements for components within Cyber Enabled Systems on board Ships Procedure for Network and Network-related devices September 2017 1 Reference:

More information

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V.

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Bundesagentur für Arbeit Regensburger Straße 104 90478 Nürnberg to confirm that its document management

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Thales Nederland B.V. Business unit Naval Systems Zuidelijke Havenweg 40 7554 RR Hengelo, The Netherlands

More information

Qingdao Haier Air Conditioner Gen. Corp., Ltd. Haier Industrial Park, Laoshan District, Qingdao Shandong , P.R. China

Qingdao Haier Air Conditioner Gen. Corp., Ltd. Haier Industrial Park, Laoshan District, Qingdao Shandong , P.R. China The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Qingdao Haier Air Conditioner Gen. Corp., Ltd. Haier Industrial Park, Laoshan District, Qingdao Shandong

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company D-TRUST GmbH Kommandantenstraße 15 10969 Berlin, Germany to confirm that its trust service D-TRUST qualified

More information

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate.

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company GAD eg GAD-Straße 2-6 48163 Münster, Germany to confirm that its mobile application Online-Filiale+,

More information

Abrechnungszentrum Emmendingen An der B3 Haus Nr Emmendingen, Germany

Abrechnungszentrum Emmendingen An der B3 Haus Nr Emmendingen, Germany The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Abrechnungszentrum Emmendingen An der B3 Haus Nr. 6 79312 Emmendingen, Germany to confirm that its Document

More information

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security

BSI-CC-PP for. FIDO Universal Second Factor (U2F) Authenticator, Version 1.0. developed by. Federal Office for Information Security for FIDO Universal Second Factor (U2F) Authenticator, Version 1.0 developed by Federal Office for Information Security Federal Office for Information Security (BSI), Postfach 20 03 63, 53133 Bonn, Germany

More information

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Who is this guy? Jason Staggs Graduate Research Assistant Institute for Information Security (isec)

More information

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate.

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company KPMG IT Service GmbH Klingelhöferstraße 18 10785 Berlin, Germany to confirm that its scheduling software

More information

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V.

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company KOLDI GmbH & Co. KG Conrad-Clauß-Straße 7a 09337 Hohenstein-Ernstthal Germany to confirm that its Document

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Ministerie van Sociale Zaken en Werkgelegenheid Parnassusplein 5 2511 VX Den Haag, The Netherlands to

More information

The appendix is part of the certificate and consists of 6 pages.

The appendix is part of the certificate and consists of 6 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Verteilnetzbetreiber (VNB) Rhein- Main-Neckar GmbH & Co. KG Frankfurter Str. 100 64293 Darmstadt, Germany

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Microsec Ltd. Záhony utca 7. H-1031 Budapest, Hungary to confirm that its trust service e-szignó Qualified

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Microsec Ltd. Záhony utca 7. H-1031 Budapest, Hungary to confirm that its trust service e-szignó Qualified

More information

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V.

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Finanz Informatik GmbH & Co. KG Theodor-Heuss-Allee 90 60486 Frankfurt am Main, Germany to confirm that

More information

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V.

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company AWG Allgemeine Warenvertriebs-GmbH Imanuel-Maier-Straße 2 73257 Köngen, Germany to confirm that its

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Asseco Data Systems S.A. Certum CA, ul. Bajeczna 13 71-838 Szczecin, Poland to confirm that its trust

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Microsec Ltd. Záhony utca 7. H-1031 Budapest, Hungary to confirm that its trust service e-szignó Qualified

More information

The appendix is part of the certificate and consists of 6 pages.

The appendix is part of the certificate and consists of 6 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company RWE Effizienz GmbH Freistuhl 7 44137 Dortmund, Germany to confirm that its firewall and server installation

More information

Automotive Gateway: A Key Component to Securing the Connected Car

Automotive Gateway: A Key Component to Securing the Connected Car Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems

More information

The appendix to the certificate is part of the certificate and consists of 4 pages.

The appendix to the certificate is part of the certificate and consists of 4 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Microsec Ltd. Záhony utca 7. H-1031 Budapest, Hungary to confirm that its trust service e-szignó NCP

More information

Car2Car Forum Operational Security

Car2Car Forum Operational Security Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security

More information

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V.

fulfils all applicable audit criteria for document management solutions of VOI Verband Organisations- und Informationssysteme e. V. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Bundesagentur für Arbeit Regensburger Straße 104 90478 Nürnberg, Germany to confirm that its document

More information

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate.

in the underlying contexts of use. The requirements and contexts of use are summarized in the appendix to the certificate. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company HanseMerkur Krankenversicherung AG Siegfried-Wedells-Platz 1 20354 Hamburg, Germany to confirm that

More information

BSI-CC-PP for

BSI-CC-PP for for Protection Profile for the Security Module of a Smart Meter Mini-HSM (Mini-HSM Security Module PP) - Schutzprofil für das Sicherheitsmodul des Smart Meter Mini-HSM, V1.0 developed by Federal Office

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Asseco Data Systems S.A. Certum CA, ul. Bajeczna 13 71-838 Szczecin, Poland to confirm that its trust

More information

Assurance Continuity Maintenance Report

Assurance Continuity Maintenance Report IFX_CCI_000003h, IFX_CCI_000005h, IFX_CCI_000008h, IFX_CCI_00000Ch, IFX_CCI_000013h, IFX_CCI_000014h, IFX_CCI_000015h, IFX_CCI_00001Ch and IFX_CCI_00001Dh design step H13 including optional software libraries

More information

fulfils all requirements for extended protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for extended protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Finanz Informatik Technologie Service GmbH & Co. KG Richard-Reitzner-Allee 8 85540 Haar, Germany to

More information

BSI-CC-PP-0088-V for

BSI-CC-PP-0088-V for BSI-CC-PP-0088-V2-2017 for Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12 and DBMS PP Extended Package - Access History (DBMS PP_EP_AH) Version 1.02 developed by DBMS Working

More information

Audit Attestation for. T-Systems International GmbH

Audit Attestation for. T-Systems International GmbH Space LOGO CAB Audit Attestation for T-Systems International GmbH Reference: AA2018072004 Essen, 20.07.2018 To whom it may concern, This is to confirm that TÜV Informationstechnik GmbH has successfully

More information

CC withinthe Context of the EU Privacy Seal - EuroPriSe

CC withinthe Context of the EU Privacy Seal - EuroPriSe CC withinthe Context of the EU Privacy Seal - EuroPriSe TÜV Informationstechnik GmbH -TÜViT - Overview 1. Motivation 2. Data Privacy 3. European Privacy Seal EuroPriSe 4. CC and EuroPriSe 5. Conclusion

More information

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov

Adversary Models. CPEN 442 Introduction to Computer Security. Konstantin Beznosov Adversary Models CPEN 442 Introduction to Computer Security Konstantin Beznosov why we need adversary models? attacks and countermeasures are meaningless without 2 elements of an adversary model objectives

More information

Unofficial Part 4 of the Common Criteria. mandag 31. august 2009

Unofficial Part 4 of the Common Criteria. mandag 31. august 2009 Unofficial Part 4 of the Common Criteria Lisa Lipphard, Senior Systems Security Engineer James Arnold, AVP Technical Director 22 September 2009 Synopsis Problems Proposal Security Problem Definitions Threats

More information

fulfils all requirements for very high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for very high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company akquinet AG Paul-Stritter-Weg 5 22297 Hamburg, Germany to confirm that its dual site data center of

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Bundesnotarkammer Burgmauer 53 50667 Köln, Germany to confirm that its trust service BNotK qualifizierte

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

BSI-CC-PP for

BSI-CC-PP for for Common Criteria PP Configuration Machine Readable Electronic Documents - Optionales Nachladen (Optional Post-Emission Updates) [MR.ED-ON-PP] developed by Federal Office for Information Security Federal

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Common Criteria. Introduction Emilie Barse Magnus Ahlbin

Common Criteria. Introduction Emilie Barse Magnus Ahlbin Common Criteria Introduction 2015-02-23 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

Guidelines. AZT Automotive GmbH * Allianz Center for Technology. Requirements for virtual vehicle keys

Guidelines. AZT Automotive GmbH * Allianz Center for Technology. Requirements for virtual vehicle keys Guidelines AZT Automotive GmbH * Allianz Center for Technology Requirements for virtual vehicle keys Technical guidelines for implementing networked and securitycritical functions from the insurance company

More information

to confirm that its document management- und archiving solution fulfils all applicable audit criteria for document management solutions

to confirm that its document management- und archiving solution fulfils all applicable audit criteria for document management solutions The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Airbus S.A.S. 1 Rond Point Maurice Bellonte 31707 Blagnac France to confirm that its document management-

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company RIPE NCC Singel 258 1016 AB Amsterdam The Netherlands to confirm that its software product Resource

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Lecture 02 ( ) Concepts of Safety and Security. Safety: IEC and other norms & standards. Where are we? The Relevant Question.

Lecture 02 ( ) Concepts of Safety and Security. Safety: IEC and other norms & standards. Where are we? The Relevant Question. Where are we? Systeme hoher Qualität und Sicherheit Universität Bremen, WS 2013/14 Lecture 02 (28.10.2013) Concepts of Safety and Security Christoph Lüth Christian Liguda Lecture 01: Concepts of Quality

More information

Certification Report

Certification Report EAL 3 Evaluation of Thales Communications S. A. Internal Communications Management System (ICMS) Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation

More information

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation

BSI-CC-PP for. Java Card Protection Profile - Open Configuration, Version December developed by. Oracle Corporation BSI-CC-PP-0099-2017 for Java Card Protection Profile - Open Configuration, Version 3.0.5 December 2017 developed by Oracle Corporation Federal Office for Information Security (BSI), Postfach 20 03 63,

More information

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Finanz Informatik GmbH & Co. KG Theodor-Heuss-Allee 90 60486 Frankfurt a. M., Germany to confirm that

More information

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 6 pages.

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 6 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Bayer Business Services GmbH Düsseldorfer Straße 600 51061 Leverkusen, Germany to confirm that its security

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Dt. Rentenversicherung Rheinland Königsallee 71 40194 Düsseldorf, Germany to confirm that its trust

More information

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company LVM Versicherung Kolde-Ring 21 48126 Münster, Germany to confirm that its security area Data Center

More information

The appendix to the certificate is part of the certificate and consists of 3 pages.

The appendix to the certificate is part of the certificate and consists of 3 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company FNMT Real Casa de la Moneda C/Jorge Juan, 106 28009 Madrid, Spain to confirm that its trust service

More information

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc.

FeliCa Approval for Security and Trust (FAST) Overview. Copyright 2018 FeliCa Networks, Inc. FeliCa Approval for Security and Trust (FAST) Overview Introduction The security certification scheme called FeliCa Approval for Security and Trust (FAST) has been set up to enable the evaluation and certification

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Countermeasures against Cyber-attacks

Countermeasures against Cyber-attacks Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure

More information

Audit Attestation for FINA

Audit Attestation for FINA Space LOGO CAB Audit Attestation for FINA Reference: AA2018083101 Essen, 31.08.2018 To whom it may concern, This is to confirm that TÜV Informationstechnik GmbH has successfully audited the CAs of the

More information

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for high protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company PostFinance AG Mingerstrasse 20 3030 Bern, Switzerland to confirm that its dual site data center Bern-Engehalde

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Korean National Protection Profile for Single Sign On V1.0 Certification Report

Korean National Protection Profile for Single Sign On V1.0 Certification Report KECS-CR-17-58 Korean National Protection Profile for Single Sign On V1.0 Certification Report Certification No.: KECS-PP-0822-2017 2017. 8. 18 IT Security Certification Center History of Creation and Revision

More information

fulfils all requirements of the SIG/TÜViT Evaluation Criteria

fulfils all requirements of the SIG/TÜViT Evaluation Criteria The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company Stichting Internet Domeinregistratie Nederland Meander 501 6825 MD Arnhem, The Netherlands to confirm

More information

Automotive Attack Surfaces. UCSD and University of Washington

Automotive Attack Surfaces. UCSD and University of Washington Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal

More information

Predictive Assurance

Predictive Assurance Predictive Assurance Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) 9 ICCC Jeju, Korea September 2008 Irmela Ruhrmann Head of Division Certification,

More information

DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC15408

DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC15408 DATA SECURITY INFORMATION COMMON CRITERIA ISO-IEC1408 TASKALFA 601 i/8001 i REV-1.1 /March 201 ~ K!::IDCERa Document Solutions Contents Information Data Security KitE IEEE 2600-1 TASKALFA 601 i/8001 i

More information

Legal Regulations and Vulnerability Analysis

Legal Regulations and Vulnerability Analysis Legal Regulations and Vulnerability Analysis Bundesamt für Sicherheit in der Informationstechnik (BSI) (Federal Office for Information Security) Germany Introduction of the BSI National Authority for Information

More information

The German IT Security Certification Scheme. Joachim Weber

The German IT Security Certification Scheme. Joachim Weber The German IT Security Certification Scheme Joachim Weber The German IT Security Certification Scheme 1. The role of the BSI 2. The German IT Certificate Scheme 3. Certification procedures in detail 4.

More information

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme

CC Part 3 and the CEM Security Assurance and Evaluation Methodology. Su-en Yek Australasian CC Scheme CC Part 3 and the CEM Security Assurance and Evaluation Methodology Su-en Yek Australasian CC Scheme What This Tutorial Is An explanation of where Security Assurance Requirements fit in the CC evaluation

More information

Audit Attestation for. Fabrica Nacional de Moneda y Timbre Real Casa. de la Moneda

Audit Attestation for. Fabrica Nacional de Moneda y Timbre Real Casa. de la Moneda Space LOGO CAB Audit Attestation for Fabrica Nacional de Moneda y Timbre Real Casa de la Moneda Reference: AA2018041201 To whom it may concern, Essen, 12.04.2018 This is to confirm that TÜV Informationstechnik

More information

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company ISC Münster eg Anton-Bruchausen-Straße 8 48147 Münster, Germany to confirm that its security area Data

More information

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile

More information

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr. Applied IT Security Device Security Dr. Stephan Spitz Stephan.Spitz@gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System Security

More information

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages.

fulfils all requirements for medium protection of the criteria catalogue The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company MK Netzdienste GmbH & Co. KG Marienwall 27 32423 Minden, Germany to confirm that its security area Rechenzentrum

More information

Security Target Sensor for digital tachograph LESIKAR TACH2

Security Target Sensor for digital tachograph LESIKAR TACH2 1 (70) Subject Sensor for digital tachograph LESIKAR TACH2 2 (70) Contents 1 ST Introduction... 5 1.1 ST Reference... 5 1.2 TOE Reference... 5 1.3 Document Overview... 5 1.4 TOE Overview... 6 1.4.1 Digital

More information

SUCCESS STORY INFORMATION SECURITY

SUCCESS STORY INFORMATION SECURITY SUCCESS STORY Landis+Gyr cares for security in Smart Metering Safety modules for Smart-Meter Gateways according to Common Criteria The fabrication of intelligent power meters, the so called Smart Meters,

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 7 February 2018 383-4-434 V1.0 Government of Canada. This document

More information

to confirm that the usability engineering process consisting of the sub-processes The appendix is part of the certificate and consists of 5 pages.

to confirm that the usability engineering process consisting of the sub-processes The appendix is part of the certificate and consists of 5 pages. The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company ISAR User Interface Design 237-101 Nanhuxiyuan, Wangjing 100102 Beijing, China to confirm that the usability

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Fortinet FortiMail V3.0 MR5 Secure Messaging Platform Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Network Intrusion Prevention System Protection Profile V1.1 Certification Report

Network Intrusion Prevention System Protection Profile V1.1 Certification Report KECS-CR-2005-04 Network Intrusion Prevention System Protection Profile V1.1 Certification Report Certification No. : CC-20-2005.12 12, 2005 National Intelligence Service This document is the certification

More information