Comprehensive Cybersecurity Management Guide
Comprehensive Cybersecurity Management Guide
Organization Culture
WP-05-01 Cybersecurity policy, rules and processes RQ-05-01 RQ-05-02 RQ-05-03 RQ-05-04 RQ-05-05 RQ-05-06 RQ-05-07 RQ-05-08 RQ-05-09
Cybersecurity Management
Organizational and Product
WP-05-02 Evidence of competence management, awareness management and continuous improvement RQ-05-07 RQ-05-08
5.0 Overall Cybersecurity Management WP-05-03 Evidence of the organization’s management systems RQ-05-11 RQ-05-12
WP-05-04 Evidence of tool management RQ-05-14
WP-05-05 Organizational cybersecurity audit report RQ-05-17
WP-06-01 Cybersecurity plan RQ-06-01 RQ-06-02 RQ-06-03 RQ-06-04 RQ-06-05 RQ-06-06 RQ-06-07 RQ-06-09 RQ-06-10 RQ-06-11 RQ-06-12 RQ-06-14 RQ-06-15 RQ-06-16 RQ-06-17 RQ-06-18 RQ-06-19 RQ-06-20 RQ-06-21 RQ-06-22
WP-06-02 Cybersecurity case RQ-06-23
6.0 Project Dependent Cybersecurity Management
design WP-06-03 Cybersecurity assessment report RQ-06-24 RQ-06-25 RQ-06-26 RQ-06-27 RQ-06-28 RQ-06-30 RQ-06-31 RQ-06-32
release WP-06-04 Release for post-development report RQ-06-33 RQ-06-34
Supporting Processes
WP-07-X1 Supplier capability RQ-07-01
Distribut
Activitie
Activities
8.4 Cybersecurity Event Assessment operation WP-08-04 Cybersecurity event assessment RQ-08-04
8.5 Vulnerability Analysis operation WP-08-05 Vulnerability analysis RQ-08-05 RQ-08-06
design WP-08-06 Vulnerability management RQ-08-07
8.6 Vulnerability Management
design WP-08-X1 Apply incident response protocols RQ-08-08
Concept and Product Development Phases
9.3 Item Definition requirements WP-09-01 Item definition RQ-09-01 RQ-09-02
design WP-09-02 Threat analysis and risk assessment RQ-09-03 RQ-09-04
design WP-09-03 Cybersecurity goals RQ-09-05
Concept
Refinement of Cybersecurity Requirements and requirements WP-10-02 Cybersecurity requirements for post-development RQ-10-03
10.4.1
Architectural Design foundation WP-10-03 Documentation of the modelling, design, or programming languages and coding guidelines RQ-10-04 RQ-10-05
verification WP-10-04 Verification report for the refined cybersecurity specification RQ-10-08
verification WP-10-05 Vulnerability analysis report RQ-10-07 RC-10-12 RQ-10-13
10.4.2 Integration and Verification implementation WP-10-06 Integration and verification specification RQ-10-10
implementation WP-10-07 Integration and verification reports RQ-10-09 RQ-10-11 RC-10-12 RQ-10-13
11.0 Cybersecurity Validation of the Item at Vehicle Level verification WP-11-01 Validation report RQ-11-01 RQ-11-02
Post-Development Phases
foundation WP-12-01 Production control plan RQ-12-01 RQ-12-02
Maintenance, End of
12.0 Production
Decommissioning
Cybersecurity
Support and
Production,
should be requirement
requirement without work product
work product missing
434 Activity
Organization Culture
5.4.1 Cybersecurity Governance WP-05-01
Organizational Cybersecurity
Activities
WP-08-03
Continual
Activities
WP-10-02
10.4.1 Refinement of Cybersecurity Requirements and Architectural Design
WP-10-03
WP-10-04
WP-10-05
10.4.2 Integration and Verification
WP-10-06
10.4.3 Specific Requirements for Software Development WP-10-07
11.0 Cybersecurity Validation of the Item at Vehicle Level WP-11-01
Post-Development phases
WP-12-01
Maintenance, End of
12.0 Production
Decommissioning
WP-12-X1
Operations and
Cybersecurity
Support and
Production,
WP-13-01
13.3 Cybersecurity Incident Response
WP-13-X1
13.4 Updates WP-13-X2
14.3 End of Cybersecurity Support WP-14-01
14.4 Decommissioning WP-14-X1
Threat Analysis and Risk Assessment Methods
WP-15-01
Threat Analysis and Risk
WP-15-02
15.4 Threat Scenario Identification WP-15-03
15.5 Impact Rating WP-15-04
15.6 Attack Path Analysis WP-15-05
15.7 Attack Feasibility Rating WP-15-06
15.8 Risk Determination WP-15-07
15.9 Risk Treatment Decision WP-15-08
Cybersecurity plan
Cybersecurity case
Cybersecurity assessment report
Release for post-development report
Supplier capability
Item definition
Threat analysis and risk assessment
Cybersecurity goals
Cybersecurity claims
Verification report
Cybersecurity concept
Verification report of cybersecurity concept
Refined cybersecurity specification
Cybersecurity requirements for post-development
Documentation of the modelling, design, or programming languages and coding guidelines
Verification report for the refined cybersecurity specification
Vulnerability analysis report
Integration and verification specification
Integration and verification reports
Validation report
Damage scenarios
Identified assets and cybersecurity properties
Threat scenarios
Impact rating, including the associated impact categories of the damage scenarios
Identified attack paths
Attack feasibility rating
Risk values
Risk treatment decision per threat scenario
262 Activity 262 Wor
2-5.5.1
2-5.5.1
2-5.4.3 Management of safety anomalies regarding functional safety 2-5.5.1
2-5.4.2 Safety culture 2-5.5.1
2-5.4.4 Competence management 2-5.5.2
2-6.4.11 Functional safety audit 2-6.5.5
2-5.4.5 Quality management system 2-5.5.3
2-5.4.6 Project-independent tailoring of safety lifecycle 2-5.5.3
8-11.4.1-5 Software tool criteria evaluation 8-11.5.1
8-11.4.6-9 Software tool qualification 8-11.5.2
2-6.4.6 Planning and coordination of the safety activities 2-6.5.3
2-6.4.6 Planning and coordination of the safety activities 2-6.5.3
2-6.4.5 Tailoring of the safety activities 2-6.5.3
[Link] Reuse of an existing element 2-6.5.2
8-16-4.2-4 Safety case 8-16-5-1
8-12.4.2 Specification of software component qualification 8-12-5.1
8-12.4.2 Specification of software component qualification 8-12.5.2
8-12.4.3 Verification of qualification of a software component 8-12.5.3
2-6.4.8 Safety case 2-6.5.4
2-6.4.12 Functional safety assessment 2-6.5.5
2-6.4.9 Confirmation measures 2-6.5.5
2-6.4.13 Release for production 2-6.5.6
[Link](b)
[Link](d)
[Link](h)
[Link](b)
[Link](e)
[Link](a)
[Link](g)
[Link](a)
[Link](c)
[Link](f)
[Link]
[Link]
[Link]
RQ-05-01 cybersecurity policy X
Organizational Cybersecurity Management
ation
Valid
WP-11-01
ty
WP-12-01
RQ-12-02 production control plan specification X
on
ort Mainten
ance
mmis
Deco
End
and
of
out of scope
no WP.29 product
WP.29 product match
Production, Operations
Organizational and Product Distributed Continual Cybersecurity Concept Product Development, and Maintenance, End of Threat Analysis and Risk
Cybersecurity Management Activities Activities Cybersecurity Validation Cybersecurity Support and Assessment Methods
Decommissioning
AVCDL requirement
AVCDL phase
WP-07-X1
WP-07-X2
WP-08-X1
WP-12-X1
WP-13-X1
WP-13-X2
WP-14-X1
WP-05-01
WP-05-02
WP-05-03
WP-05-04
WP-05-05
WP-06-01
WP-06-02
WP-06-03
WP-06-04
WP-07-01
WP-08-01
WP-08-02
WP-08-03
WP-08-04
WP-08-05
WP-08-06
WP-09-01
WP-09-02
WP-09-03
WP-09-04
WP-09-05
WP-09-06
WP-09-07
WP-10-01
WP-10-02
WP-10-03
WP-10-04
WP-10-05
WP-10-06
WP-10-07
WP-11-01
WP-12-01
WP-13-01
WP-14-01
WP-15-01
WP-15-02
WP-15-03
WP-15-04
WP-15-05
WP-15-06
WP-15-07
WP-15-08
Title
1 Training X X
2 Roles and Responsibilities X X
3 Toolchain Support X X
4 Definition of Security Requirements
Foundation
5 Code Securely
6 Deprecate Unsafe Functions
7 Static Analysis
8 Dynamic Program Analysis
9 Security Code Review
10 Fuzz Testing
11 Implementation Gate X
1 Penetration Testing X
Verification
2 Archive
3 Release Gate
1 Identify and Confirm Vulnerabilities on an Ongoing Basis X X X X X
Operation
4 Secure Deployment X
1 Apply Decommissioning Protocol
1 AVCMDS X
Supplier
WP-05-01
WP-05-02
WP-05-03
WP-05-04
WP-05-05
Title
1 training catalog X X
1
2 system to track training participation X X
2 1 roles and responsibilities document X
3 1 list of approved tools and components X
1 global security goals
4
Foundation
5 1 secure development
6 1 currently used deprecated functions document
7 1 static analysis report
8 1 dynamic analysis report
9 1 secure code review summary
Imple 10 1 fuzz testing report
11 1 implementation phase gate
1 1 penetration testing report
Verification
2 1 archive manifest
3 1 release phase gate
1 1
Operation
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no 434 product
434 product match
X
WP-06-01
WP-06-02
X
WP-06-03
nizational and Product
rsecurity Management
WP-06-04
WP-07-X1
WP-07-X2
Activities
Distributed
WP-07-01
X
WP-08-01
X
WP-08-02
X
WP-08-03
X
WP-08-04
X
Activities
WP-08-05
X
X
WP-08-06
Continual Cybersecurity
X
WP-08-X1
X
X
WP-09-01
X
WP-09-02
X
WP-09-03
X
WP-09-04
Concept
X
WP-09-05
X
WP-09-06
X
WP-09-07
X
WP-10-01
X
WP-10-02
X
WP-10-03
WP-10-04
Product Development,
Cybersecurity Validation
X
X
X X X X
X X X
X X X
X
X
X X
as supporting material
Production, Operations
Product Development, and Maintenance, End of Threat Analysis and Risk
ybersecurity Validation Cybersecurity Support and Assessment Methods
Decommissioning
WP-12-X1
WP-13-X1
WP-13-X2
WP-14-X1
WP-10-05
WP-10-06
WP-10-07
WP-11-01
WP-12-01
WP-13-01
WP-14-01
WP-15-01
WP-15-02
WP-15-03
WP-15-04
WP-15-05
WP-15-06
WP-15-07
WP-15-08
X .
X
X X
X X
X
X X X X X
X
X
X
X X
X X
X X
X
X
X
X
Foundation Requirements Design Implementation Verification Release Operation Decom Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
RQ-05-01 cybersecurity policy
Organizational Cybersecurity Management
WP-10-07
RC-10-12 verification of weakness minimization X X
RQ-10-13 documented rationale for not testing X X
RQ-11-01 validation activities X
WP-11-01
RQ-11-02 validation activities rationale X
Production
ort Mainten
Threat Analysis and Risk Assessment Supp ns and
ance
mmis
Deco
End
and
of
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no 434 product
434 product match
ISO 26262 Part 2
2-5.4.2
2-E.3.3 [c]
2-E.3.2 [c]
2-E.3.4 [a]
2-E.3.3 [a]
2-E.3.2 [a]
2-E.3.1 [a]
2-E.3.3 [e]
2-E.3.3 [d]
2-E.3.3 [b]
2-E.3.2 [b]
2-E.3.1 [b]
coordinated OT
project planning
safety strategies
incident response
safety risking of threats
safety review of threats
cybersecurity strategies
threat countermeasures
identified countermeasures
threat process harmonization
effective communication channels
training catalog
1
2
out of scope
roles and responsibilities document
no '262 product
X
1
3
X
X
1
X
X
2
decommissioning plan
X
1
9
deployment plan
X
X
X
X
X
X
X
X
X
1
1
X
X
2
4
threat report
out of scope items for which the AVCDL provides material which may be used as supporting material
1
5
secure development
currently used deprecated functions document
static analysis report
Implementation
1 1 1 1
5 6 7 8
1 1 1
2 3 4
1 1 1
1 2 3
X
X
X X 1
2 3 4
decommissioning report
AVCMDS
Supplier Self-reported Maturity
Decom Supplier
1 1 1
1 2 3
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
supplemental material
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
supplemental material
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
General
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R155 requirement
R155 requirement match
Q9.1
Q8.1
Q7.6
Q7.5
Q7.4
Q7.3
Q7.2
Q7.1
Q6.1
Q5.4
Q5.3
Q5.2
Q5.1
Q4.1
Q3.2
Q3.1
Q2.1
Q1.4
Q1.3
Q1.2
Q1.1
use of QMS
risk treatment
risk assessment
risk identification
cybersecurity culture
roles and responsibilities
cybersecurity monitoring
cybersecurity requirements
training catalog
1
2
out of scope
roles and responsibilities document
1
3
X
X
cybersecurity monitoring plan
7
2
X
X
X
incident response plan
1
8
X
decommissioning plan
1
9
X
X
X
X
X
X
X
10
deployment plan
X
X
X
1
1
2
4
threat report
1
5
1 1 1 1
5 6 7 8
1 1 1
2 3 4
X
X
X
X
X
1 1
2 3
X
X
X
X
X
X
X
X
X
X
X X 1
2 3 4
decommissioning report
X
AVCMDS
X
1 1 1 1
1 1 2 3
TARA
cybersecurity culture
release to production
cybersecurity monitoring
cybersecurity decommissioning
cybersecurity event assessment
training catalog
1
2
out of scope
roles and responsibilities document
1
3
X
Foundation
X
X
X
X incident response plan
1
8
X
X
decommissioning plan
1
9
X
threat prioritization plan
1
X
X
10
deployment plan
X
product-level security requirements
1 2 1
2
1
1
X
X
X
X
X
2
4
X
X
X
X
X
X
X
X
threat report
1
5
1 1 1 1
5 6 7 8
X
10 11
1 1 1
2 3 4
X
X
1 1
2 3
X
X
X
X
X
X
X
X X 1
2 3 4
decommissioning report
X
AVCMDS
X
1 1 1 1
1 1 2 3
WP-6.4.2 Vehicle configuration information documentation RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link]
6 WP-6.4.3 Software update campaign documentation RQ-[Link] RQ-[Link]
WP-6.4.4 Software update package documentation RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link]
WP-6.4.5 Failure recovery documentation RQ-[Link]
Software Development
WP-7.4.1 Risk management documentation RQ-[Link] RQ-[Link] RQ-[Link]
Developme
Software
WP-8.4.3 Verification and validation documentation RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link]
WP-8.4.4 Release approval documentation RQ-[Link]
Campaign Operations
WP-9.4.1 Software update campaign plan documentation RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link]
Operatio
Campaig
9 WP-9.4.2 Software update campaign execution documentation RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link] RQ-[Link]
ns
n
should be requirement
requirement without work product
work product missing
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
secure development
global security goals
archive manifest
training catalog
threat report
AVCMDS
RQ-[Link] software updates done per 24089
RQ-[Link] udpate rules and processes
Organization Level Requirements
X
Project Level
out of scope Note: managed at the organizational level or by a different group within the organization
out of scope items for which the AVCDL provides material which may be used as supporting material
no 089 product
089 product match
Foundation Requirements Design Implementation Verification Release Operation Deco Supplier
1 2 3 4 5 6 7 8 9 10 1 2 1 2 3 4 5 1 2 3 4 5 6 7 8 9 10 11 1 2 3 4 1 2 3 1 2 3 4 1 1 2 3
1 2 1 1 1 2 1 1 1 2 1 1 1 1 2 1 1 1 1 1 2 3 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 X X 1 1 1 1 1
decommissioning report
dynamic analysis report
threat modeling report
incident response plan
archive manifest
training catalog
threat report
AVCMDS
RQ-[Link] udpate rules and processes
[Link] information documented and secured RQ-[Link] existing standards compliance 21434 compliance
RQ-[Link] document management system
RQ-[Link] configuration management system
[Link] software/hardware information identified
RQ-[Link] vehicle configuration management infrastructure
[Link] RXSWIN access and update no '089 requirements
[Link] RXSWIN verification no '089 requirements
RQ-[Link] systems/components dependency indentification
[Link] system dependency tracking RQ-[Link] existing software / hardware dependencies
Processes
[Link].1 reversion to good state on update failure RQ-[Link] in-vehicle update failure safety process X X X X
[Link].2 sufficient power to perform update RQ-[Link] update conditions met process X X X X
[Link].3 safe state to perform update RQ-[Link] vehicle safe throughout update process X X X X
OTA
[Link] user informed prior to udpate attempt RQ-[Link] related party communication process
[Link] no updates putting vehicle in unsafe state while driving RQ-[Link] vehicle safe throughout update process X X X X
[Link] user informed upon update completion RQ-[Link] related party communication process
[Link] no updates until all precautions met RQ-[Link] update conditions met process X X X X
out of scope
out of scope items for which the AVCDL provides material which may be used as supporting material
no R156 requirement
R156 requirement match