Platform Security Plan
|
status: draft
security: YES
safety: ASIL_B
|
||||
Security management / Platform Security Plan#
Security Roles & Responsibilities#
Security Manager - will ensure that security activities are actively planned, developed, analyzed, verified and tested and managed throughout the life cycle of the project. As all the implementation of security functions takes place within module development, there is a security manager appointed in the module’s security plan, who defines the security process and creates a security management plan.
Security Engineer - performs the security analysis using methodologies such as TARA
Contributors - developers who follow secure coding guidelines
Continuous secure software development#
Secure coding guidelines#
All developers shall be aware of and shall adhere to the following secure coding guidelines for c++ and rust as applicable:
Automated code scanning#
The following tools should be part of the CI/CD pipeline and should run automatically for every patch, minor and major release:
Static code analysis tools such as coverity for c/c++ and clippy for rust
SCA (software composition analysis) tools - scanning of open source libraries for CVEs - such as RustSec Crates or Blackduck
Fuzz testing (semi automated) - someone has to create special harnesses for the fuzz testing - can be done by tools such as Google oss fuzz
- Regular checking of clean code by functional test coverage and
checking for cyclic dependencies etc.
Security Analysis or TARA (threat analysis risk assessment)#
Security analysis shall be performed on the features and how modules/components interact with one another to implement a feature
Analysis results shall be documented and shall serve as security requirements for the features.
Security code reviews#
Contributors should perform regular security code reviews. Assign a few developers as security champions who should receive security trainings to perform such code reviews.
Security Work Packages#
Deliverable |
Description |
Responsible Person |
|---|---|---|
Item definition |
defining boundaries, assets etc |
Security Manager/Engineer |
Data flow diagrams |
document the interaction and data flow between the components in a system |
Contributors |
TARA |
enumerate threats, analyze attack feasibility and impact, decide treatment (mitigate/transfer/accept/avoid). |
Security Engineer |
Cybersecurity goals |
Security goals should be defined for the whole S-CORE middleware. These goals will serve as the input for the security analysis. |
Security Manager |
Horizontal Security Requirements |
applicable to all modules/components |
Security Manager |
Security concepts resulting from the goals and TARA |
Security concepts should document different options and a favorable option should be implemented |
Contributors and Security Manager/engineer |
Hardening guide for Integrators |
Some identified risks are mitigated by hardening the platform. Such mitigations shall be part of this guide |
Contributors and Security Manager |
Security sign off process before releases |
A checklist should be created and signed to ensure that all documented risks are mitigated |
Contributors and Security Manager |
Vulnerability Management#
SBOMs needs to be defined and used in CVE scanning (SBOM driven CVE scanning). This process should be automated to run in the CI/CD pipeline.
When a vulnerability is reported or identified, the following tasks shall be performed by the following responsible persons:
Task |
Description |
Responsible Person |
|---|---|---|
Vulnerability Validation and classification |
Validating whether the reported issue is a security vulnerability and mapping it a known CWE (common weakness enumeration) |
Contributors |
CVSS score calculation |
Calculating CVSS score to understand the criticality of the reported vulnerability |
Security Engineer/Manager and contributors |
Prioritization |
Decision on when to issue a patch |
Security Manager and contributors |
Responsible disclosure |
Decide whether this should be disclosed or not. Request a CVE Id if needed to be disclosed. |
Security Manager |
Links to the tools#
TARA tools :
Title |
ID |
Status |
Realizes |
|---|---|---|---|
Change Management Plan |
draft |
||
Configuration Management Plan |
draft |
||
Documentation Management Plan |
draft |
||
Platform Management Plan |
draft |
||
Platform Quality Management Plan |
valid |
||
Platform Safety Plan |
draft |
||
Platform Security Plan |
draft |
||
Problem Resolution Plan |
draft |
||
Project Management Plan |
draft |
||
Release Management Plan |
draft |
||
Software Development Plan |
draft |
||
Software Verification Plan |
draft |
||
Tool Management Plan |
valid |