Threat Analysis and Risk Assessment (TARA) for implementers guide for ECUs.
Kawshol Sharma
Expert in cloud-focused device software development (connected car, ECUs/TCU/SDV and IIoT embedded application, services and gateways)
“If you know the enemy and know yourself, you need not fear the result of a hundred battle”.
What and why of TARA?
In Automotive industry cybersecurity is governed by these 2 standards bodies and depending on the market they are asked to comply by car manufacturers to suppliers of ECUs.
Threat Analysis and Risk Assessment (TARA) is a cybersecurity process used in the automotive industry and other safety-critical domains to identify and assess potential threats and risks to a system, like a vehicle's electronic control units (ECUs), communication networks, or software components.
The TARA process ensures that cybersecurity measures are adequately designed to address relevant risks, supporting regulatory compliance, and improving system resilience. The goal of TARA is to pinpoint the Vulnerabilities within an ECU architecture, communication network, software architecture and to develop strategies to reduce the RISK of exploitation.
What is achieved by TARA?
Workflow of the Risk analysis
Tools for doing TARA.
Below are the tools that provide different capabilities to do different things and connecting your TARA workflow to make your life easy depending on the complexity that you are handling.
On a vehicle level tool are more efficient as they do model standards provide standard library and generic threat library.
Using a tool to conduct an ECU (Electronic Control Unit) threat analysis can bring efficiency, but it also presents several limitations and challenges. Here are some common issues that may arise when relying heavily on a tool.
In my personal experience, tools may lack of contextual understanding, may lack insights into the specific functional and operational context of the ECU system. They often rely on pre-defined threat models that may not fully capture the ECU's unique environment, use cases, or interactions with other components internally or in the vehicle. They put boundaries. If the situation is complex, Tools can struggle to accurately model and analyze these interdependencies. One more issue is now you need to understand the tool and loose focus of subject.
This also many be dictated by the organizational QA level. Tool or not tool, the fundamentals of RISK analysis are same.
TARA practical way...
The TARA Framework is a Tool that helps to Assess Risks and How to Manage them. To do so, it proposes to classify Risks according to 2 variables:
Defines 4 scenarios depending on whether these variables have High or Low values.
领英推荐
Doing a risk analysis a practical example.
Example use-case: Most common example is external or internal entry to the ECU in subject. After the SDV (software defined vehicle architecture )most of the time TCU is providing the direct access to the ECU to communicate with a communication channel. And the use case possible is Spoofing done by External Entity.
There could be many possibilities, we choose one condition out of use-case example “OEM Backend Server (OMA-DM server maybe ) compromised by an attacker, and this may lead to unauthorized access to SMS sender (spoofed) user of the ECU software who consider using a standard authentication mechanism to identify the work with external entity”.
Define threat types and severity, likelihood scale and stakeholder.
Start by defining stake holder (OEM and End user ...), threat class of spoofing..., Asset in target say SMS handler, this could cause financial and operation ? privacy and legislation could be compromised? also identify what is the effect. Recode these things in the tool you are using. ?These decisions and findings should help you making decisions.
Identifying Assets and Threats
Start identifying assets (SMS handler) as indicated above is the main component, but it should be connected to many and the real work is done her to make sure the process in focus is secure enough. Tool may help you but judge yourself if the tools is enough.
example :
Here you start your analysis for the threat identification. The aim her is to find the scores for Safety, Financial damage, operational damage and privacy and legislation issues.
There may be lot of things happening here depending on use-case, many processes are coming together to make the use-case happen. Until here we ware only scratching the surface, from here you start seeing the issues and results.
"Penetration testing" for embedded systems in Operational Technology (OT) environments involves several specialized techniques to ensure the security and reliability of these critical systems.
If such a test is done use report of them or ask the design team to come up with the details for there system. We shall discuss them sometime in future posts in detail.
Privacy Threshold Analysis, Privacy Threat Analysis
Privacy Threshold Analysis (PTA) is a preliminary assessment used to determine whether a system, project, or process involves the collection, use, or storage of Personally Identifiable Information (PII) and, if so, whether further privacy analysis is required, such as a Privacy threat Analysis.
Refer to the tools and ask question like collection example, is user data collected with consent, Storage is user allowing you to store the data purpose of this personal data, are you archiving or passing this data to other process or external entity.
Risk Assessment Report.
A security risk assessment report for Operational Technology (OT) devices typically covers several key areas to ensure comprehensive evaluation and mitigation of risks.
Here are the main topics, Asset inventory, threat landscape, vulnerability assessment, Risk matrix. recommendation and compliance issues if any, it should contain all the specific needs of the system and sub-system and assessed risks.
Here you map the risk to requirements and make sure that you meet the specs. Threat matrix is used to take the action if system needs improvement and reassessment after audit which the system or sub-system is usable.
Hope this gives you a practical idea what is being achieved here in TARA and what benefits it brings to the product. Depending on the tool used you may be needed to have more learning on tools specific.