Refine Your Search

Search Results

Viewing 1 to 5 of 5
Standard

Security Testing Methods

2016-08-26
WIP
J3061-2
This document serves as the initial framework for defining the subject. The document serves as a detailed breakdown of security testing methods related to software and hardware testing. it is to remain vendor agnostic and focus on the type of testing available at the time of release. This is not a comprehensive list and is intended to be updated on a yet to be defined timeline.
Standard

Security Testing Tools

2016-08-26
WIP
J3061-3
This document serves as an internal list of manufacturers of security related tools and their capabilities. This list is not intended as an endorsement of any manufacturer but rather a list of examples and capabilities that exist within the market.
Standard

Automotive Cybersecurity Integrity Level (ACsIL)

2016-06-15
WIP
J3061-1
Review existing classification schemes from other industries and existing ideas that were presented at SAE or that may be being proposed or used in other organizations. Determine to use either an existing scheme or create a new classification scheme specific for the automotive industry from the existing or proposed methods or ideas (an integration or merging of the ideas). A Threat Analysis and Risk Assessment Method that would work with the classification scheme or from which we could map into a specific level in the cybersecurity integrity classification scheme a. This will require reviewing existing TARA methods and deciding on one or a tailored version of one Determine how to relate the ACSIL for safety-related threats to the ASIL from ISO 26262
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-02-19
WIP
J3061
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. The best practices are intended to be flexible, pragmatic, and adaptable in their further application to the vehicle industry as well as to other cyber-physical vehicle systems (e.g., commercial and military vehicles, trucks, busses). Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-01-14
CURRENT
J3061_201601
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. The best practices are intended to be flexible, pragmatic, and adaptable in their further application to the vehicle industry as well as to other cyber-physical vehicle systems (e.g., commercial and military vehicles, trucks, busses). Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems.
X