Proposal for Next Actions - Based on Threats Table Approach -

Slides:



Advertisements
Similar presentations
Review of ITS/IG Activity March 15, 2013 WP29/ITS Informal Group Takao Onoda Ministry of Land, Infrastructure, Transport and Tourism, Japan Document No.
Advertisements

REPORT TO GRPE 65 TH SESSION EVE IWG 1 Electric Vehicles and the Environment (EVE IWG) Informal document No. GRPE (65 th GRPE, January 2012,
Dr. Yuying Chris Chang Project Writing ( 專題製作 )
Task Force on Electro-magnetic Compatibility (TF EMC) Status report of TF to GRE-75 Friday, 8 April 2016 Informal document GRE (75 th GRE, 5-8 April.
CMGT 430 Week 2 Individual Applying Risk Management Consulting Check this A+ tutorial guideline at Week-2-Individual-Applying-Risk-Management-
Status report on the activities of TF-CS/OTA
Security Management in Practice
Suggestion for Summarizing Process of the Principles
Outcome TFCS-05 // May OICA, Paris
EVS-11-22e Summary Report on TF8 Washington DC, US 2016/06/16.
Co-Sponsors: China, Japan, EU and US 59th Session GRSP May 9-13, 2016
Status report on the activities of TF-CS/OTA
30-31, August 2017 Den Hague, Netherlands)
Main problems of NL proposal for UN Software Regulation
Case studies on software update
1st Informal Group on WLTP Palais des Nations, Geneva
Chair: Jin Seop Park, Republic of Korea Secretary: Thomas Kinsky, OICA
Assembling The Classroom Test
Outcome TFCS-04 // March ITU, Geneva
Museums + Heritage webinar, 30 November 2017
Suggestion on software update
Outcome TFCS-07 // August NH Den Haag, NL
Outcome TFCS-11// February Washington DC
Status report on the activities of TF-CS/OTA
Outcome TFCS-11// February Washington DC
Status Report to GRB #68 Task Force on Reverse Warning issues
Security Protection Goals
Final Report of TF-CS/OTA September The Amba Hotel, London
Outcome of TFCS-12 - summary slides - (detailed meeting minutes will be provided separately) April The Shilla Seoul, ROK.
Transmitted by the IWVTA Informal Group
Mitigation Principles PROPOSAL OICA/CLEPA
Japan’s proposal for security regulation
Status report on the activities of TF-CS/OTA
Summary The group reviewed the proposed consolidated mitigations (column BE) prepared by Dr. Handley. OICA/CLEPA sub-group have noted their suggested.
ESS Security and Secure exchange of information Expert Group (E4SEG) DIME/ITDG SG ESS IT Security Framework Pascal Jacques ESTAT B2 Local Security Officer.
Outcome TFCS-06 // June TIA, Arlington/VA (USA)
Informal document GRVA nd GRVA, 28 Jan Feb. 2019
Status report from UNECE Task Force on Cyber Security &
5 × 7 = × 7 = 70 9 × 7 = CONNECTIONS IN 7 × TABLE
5 × 8 = 40 4 × 8 = 32 9 × 8 = CONNECTIONS IN 8 × TABLE
Japan’s opinion on SWIN
Status Report to GRB #69 Task Force on Reverse Warning issues
4 × 6 = 24 8 × 6 = 48 7 × 6 = CONNECTIONS IN 6 × TABLE
5 × 6 = 30 2 × 6 = 12 7 × 6 = CONNECTIONS IN 6 × TABLE
New Assessment & Test Methods
Informal document GRVA st GRVA, September 2018
Task Force – Cyber Security, Data Protection and Over-the-Air issues
Status report of TF-CS/OTA
Draft Guidelines for application of the Unique Identifier (UI)
10 × 8 = 80 5 × 8 = 40 6 × 8 = CONNECTIONS IN 8 × TABLE MULTIPLICATION.
3 × 12 = 36 6 × 12 = 72 7 × 12 = CONNECTIONS IN 12 × TABLE
Progress report of GRSG informal group
Informal document GRSG Rev.1
Software Update - Type approval related issues -
Overview of the recommendations on software updates
from Japan TFCS September 2018
5 × 12 = × 12 = × 12 = CONNECTIONS IN 12 × TABLE MULTIPLICATION.
Informal document GRSG
Status report on the activities of TF-CS/OTA
Inputs Regard to “Test Phase” to TFCS
Report of Japanese Test Phase <Cyber Security>
A proposal for approach to proceed work in Cybersecurity TF
5 × 9 = 45 6 × 9 = 54 7 × 9 = CONNECTIONS IN 9 × TABLE
ACSF B2 and C2 Industry expectations from ACSF IG Tokyo meeting
3 × 7 = 21 6 × 7 = 42 7 × 7 = CONNECTIONS IN 7 × TABLE
TF5: Cell/module/system test
Access to data requirementS
Status of discussion after 7th meeting
EDR/DSSAD IWG Status Report
Status of discussion after 8th meeting
Presentation transcript:

Proposal for Next Actions - Based on Threats Table Approach - Japan (Security TF of ITS/AD 13-14. June 2017 @TIA / Arlington)

Background The format and content of the table was agreed. Source: Outcome TFCS-05 // 10-11 May 2017 @ OICA, Paris (TFCS-05-19) The format and content of the table was agreed. The table will now be used as basis for the future work on mitigations (TFCS-05-05-Rev1) Action items for next session: OICA/CLEPA and Japan to provide example or working approach for mitigations

Then, matched/unmatched items were identified. Process of Matching between the threats and the principles Japan worked on matching between the threats and the existing principles. The point of matching was that the “principles” can mitigate the “threats” on the table. Then, matched/unmatched items were identified. 26 items 86 items Threats Principles + 8 items by UK DfT

Proposal of next actions Items listed on the threat analysis table (TFCS-05-05-Rev1) - Total 86 items - Conditions of existing principles (ITS/AD, UK DfT) Proposed Next Actions 62 items Existing principles are applicable. (UK DfT could cover more.) Review the matching / Modification of principles (If necessary) 24 items Existing principles are NOT applicable. Reference/Development of principles (Mitigations to justify the principles are necessary) 0(Zero) items 12 principles are unmatched (1 principle by UK DfT is unmatched.) Reasoning for these principles (Principles for data protection will be majority. Responses in post attack should be considered.) The count is ITS/AD guideline basis.

Conclusion The existing principles are useful. Many existing principles can be justified by the mitigations which OICA/CLEPA carried out with extended CIA approach. Even so, some existing principles should be modified. New items of threats which are not covered by existing principles should be discussed to create “additional principles”. Items of principles which are not mentioned on the “threats table” may be reasoned to be connected with other threats.