1、DD CEN ISO/TS17574:2009ICS 03.220.20; 35.240.60NO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWDRAFT FOR DEVELOPMENTElectronic feecollection Guidelinesfor security protectionprofiles (ISO/TS17574:2009)Copyright European Committee for Standardization Provided by IHS under licens
2、e with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-This Draft for Developmentwas published under theauthority of the StandardsPolicy and StrategyCommittee on 31 January2010 BSI 2010ISBN 978 0 580 64293 7Amendments/corrigenda issued since publicationDate Comm
3、entsDD CEN ISO/TS 17574:2009National forewordThis Draft for Development is the UK implementation of CEN ISO/TS 17574:2009. It supersedes DD CEN ISO/TS 17574:2004 which iswithdrawn.This publication is not to be regarded as a British Standard.It is being issued in the Draft for Development series of p
4、ublications andis of a provisional nature. It should be applied on this provisional basis,so that information and experience of its practical application can beobtained.Comments arising from the use of this Draft for Development arerequested so that UK experience can be reported to the international
5、organization responsible for its conversion to an international standard.A review of this publication will be initiated not later than 3 years afterits publication by the international organization so that a decision can betaken on its status. Notification of the start of the review period will bema
6、de in an announcement in the appropriate issue of Update Standards.According to the replies received by the end of the review period,the responsible BSI Committee will decide whether to support theconversion into an international Standard, to extend the life of theTechnical Specification or to withd
7、raw it. Comments should be sent tothe Secretary of the responsible BSI Technical Committee at BritishStandards House, 389 Chiswick High Road, London W4 4AL.The UK participation in its preparation was entrusted to TechnicalCommittee EPL/278, Road transport informatics.A list of organizations represen
8、ted on this committee can be obtained onrequest to its secretary.This publication does not purport to include all the necessary provisionsof a contract. Users are responsible for its correct application.Compliance with a British Standard cannot confer immunityfrom legal obligations.Copyright Europea
9、n Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-TECHNICAL SPECIFICATION SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CEN ISO/TS 17574 September 2009 ICS 35.240.60; 03.220.20 Supersedes CEN ISO
10、/TS 17574:2004English Version Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009) Perception de tlpage - Lignes directrices concernant les profils de protection de la scurit (ISO/TS 17574:2009) Elektronische Gebhrenerfassung - Richtlinien fr Sicherheitsprofile
11、 (ISO/TS 17574:2009) This Technical Specification (CEN/TS) was approved by CEN on 14 September 2009 for provisional application. The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to submit their comments, particularly on t
12、he question whether the CEN/TS can be converted into a European Standard. CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national
13、standards in force (in parallel to the CEN/TS) until the final decision about the possible conversion of the CEN/TS into an EN is reached. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary,
14、 Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG Management Centre: A
15、venue Marnix 17, B-1000 Brussels 2009 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN ISO/TS 17574:2009: ECopyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or netw
16、orking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009CEN ISO/TS 17574:2009 (E) 3 Foreword This document (CEN ISO/TS 17574:2009) has been prepared by Technical Committee CEN/TC 278 “Road transport and traffic telematics“, the secretariat of which is held by NEN, in collaboration with
17、 Technical Committee ISO/TC 204 “Intelligent transport systems“. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. This document superse
18、des CEN ISO/TS 17574:2004. According to the CEN/CENELEC Internal Regulations, the national standards organizations of the following countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hu
19、ngary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and the United Kingdom. Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reprodu
20、ction or networking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009ISO/TS 17574:2009(E) ISO 2009 All rights reserved iiiContents Page Foreword iv Introduction v 1 Scope . 1 2 Normative references . 5 3 Terms and definitions. 5 4 Abbreviations 8 5 Outlines of Protection Profile 9 5.1
21、Structure 9 5.2 Context. 9 Annex A (informative) Procedures for preparing documents 11 Annex B (informative) Example of threat analysis evaluation method. 43 Annex C (informative) Abstract from Definition of threats and security controls for the Charging Interface in Electronic Fee Collection. 46 An
22、nex D (informative) Common Criteria Recognition Arrangement (CCRA). 58 Bibliography . 60 Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009ISO/TS 17574:2009
23、(E) iv ISO 2009 All rights reservedForeword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body in
24、terested in a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechni
25、cal Commission (IEC) on all matters of electrotechnical standardization. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of technical committees is to prepare International Standards. Draft International Standards adopted by the
26、 technical committees are circulated to the member bodies for voting. Publication as an International Standard requires approval by at least 75 % of the member bodies casting a vote. In other circumstances, particularly when there is an urgent market requirement for such documents, a technical commi
27、ttee may decide to publish other types of document: an ISO Publicly Available Specification (ISO/PAS) represents an agreement between technical experts in an ISO working group and is accepted for publication if it is approved by more than 50 % of the members of the parent committee casting a vote; a
28、n ISO Technical Specification (ISO/TS) represents an agreement between the members of a technical committee and is accepted for publication if it is approved by 2/3 of the members of the committee casting a vote. An ISO/PAS or ISO/TS is reviewed after three years in order to decide whether it will b
29、e confirmed for a further three years, revised to become an International Standard, or withdrawn. If the ISO/PAS or ISO/TS is confirmed, it is reviewed again after a further three years, at which time it must either be transformed into an International Standard or be withdrawn. Attention is drawn to
30、 the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible for identifying any or all such patent rights. ISO/TS 17574:2009 was prepared by the European Committee for Standardization (CEN) Technical Committee CEN/TC 278 Road Tra
31、nsport and Traffic Telematics in collaboration with Technical Committee ISO/TC 204, Intelligent transport systems, in accordance with the Agreement on technical cooperation between ISO and CEN (Vienna Agreement). This second edition cancels and replaces the first edition (ISO/TS 17574:2004) which ha
32、s been technically revised. Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009ISO/TS 17574:2009(E) ISO 2009 All rights reserved vIntroduction Electronic Fee
33、 Collection (EFC) systems are subject to several ways of fraud both by users and operators but also from people outside the system. These security threats have to be met by different types of security measures including security requirements specifications. It is recommended that EFC operators or na
34、tional organizations, e.g. highway authorities or transport ministries, use the guideline provided by this Technical Specification to prepare their own EFC/PP, as security requirements should be described from the standpoint of the operators and/or operators, organizations. It should be noted that t
35、his Technical Specification is of a more informative than normative nature and it cannot be used without also using the ISO/IEC 15408 series. Most of the content of this Technical Specification is an example shown in Annex A on how to prepare the security requirements for EFC equipment, in this case
36、 a DSRC based OBE with an IC-card loaded with crucial data needed for the EFC. The example refers to a Japanese national EFC system and should only be regarded and used as an example. After an EFC/PP is prepared, it can be internationally registered by the organization that prepared the EFC/PP so th
37、at other operators or countries that want to develop their EFC system security services can refer to an already registered EFC/PP. This EFC related standard on security service framework and EFC/PP is based on the ISO/IEC 15408 series. ISO/IEC 15408 includes a set of requirements for the security fu
38、nctions and assurance of IT relevant products and systems. Operators, organizations or authorities defining their own EFC/PP can use these requirements. This will be similar to the different PPs registered by several financial institutions, e.g. for payment instruments like IC-cards. The products an
39、d systems that were developed in accordance with ISO/IEC 15408, can be publicly assured by the authentication of the government or designated private evaluation agencies. Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networkin
40、g permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009TECHNICAL SPECIFICATION ISO/TS 17574:2009
41、(E) ISO 2009 All rights reserved 1Electronic fee collection Guidelines for security protection profiles 1 Scope This Technical Specification provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 serie
42、s and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system. This Technical Specification should be read in co
43、njunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/I
44、EC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content. Figure 1 shows how this document fits in the overall picture of EFC security architecture. The shaded boxes are the aspects mostly relat
45、ed to the preparation of PPs for EFC systems. Operators and users domainData protection awarenessData protection needs and objectivesData protection policyRisk analysisThreatsProbabiltyImpactData protection requirementsSystem domainData protection measuresImplementationCostsLegal and institutional f
46、rameworkApplication domains requirements and constraintsAuditEvaluateReassessFigure 1 Overall view of security architecture The main purpose of a PP is to analyse the security environment of a subject and then to specify the requirements meeting the threats that are the output of the security enviro
47、nment analysis. The subject studied Copyright European Committee for Standardization Provided by IHS under license with CENNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-DD CEN ISO/TS 17574:2009ISO/TS 17574:2009(E) 2 ISO 2009 All rights reservedis called the targe
48、t of evaluation (TOE). In this document, an OBE with an ICC is used as an example of the TOE. The preparatory work of EFC/PP consists of the steps shown in Figure 2 (in line with the contents described in Clause 5). 1. Prepare an introduction2. Prepare a description of the TOE,e.g. an entity or an interface, and state the need and/or security problem to be addressed.3. Prepare a description of the Security Environments of the TOE in which the threat analysis and security policies must be described concretely4. Prepare Security Objectives giving information on howand to what extent t
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1