1、Electronic fee collection Guidelines for security protection profiles PD CEN ISO/TS 17574:2017 BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06National foreword This Published Document is the UK implementation of CEN ISO/TS 17574:2017. It supersedes DD CEN ISO/TS 17
2、574:2009 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee EPL/278, Intelligent transport systems. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the ne
3、cessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2017. Published by BSI Standards Limited 2017 ISBN 978 0 580 94774 2 ICS 03.220.20; 35.240.60 Compliance with a British Standard cannot confer immunity from legal obligations. This
4、Published Document was published under the authority of the Standards Policy and Strategy Committee on 30 April 2017. Amendments/corrigenda issued since publication Date Text affected PUBLISHED DOCUMENT PD CEN ISO/TS 17574:2017TECHNICAL SPECIFICATION SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION C
5、EN ISO/TS 17574 March 2017 ICS 03.220.20; 35.240.60 Supersedes CEN ISO/TS 17574:2009 English Version Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) Perception de tlpage - Lignes directrices concernant les profils de protection de la scurit (ISO/TS 17574:2
6、017) Elektronische Gebhrenerhebung - Leitfaden fr Sicherheitsprofile (ISO/TS 17574:2017) This Technical Specification (CEN/TS) was approved by CEN on 3 March 2017 for provisional application. The period of validity of this CEN/TS is limited initially to three years. After two years the members of CE
7、N will be requested to submit their comments, particularly on the question whether the CEN/TS can be converted into a European Standard. CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available promptly at national level in an ap
8、propriate form. It is permissible to keep conflicting national standards in force (in parallel to the CEN/TS) until the final decision about the possible conversion of the CEN/TS into an EN is reached. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czec
9、h Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kin
10、gdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels 2017 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN ISO/T
11、S 17574:2017 ECEN ISO/TS 17574:2017 (E) 2 Contents Page European foreword . 3 PD CEN ISO/TS 17574:2017CEN ISO/TS 17574:2017 (E) 3 European foreword This document (CEN ISO/TS 17574:2017) has been prepared by Technical Committee ISO/TC 204 “Intelligent transport systems” in collaboration with Technica
12、l Committee CEN/TC 278 “Intelligent transport systems” the secretariat of which is held by NEN. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN and/or CENELEC shall not be held responsible for identifying any or all such paten
13、t rights. This document supersedes CEN ISO/TS 17574:2009. According to the CEN-CENELEC Internal Regulations, the national standards organizations of the following countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Eston
14、ia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. Endorsement noti
15、ce The text of ISO/TS 17574:2017 has been approved by CEN as CEN ISO/TS 17574:2017 without any modification. PD CEN ISO/TS 17574:2017 ISO/TS 17574:2017(E)Foreword iv Introduction v 1 Scope . 1 2 Normative references 1 3 Terms and definitions . 2 4 Abbreviated terms 4 5 EFC security architecture and
16、protection profile processes . 5 5.1 General . 5 5.2 EFC security architecture . 5 5.3 Protection profile preparatory steps . 6 5.4 Relationship between actors. 7 6 Outlines of Protection Profile . 9 6.1 Structure . 9 6.2 Context 10 Annex A (informative) Procedures for preparing documents 11 Annex B
17、 (informative) Example of threat analysis evaluation method .45 Annex C (informative) Relevant security standards in the context of the EFC .50 Annex D (informative) Common Criteria Recognition Arrangement (CCRA)51 Bibliography .52 ISO 2017 All rights reserved iii Contents Page PD CEN ISO/TS 17574:2
18、017 ISO/TS 17574:2017(E) Foreword ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies (ISO member bodies). The work of preparing International Standards is normally carried out through ISO technical committees. Each member body interested i
19、n a subject for which a technical committee has been established has the right to be represented on that committee. International organizations, governmental and non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the International Electrotechnical Commis
20、sion (IEC) on all matters of electrotechnical standardization. The procedures used to develop this document and those intended for its further maintenance are described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the different types of ISO documents sh
21、ould be noted. This document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO shall not be held responsible f
22、or identifying any or all such patent rights. Details of any patent rights identified during the development of the document will be in the Introduction and/or on the ISO list of patent declarations received (see www .iso .org/ patents). Any trade name used in this document is information given for
23、the convenience of users and does not constitute an endorsement. For an explanation on the meaning of ISO specific terms and expressions related to conformit y assessment, as well as information about ISOs adherence to the World Trade Organization (WTO) principles in the Technical Barriers to Trade
24、(TBT) see the following URL: www . i s o .org/ iso/ foreword .html. The committee responsible for this document is ISO/TC 204, Intelligent transport systems. This third edition cancels and replaces the second edition (ISO/TS 17574:2009), which has been technically revised. This edition includes the
25、following significant changes with respect to the previous edition: Clause 1 has been redrafted and shortened; Clause 3 has been updated with harmonized terms; requirements updated as to reflect the latest version of the ISO/IEC 15408 series; a new Clause 5 has been added, comprising much of the tex
26、t from the Scope of the previous edition.iv ISO 2017 All rights reserved PD CEN ISO/TS 17574:2017 ISO/TS 17574:2017(E) Introduction Electronic fee collection (EFC) systems are subject to several ways of fraud both by users and operators but also from people outside the system. These security threats
27、 have to be met by different types of security measures including security requirements specifications. It is recommended that EFC operators or national organizations, e.g. highway authorities or transport ministries, use the guideline provided by this document to prepare their own EFC/protection pr
28、ofile (PP), as security requirements should be described from the standpoint of the operators and/or operators organizations. It should be noted that this document is of a more informative than normative nature and it is intended to be read in conjunction with the underlying international standards
29、ISO/IEC 15408 (all parts). Most of the content of this document is an example shown in Annex A on how to prepare the security requirements for EFC equipment, in this case, a DSRC-based OBE with an IC card loaded with crucial data needed for the EFC. The example refers to a Japanese national EFC syst
30、em and should only be regarded as an example. After an EFC/PP is prepared, it can be internationally registered by the organization that prepared the EFC/PP so that other operators or countries that want to develop their EFC system security services can refer to an already registered EFC/PP. This EF
31、C-related document on security service framework and EFC/PP is based on ISO/IEC 15408 (all parts). ISO/IEC 15408 (all parts) includes a set of requirements for the security functions and assurance of IT-relevant products and systems. Operators, organizations or authorities defining their own EFC/PP
32、can use these requirements. This will be similar to the different PPs registered by several financial institutions, e.g. for payment instruments like IC cards. The products and systems that were developed in accordance with ISO/IEC 15408 (all parts) can be publicly assured by the authentication of t
33、he government or designated private evaluation agencies. ISO 2017 All rights reserved v PD CEN ISO/TS 17574:2017PD CEN ISO/TS 17574:2017 Electronic fee collection Guidelines for security protection profiles 1 Scope This document provides guidelines for preparation and evaluation of security requirem
34、ents specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 (all parts) and in ISO/IEC TR 15446. By Protection Profile (PP), it means a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipmen
35、t (OBE) to be used in an EFC system. However, the guidelines in this document are superseded if a Protection Profile already exists for the subsystem in consideration. The target of evaluation (TOE) for EFC is limited to EFC specific roles and interfaces as shown in Figure 1. Since the existing fina
36、ncial security standards and criteria are applicable to other external roles and interfaces, they are assumed to be outside the scope of TOE for EFC. Figure 1 Scope of TOE for EFC The security evaluation is performed by assessing the security-related properties of roles, entities and interfaces defi
37、ned in security targets (STs), as opposed to assessing complete processes which often are distributed over more entities and interfaces than those covered by the TOE of this document. NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial to a
38、pply when evaluating the security of a system. 2 Normative references There are no normative references in this document. TECHNICAL SPECIFICATION ISO/TS 17574:2017(E) ISO 2017 All rights reserved 1 PD CEN ISO/TS 17574:2017 ISO/TS 17574:2017(E) 3 Terms and definitions For the purposes of this documen
39、t, the following terms and definitions apply. ISO and IEC maintain terminological databases for use in standardization at the following addresses: IEC Electropedia: available at h t t p :/ www .electropedia .org/ ISO Online browsing platform: available at h t t p :/ www .iso .org/ obp 3.1 assurance
40、requirement security requirements to assure confidence in the implementation of functional requirements 3.2 audit independent review and examination in order to ensure compliance with established policy and operational procedures and to recommend associated changes 3.3 availability property of being
41、 accessible and usable upon demand by an authorized entity SOURCE: ISO/TS 19299:2015, 3.6 3.4 certification procedure by which a party gives written assurance that a product, process, or service conforms to specified requirements SOURCE: ISO/TS 14907-1:2015, 3.3 3.5 confidentiality prevention of inf
42、ormation leakage to non-authenticated individuals, parties, and/or processes SOURCE: ISO/TS 19299:2015, 3.11 3.6 data privacy rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure and disposal of personal information SOURCE: ISO/TS 19299:2
43、015, 3.32 3.7 Evaluation Assurance Level EAL set of assurance requirements, usually involving documentation, analysis and testing, representing a point on a predefined assurance scale, that form an assurance package 3.8 functional requirement requirement for a function that a system or system compon
44、ent is able to perform 3.9 integrity property that data have not been altered or destroyed in an unauthorized manner 3.10 international registrar organization authorized to register protection profiles at an international level2 ISO 2017 All rights reserved PD CEN ISO/TS 17574:2017 ISO/TS 17574:2017
45、(E) 3.11 key management generation, distribution, storage, application and revocation of encryption keys 3.12 On-Board Equipment OBE required equipment on-board a vehicle for performing required EFC functions and communication services Note 1 to entry: The OBE does not need to include payment means.
46、 3.13 personalization card set-up card IC card to transcribe individual data such as vehicle information into On-Board Equipment 3.14 rationale verification process determining that a product of each phase of the system lifecycle development process fulfils all the requirements specified in the prev
47、ious phase 3.15 reliability ability of a device or a system to perform its intended function under given conditions of use for a specified period of time or number of cycles SOURCE: ISO/TS 14907-1:2015, 3.17 3.16 road side equipment RSE equipment located along the road, either fixed or mobile 3.17 s
48、ecure application module SAM physical module that securely executes cryptographic functions and stores keys SOURCE: ISO/TS 19299:2015, 3.35 3.18 security policy set of rules that regulate how to handle security threats or define the appropriate security level SOURCE: ISO/TS 19299:2015, 3.36 3.19 sec
49、urity target ST set of security requirements and specifications to be used as the basis for evaluation of an identified TOE 3.20 security threat potential action or manner to violate the security of a system 3.21 target of evaluation TOE set of software, firmware and/or hardware possibly accompanied by guidance SOURCE: ISO/IEC 15408-1:2009, 3.1.70 ISO 2017 All rights reserved 3 PD CEN ISO/TS 17574:2017 ISO/TS 17574:2017(E) 3.22 threat agent entity that has the intention to act adversely on an asset SOURCE: ISO/