System Level Cybersecurity Requirements

system-level cybersecurity requirements set focused on cryptography, structured from Planning β†’ Development β†’ End-of-Line (Production) β†’ Operation β†’ End-of-Life. The requirements are written in a formal β€œshall” style, suitable for ISO/SAE 21434 compliance, system requirements specifications, and OEM/Tier-1 contracts.

https://autocrypt.io/arrow-up-right

Normative Context

Derived in alignment with:

  • ISO/SAE 21434

  • UNECE UN R155

  • STRIDE β†’ Cybersecurity Properties (CIAAA+NR)


System-Level Cryptography Cybersecurity Requirements


1. Planning / Concept Phase

(Item Definition, TARA, Cybersecurity Goals)

Integrity Requirements

CR-P-INT-01 The system shall define cryptographic integrity protection mechanisms for all safety- and security-relevant software and data identified in the TARA.

CR-P-INT-02 The system shall ensure software authenticity and integrity through cryptographic verification before execution.


Confidentiality Requirements

CR-P-CONF-01 The system shall identify all confidential assets (keys, firmware, personal data) requiring cryptographic protection.

CR-P-CONF-02 The system shall define confidentiality protection needs for in-vehicle, diagnostic, and backend communication channels.


Authentication & Authorization

CR-P-AUTH-01 The system shall require cryptographic authentication for all external entities interacting with the ECU.

CR-P-AUTHZ-01 The system shall define cryptographic authorization levels for diagnostics, flashing, and configuration.


Non-Repudiation

CR-P-NR-01 The system shall support cryptographic evidence for software origin and update provenance.


Availability

CR-P-AVL-01 The system shall ensure cryptographic mechanisms do not cause denial-of-service under defined operating conditions.


2. System & Architecture Design Phase

Integrity

CR-A-INT-01 The system shall implement a cryptographic secure boot chain of trust from immutable root to application software.

CR-A-INT-02 The system shall protect firmware, calibration, and configuration data against unauthorized modification using cryptographic integrity checks.


Confidentiality

CR-A-CONF-01 The system shall protect cryptographic keys using hardware-backed secure storage.

CR-A-CONF-02 The system shall encrypt sensitive data at rest and in transit where confidentiality is required by TARA.


Authentication

CR-A-AUTH-01 The system shall use cryptographic identities (keys or certificates) to uniquely authenticate the ECU.


Authorization

CR-A-AUTHZ-01 The system shall enforce cryptographic authorization before allowing diagnostics, flashing, or secure services.


Cryptographic Governance

CR-A-GOV-01 The system shall use only OEM-approved cryptographic algorithms, key lengths, and modes.


3. Detailed Design & Implementation Phase

Integrity

CR-I-INT-01 The system shall verify cryptographic signatures of all executable software before execution.

CR-I-INT-02 The system shall detect and block rollback attempts using cryptographic version protection.


Confidentiality

CR-I-CONF-01 The system shall ensure cryptographic keys never leave the secure boundary in plaintext.

CR-I-CONF-02 The system shall prevent hard-coded or shared secrets across ECUs unless explicitly approved.


Authentication & Authorization

CR-I-AUTH-01 The system shall implement cryptographic challenge-response mechanisms for secure diagnostics.

CR-I-AUTHZ-01 The system shall cryptographically bind authorization rights to authenticated identities.


Availability

CR-I-AVL-01 The system shall handle cryptographic failures securely without blocking vehicle-critical functions.


4. Integration, Verification & Validation Phase

Integrity Verification

CR-V-INT-01 The system shall be verified to reject unsigned or tampered software.

CR-V-INT-02 The system shall demonstrate resistance to replay and injection attacks.


Confidentiality Verification

CR-V-CONF-01 The system shall verify that encrypted communication cannot be decrypted by unauthorized entities.


Authentication & Authorization Verification

CR-V-AUTH-01 The system shall reject unauthenticated diagnostic and flashing attempts.


Evidence

CR-V-EVID-01 The system shall provide test evidence demonstrating correct cryptographic behavior.


5. Production & End-of-Line (Manufacturing)

Integrity

CR-M-INT-01 The system shall provision ECU-unique cryptographic identities during production.


Confidentiality

CR-M-CONF-01 The system shall perform cryptographic key injection in a secured manufacturing environment.

CR-M-CONF-02 The system shall prevent exposure of production keys to operators or test equipment.


Authentication

CR-M-AUTH-01 The system shall ensure manufacturing access is cryptographically authenticated and logged.


6. Operation & Maintenance (Vehicle in Field)

Integrity

CR-O-INT-01 The system shall cryptographically verify all software updates before installation.


Confidentiality

CR-O-CONF-01 The system shall maintain confidentiality of in-field communications with backend and diagnostic tools.


Authentication & Authorization

CR-O-AUTH-01 The system shall authenticate backend services and diagnostic tools cryptographically.

CR-O-AUTHZ-01 The system shall support revocation of cryptographic credentials in case of compromise.


Availability

CR-O-AVL-01 The system shall allow cryptographic updates without requiring ECU replacement, where feasible.


7. End-of-Life (Vehicle & ECU Decommissioning)

Integrity & Confidentiality

CR-EOL-INT-01 The system shall prevent execution of unauthorized software after end-of-life.

CR-EOL-CONF-01 The system shall invalidate or erase cryptographic material according to OEM EOL policy.


Authentication & Authorization

CR-EOL-AUTH-01 The system shall revoke ECU certificates and backend access at end-of-life.


Compliance

CR-EOL-COMP-01 The system shall provide evidence of cryptographic decommissioning to support UN R155 CSMS compliance.


Quick Property Coverage Matrix

Property
Covered Phases

Integrity

Planning β†’ EOL

Confidentiality

Architecture β†’ EOL

Authentication

Planning β†’ EOL

Authorization

Architecture β†’ EOL

Availability

Design β†’ Operation

Non-Repudiation

Planning β†’ Operation

Last updated

Was this helpful?