The present invention relates to a security evaluation server and a security evaluation method.
There is known a functional safety evaluation, such as ISO61508 or ISO26262, to achieve functional safety. Similarly, there is known a security evaluation, such as IEC62443 or ISO15408, to achieve cyber security.
In view of the functional safety, a failure occurrence rate of a hardware component or service life of the hardware component may cause a reduction in the functional safety level over time elapsed from manufacturing of the hardware component. Similarly, in view of the cyber security, emergence of new viruses one after another or risk of constant use of same password may cause a reduction in the security level over time elapsed from new construction of an information system.
With regard to the time elapsed from the manufacturing of the hardware component and the time elapsed from the new construction of the information system, PTL 1 discloses a technique to accurately grasp a trend of a change in a security level SL of each of a plurality of security functions in the information system, the change in accordance with time elapsed from the construction of the information system (when the security level SL was predetermined). In the technique, time elapsed from downtime of the security is measured at a predetermined frequency and the security level SL of each of the plurality of security functions is calculated. In the technique disclosed here, the security level SL is converted within a range of all of the plurality of security functions to calculate a security level SLG of the overall information system. Then, the security level SLG of the overall information system calculated at each time is outputted to be displayed in a graph.
PTL 1: JP 2008-176634 A
In the technique disclosed in PTL 1, it is possible to evaluate the security level in accordance with the time elapsed from the manufacturing of the hardware component and the time elapsed from the construction of the information system. However, in a system where the information system hierarchized controls the hard component, each hierarchy of the information system is subjected to a cyber attack that affects the functional safety of the hardware component. In the technique disclosed in PTL 1, the security level regarding the cyber attack is not evaluated.
An object of the present invention is to evaluate functional safety of a cyber security system.
The present invention provides a representative security evaluation server including:
a hierarchy generation unit configured to generate information regarding a plurality of system hierarchies in an evaluation subject system;
an evaluation unit configured to, based on the information regarding the plurality of system hierarchies generated by the hierarchy generation unit, calculate an evaluation value of protection effectiveness based on a security function requirement included in each of the plurality of system hierarchies in the evaluation subject system, and calculate an evaluation value of protection effectiveness based on a combination of the security function requirements; and
a verification unit configured to verify whether each of the security function requirements in the evaluation subject system is in excess or insufficient, based on each of the evaluation values calculated by the evaluation unit and a target value.
The present invention provides an evaluation for functional safety of a cyber security system.
An embodiment of the present invention will be described in detail below with reference to the drawings.
———System Structure———
An example of a block configuration of a secure function safety evaluation device 1 in Example 1 will be described with reference to
The secure function safety evaluation device 1 includes an input unit 2, an output unit 3, an input processing unit 4, an evaluation calculation unit 5, a requirement excess/insufficiency verification unit 6, a result processing unit 7, a requirements DB 8, an evaluation calculation DB 9, a verification operation DB 10, and a results DB 11.
The input unit 2 receives from a user an input of information regarding specification for an evaluation subject system and protection effectiveness targeted. The output unit 3 outputs to the user a result of an evaluation for the evaluation subject system. The input processing unit 4 extracts, from the specification for the evaluation subject system that has been inputted to the input unit 2, information to be used for quantitative evaluation.
The evaluation calculation unit 5 uses the information extracted from the specification for the evaluation subject system, and quantifies the protection effectiveness in the evaluation subject system. The requirement excess/insufficiency verification unit 6 evaluates whether or not the protection effectiveness quantified satisfies the protection effectiveness targeted, and then verifies a security function requirement that satisfies the protection effectiveness targeted. The result processing unit 7 undertakes a process of outputting a result of the evaluation for the protection effectiveness and a result of verifying whether the security function requirement is in excess or insufficient to satisfy the protection effectiveness.
The requirements DB 8 is a database that stores information regarding a hierarchy structure of the evaluation subject system; information regarding the hierarchy structure in accordance with the operating environment specification for the evaluation subject system (that the user has inputted to the input unit 2); and information regarding the security function requirements used to quantitatively evaluate the cyber security system. The evaluation calculation DB 9 is a database that stores calculation procedures for quantifying the protection effectiveness.
The verification operation DB 10 is a database that stores information regarding security function requirements used for evaluating whether or not the protection effectiveness quantified satisfies the protection effectiveness targeted and that stores information regarding security function requirements for satisfying the protection effectiveness targeted. The results DB 11 is a database that stores the result of the quantitative evaluation of the protection effectiveness in the evaluation subject system and that stores the security function requirements for satisfying the protection effectiveness targeted.
An example of hardware configuration of the secure function safety evaluation device 1 in Example 1 will be described with reference to
The CPU 101 is a central processing unit (operational unit) configured to execute a program stored in the storage device 103 or the memory 102, so as to operate the input processing unit 4, the evaluation calculation unit 5, the requirement excess/insufficiency verification unit 6, and the result processing unit 7 in the secure function safety evaluation device 1.
The memory 102 is a volatile storage element and corresponds to a main storage device, into which the program and data are loaded, when the CPU 101 operates. The storage device 103 is a nonvolatile storage element and corresponds to an auxiliary storage device that stores the data inputted to and outputted from the CPU 101 and the programs for the CPU 101. The storage device 103 stores the requirements DB 8, the evaluation calculation DB 9, the verification operation DB 10, and the results DB 11.
The communication device 104 communicates with an external network node via a network communication. The power supply device 105 is connected to a power outlet to supply power to each device in the secure function safety evaluation device 1.
The input device 106 corresponds to an interface for the user to input information, and is, for example, a keyboard, a mouse, a touch panel, a card reader, or a voice input device. The output device 107 corresponds to an interface for providing a feedback, a calculation result, or the like to the user, and is, for example, a screen display device, a voice output device, or a printer.
Note that, having the configuration above, the secure function safety evaluation device 1 in
Further, the information such as the program or a table to operate the input processing unit 4, the evaluation calculation unit 5, the requirement excess/insufficiency verification unit 6, and the result processing unit 7 may be stored in, instead of the storage device 103, a storage device (not shown) or a computer-readable, non-transitory data storage medium (not shown). The storage device is, for example, a storage subsystem, a nonvolatile semiconductor memory, a hard disk drive (HDD), or a solid state drive (SSD). The computer-readable, non-transitory data storage medium is, for example, an IC card, an SD card, or a DVD.
An example of the data used in the secure function safety evaluation device 1 in Example 1 will be described with reference to each of
The system operating environment specification information table 300 corresponds to the data regarding the operating environment specification for the evaluation subject system that a user 109 has specified in the input unit 2. The system operating environment specification information table 300 has a specification item 301 and a system operating environment information 302 as a pair, and includes a plurality of the pairs.
As an example, the specification item 301 includes a system type, an operating system type, the number of life cycle years, and a usage status. The system operating environment information 302 paired with the specification item 301 includes information regarding the system operating environment in correspondence to each item in the specification item 301. The specification item 301 preferably includes an item specified to be processed in the input processing unit 4.
The each single system hierarchy information table 310 corresponds to data that, based on the operating environment specification for the evaluation subject system (that the user 109 has specified in the input unit 2), specifies a hierarchy structure in the evaluation subject system in correspondence to the operating environment specification above. The each single system hierarchy information table 310 shows a hierarchy structure predetermined for each single system.
The each single system hierarchy information table 310 has an embedded system type 311 and a hierarchy structure 312 as a pair, and includes a plurality of the pairs. The hierarchy structure 312 is a table showing information for each of a plurality of hierarchies. The embedded system type 311 includes a category for the embedded system as the evaluation subject system, such as an “automobile” and a “robot”.
The hierarchy structure 312 includes information regarding which hierarchy is included in each of the embedded system type 311, and the information shows each hierarchy with “◯” or “x”. As an example,
The system structure specification information table 320 corresponds to the data for detailed system structure specification (that the user 109 has inputted to the input unit 2). The system structure specification information table 320 includes two independent tables of a system specification 321 and a security function requirement 322, each table having a plurality of items.
As shown in
The security function requirement 322 includes each of the security function requirements included in the evaluation subject system, along with detailed information regarding each of the security function requirements, such as a communication location and a communication method. Further, the security function requirement 322 may include an operating hierarchy information 323 to indicate in which hierarchy of the evaluation subject system each of the security function requirements is included.
The three tables, i.e., the system operating environment specification information table 300, the each single system hierarchy information table 310, and the system structure specification information table 320, are correlated based on the input from the user 109.
In the secure function safety evaluation device 1, the input processing unit 4 determines a type of the evaluation subject system based on the system operating environment specification information table 300. Then, based on the type of the evaluation subject system determined and contents in the each single system hierarchy information table 310, the input processing unit 4 displays to the user 109 the information regarding the hierarchy structure in the evaluation subject system.
When the user 109 inputs the information regarding the hierarchy structure in the evaluation subject system, the security function requirement 322 (including the operating hierarchy information 323 of the system structure specification information table 320) is to be set.
In the evaluation subject 401, the information regarding the security function requirements is acquired from the information shown in a column of the security function requirements in the system structure specification information table 320. Note that, “security function requirement 1” or the like in the evaluation subject 401 is an illustrative description, and each of the security function requirements may employ another description.
The quantitative evaluation 402 includes a column 403, a column 404, a column 405, and a column 406. Each of the columns 403 to 405 stores the result of evaluation for each of the security function requirements in the corresponding hierarchy. The column 406 stores the information regarding the result of evaluation for the evaluation subject system.
As an example according to Example 1, the information shown in the quantitative evaluation 402 in
Each of the columns 403, 404, and 405 is set based on the information acquired from the hierarchy structure 312 of the each single system hierarchy information table 310 and in a row of the embedded system type 311 (of the each single system hierarchy information table 310), the row corresponding to the type of the evaluation subject system. Accordingly, the number of the hierarchies and the number of types of hierarchies are not limited to the example shown in
Note that, the quantitative evaluation 402 does not necessarily store only one index, such as the period of attack success, and may store a plurality of indexes for the quantitative evaluation. Additionally, the index is not limited to the period of attack success and a rate of attack success/achievement, and other indexes may be included.
For example, the index may be an attack possibility based on previous records.
The evaluation calculation data table 400 has a block defined by each of the security function requirements in the evaluation subject 401 and each of the columns (each of hierarchies) of the quantitative evaluation 402. Each block stores information calculated in process steps of a flowchart of the evaluation calculation unit 5 in
———Flow of Process———
An example of a sequence for the secure function safety evaluation device 1 in Example 1 will be described with reference to
In step S201, the input processing unit 4 receives, from the user 109 through the input device 106, the operating environment specification that includes the information of the system operating environment specification information table 300. An example of an input screen that the secure function safety evaluation device 1 displays to the user 109 will be described later with reference to
In step S202, the input processing unit 4 receives, from the user 109 through the input device 106, the protection effectiveness targeted that the evaluation subject system is required to satisfy. An example of an input screen that the secure function safety evaluation device 1 displays to the user 109 will be described later with reference to
In step S203, based on the operating environment specification received in the step S201, the input processing unit 4 refers to the hierarchy structure 312 of the each single system hierarchy information table 310 stored in the requirements DB 8. The input processing unit 4 presents to the user 109 “each hierarchy definition” in accordance with the operating environment specification received, and asks the user 109 for hierarchy processing in the evaluation subject system.
The input processing unit 4 acquires, from the each single system hierarchy information table 310, the “each hierarchy definition” in accordance with the data for the operating environment specification. Process steps by the input processing unit 4 to acquire the “each hierarchy definition” will be described later in step S503 in
In step S204, the input processing unit 4 receives from the user 109 the information regarding the structure hierarchized, and includes the information into the system structure specification information table 320.
Here, the user 109 hierarchizes the structure of the evaluation subject system based on the information from the each single system hierarchy information table 310 displayed in the step S203, and inputs the information regarding the structure hierarchized into the input processing unit 4.
The input processing unit 4 displays to the user 109 the “each hierarchy definition” in order to acquire from the user 109 the information regarding the structure hierarchized in accordance with the “each hierarchy definition”. This process step will be described later in step S504 in
In step S205, the input processing unit 4 uses the requirements DB 8 to extract a requirement for the quantitative evaluation, in other words, the security function requirement included in each hierarchy, from the information regarding the structure hierarchized and inputted by the user 109. Subsequently, the input processing unit 4 transmits, to the evaluation calculation unit 5, the security function requirement included in each hierarchy that the input processing unit 4 has extracted.
In step S206, the evaluation calculation unit 5 receives the security function requirement included in each hierarchy from the input processing unit 4, and follows the calculation procedures stored in the evaluation calculation DB 9 to quantify the protection effectiveness based on the security function requirement included in each hierarchy. The evaluation calculation unit 5 displays the result of the quantitative evaluation for the evaluation subject system to the user 109. The result of the evaluation for the evaluation subject system is stored in the evaluation calculation data table 400 of the evaluation calculation DB 9. An example of the calculation for the quantitative evaluation will be described later in steps S604, S605, S606, S607, S608, S609, and S610 in
In step S207, the input processing unit 4 transmits the protection effectiveness targeted, which the user 109 has inputted in the step S202, to the requirement excess/insufficiency verification unit 6. Step S208 is a loop configured to verify whether or not the security function requirement included in each hierarchy satisfies the protection effectiveness targeted, or configured to verify a combination of the security function requirement included in each hierarchy that satisfies the protection effectiveness targeted.
With regard to the security function requirement included in each hierarchy, a plurality of security function requirements may be included in a single hierarchy. Alternatively, each of the plurality of hierarchies may include the security function requirement(s). Accordingly, by verifying the combination of the security function requirements, it is possible to extract a minimum combination of the security function requirements that satisfies the protection effectiveness targeted.
The loop as the step S208 includes step S209 and step S210. The loop is repeated until a verifiable combination of the security function requirements is verified or a condition predetermined is fulfilled. An example of process steps by the requirement excess/insufficiency verification unit 6, based on which the loop as the step S208 is operated, will be described later in step S702 and step S707 in
In the step S209, the requirement excess/insufficiency verification unit 6 transmits one of the verifiable combinations of the security function requirements to the evaluation calculation unit 5. Then, in the step S209 in a next cycle of the loop (step S208), the requirement excess/insufficiency verification unit 6 transmits another one of the verifiable combinations of the security function requirements to the evaluation calculation unit 5. An example of a process step for transmitting the combination will be described later in step S703 of
In the step S210, the evaluation calculation unit 5 quantitatively evaluates the protection effectiveness based on the combination of the security function requirements received from the requirement excess/insufficiency verification unit 6, and transmits the result of the evaluation to the requirement excess/insufficiency verification unit 6. The requirement excess/insufficiency verification unit 6 uses the result of the evaluation received from the evaluation calculation unit 5 to proceed with the verification above.
In step S211, the requirement excess/insufficiency verification unit 6 compares the protection effectiveness targeted (received from the input processing unit 4) with the result of the evaluation (received from the evaluation calculation unit 5), so as to determine/verify whether each of the combinations of the security function requirement is in excess or insufficient to satisfy the protection effectiveness targeted. The requirement excess/insufficiency verification unit 6 transmits the result of the verification regarding the security function requirement to the result processing unit 7. An example of process steps for verifying the result will be described later in steps S705 to S706 in
In step S212, based on the result of the verification regarding the security function requirements (received from the requirement excess/insufficiency verification unit 6), the result processing unit 7 displays to the user 109 the result of the verification regarding the security function requirement as well as a recommended result for excess/insufficiency of each of the combinations of the security function requirements. An example of the output screen will be described later with reference to
An example of a flowchart of process steps by the input processing unit 4 in the secure function safety evaluation device 1 will be described with reference to
The execution item selection field 800 is a box where the user 109 selects an execution item for the secure function safety evaluation device 1 by ticking the box. Note that, the execution item “quantitative evaluation of security function requirement currently included in evaluation subject system” is required, and thus its box may remain ticked at all times regardless of the selection by the user 109.
When a box of “requirement excess/insufficiency verification” in the execution item selection field 800 is ticked, each of the steps S208, S211, and S212 in
On the other hand, the execution item “quantitative evaluation of security function requirement currently included in evaluation subject system” is required. Thus, when the box of “requirement excess/insufficiency verification” is ticked, each of “quantitative evaluation of security function requirement currently included in evaluation subject system” and “requirement excess/insufficiency verification” is to be executed.
When the user 109 sets a file name for the operating environment specification in space of the operating environment specification field 801 and clicks a “Browse” button, the input processing unit 4 uploads the file (data) of the operating environment specification, the file (data) corresponding to the file name set in the space, to the input processing unit 4.
Here, the file (data) of the operating environment specification preferably includes the information of the system operating environment specification information table 300, so that the input processing unit 4 acquires the type of the evaluation subject system from the information.
Note that, the input screen 900 in
In step S502, the input processing unit 4 receives the protection effectiveness targeted that the user 109 has inputted. The step S502 corresponds to the step S202 in
The protection effectiveness targeted corresponds to the index for quantitative evaluation of the security function requirements, such as a tolerable range of safety, a tolerable occurrence frequency, and tolerable recovery time. More specifically, in the protection effectiveness targeted field 802, an example of the tolerable range of safety corresponds to a period of cyber attack success; an example of the tolerable occurrence frequency corresponds to a rate of cyber attack success/achievement; and an example of the tolerable recovery time corresponds to a tolerable period of time for recovery to a safe state.
The button 803 is a button for executing verification of the functional safety. When the button 803 is clicked, the secure function safety evaluation device 1 verifies whether or not the functional safety requirement in the evaluation subject system satisfies the functional safety required. When the button 804 is clicked, the secure function safety evaluation device 1 proceeds to evaluate the security function requirement and proceeds to the step S503.
Note that, as long as the information regarding the protection effectiveness targeted is acquired here, contents displayed on the input screen and a type of information to be inputted are not limited. Further, a type of button is not limited, and an operation in response to each button clicked is not limited.
In the step S502, the user 109 inputs the information regarding the protection effectiveness targeted. Here, the protection effectiveness targeted is not limited to the items shown in the protection effectiveness targeted field 802 in
In the document above, in order to derive the functional safety required, the user 109 inputs an automotive safety integrity level (ASIL) in parallel into intended functions. The intended functions include each of an initial-stage hazard analysis, a safety goal targeted, a safety status targeted and time restriction targeted of an object to be analyzed.
In the step S502, the user 109 inputs the protection effectiveness targeted. The protection effectiveness here is not limited to the items in the document above, and may include quantitative evaluation items such as an occurrence frequency of functional safety failures.
In the secure function safety evaluation device 1, the protection effectiveness targeted that the user 109 inputs in the step S502 may include items that satisfy both functional safety requirements and security function requirements, the items made based on the items in the document above or others items than the items in the document above.
As an example, the item as “tolerable range of safety” in the protection effectiveness targeted field 802 is a single item, but the single item not only satisfies a tolerable range of occurrence of the functional safety failures as in the document above, but also satisfies the tolerable period of cyber attack success for security reasons.
In the step S503, based on the each single system hierarchy information table 310 in the requirements DB 8, the input processing unit 4 extracts the hierarchy definition from the operating environment specification received. The input processing unit 4 displays the hierarchy definition extracted to the user 109 to ask the user 109 for the hierarchy processing in the evaluation subject system. The step S503 corresponds to the step S203 in
When the button 807 is clicked, the secure function safety evaluation device 1 returns to the step S501. When the button 808 is clicked, the secure function safety evaluation device 1 proceeds to the step S504 for the hierarchy processing. Note that, the display screen is not limited to the system operating environment specification information field 805 and the each hierarchy definition field 806, and may display the each hierarchy definition field 806 only.
In the step S504, the user 109 inputs the information for hierarchizing the system structure. The input processing unit 4 includes the information inputted by the user 109 into the system structure specification information table 320. The step S504 corresponds to the step S204 in
In step S505, the input processing unit 4 determines whether or not the system structure has been hierarchized.
Conditions for the determination will be further described later with reference to
In the step S506, the user 109 inputs information regarding the security function requirement in the structure hierarchized. The input processing unit 4 stores the information regarding the security function requirement in the structure hierarchized (that the user 109 has inputted) in the system structure specification information table 320 of the requirements DB 8. The step S506 also corresponds to the step S204 in
In step S507, the input processing unit 4 determines whether or not a verification item has been inputted. Conditions for the determination will be further described later with reference to
In the step S508, the input processing unit 4 transmits the information regarding the security function requirement in the structure hierarchized to the evaluation calculation unit 5. The step S508 corresponds to the step S205 in
The step S509 corresponds to the step S207 in
Here, “inside system” may correspond to the embedded system, and “outside system” may correspond to the world connected to the embedded system. Note that, “inside system” and “outside system” are not limited thereto.
Here, “inside system”, “outside system”, “physical control layer”, “information/control layer”, “information layer”, “cloud”, and the information for displaying the structure in each hierarchy may include the information acquired from the each single system hierarchy information table 310 and the system structure specification information table 320, or may include the information inputted by the user 109 on the input screen 903.
Process steps where the user 109 inputs the information on the input screen 903 will be further described with reference to
When a display of each hierarchy is clicked on the input screen 903, the display shifts to an input screen where the user 109 is to input the information regarding the security function requirement included in the hierarchy clicked. For example, when a display 820 is clicked, the display shifts to an input screen 904 in
When the display of each hierarchy is not clicked on the input screen 903, a message 823 may be displayed. Further, on the input screen 903, when a button 821 is clicked, the input processing unit 4 determines in the step S505 of
Here, information regarding each of the security function requirements, such as “software vendor”, “current version”, and “quantity”, are inputted. However, display items and input items on the input screen 904 are not limited thereto. The information inputted on the input screen 904 is to be included into the system structure specification information table 320.
On the input screen 904, when a button 824 is clicked, the input processing unit 4 determines in the step S507 of
An example of a flowchart of processing details for the step S504 in
In step S522, the input processing unit 4 determines, based on the each hierarchy definition in
On determination that the communication processing is executed inside the system, the input processing unit 4 proceeds to step S523. On determination that the communication processing is not executed inside the system, the input processing unit 4 proceeds to step S524. In the step S523, the input processing unit 4 classifies the information inputted in the step S521 into the hierarchy/layer closest to the physical control layer.
In the step S524, the input processing unit 4 determines, based on the each hierarchy definition in
On determination that the hierarchy/layer second closest to the physical control layer is the interface between inside and outside the system, the input processing unit 4 proceeds to step S525. On determination that the hierarchy/layer second closest to the physical control layer is not the interface between inside and outside the system, the input processing unit 4 proceeds to step S526. In the step S525, the input processing unit 4 classifies the information inputted in the step S521 into the hierarchy/layer second closest to the physical control layer.
In the step S526, the input processing unit 4 determines, based on the each hierarchy definition in
On determination that the security protection for the IoT is provided, the input processing unit 4 proceeds to step S527. On determination that the security protection for the IoT is not provided, the input processing unit 4 ends these process steps. In the step S527, the input processing unit 4 classifies the information inputted in the step S521 into the hierarchy/layer farthest to the physical control layer.
Note that, the steps S521 to S527 may be repeated a plurality of times in order to divide the structure of the evaluation subject system into the plurality of hierarchies. Further, instead of making the determinations in the steps S522, S524, and S526, the input processing unit 4 may receive the input by the user 109 commanding which hierarchy through the GUI of the input screen 903 in
As shown in
As shown in
Under the circumstances that an abnormal operation of the physical control layer 853 may cause human damage, the cyber attack increases a risk of the human damage. Further, the cyber attack increasingly poses a threat to the functional safety.
In Example 1, the secure function safety evaluation device 1 presents to the user how much functional safety of the cyber security system is protected. In this regard, an example of the flowchart of
As an assumption for the description below, the evaluation subject system includes N layers excluding the physical control layer. The Nth layer is the farthest layer to the physical control layer. In other words, when a variable n approaches a constant N, the Nth layer is farther to the physical control layer. Additionally, the description below defines each parameter as follows:
N: the number of hierarchies in the evaluation subject system (excluding the physical control layer);
n: a hierarchy to be evaluated;
i: a security function requirement to be evaluated and included in the hierarchy to be evaluated;
x: a hierarchy positioned from the nth layer to the physical control layer;
Pnix: protection effectiveness based on the ith security function requirement in the nth layer against an attack from the xth layer to the nth layer;
Pni: protection effectiveness based on the ith security function requirement in the nth layer against an attack to the evaluation subject system;
Pn: protection effectiveness of the nth layer to be evaluated;
Dn: overall protection effectiveness ranged from the nth layer (to be evaluated) until the physical control layer;
r, p: a reduction rate of the protection effectiveness, where r is more than 0 (0<r), and p is less than 1 (p<1).
In step S601, the evaluation calculation unit 5 determines whether or not to receive the security function requirement from the input processing unit 4. On determination to receive the security function requirement from the input processing unit 4, the evaluation calculation unit 5 proceeds to step S602. On determination not to receive the security function requirement from the input processing unit 4, in other words, on determination to receive the combination of the security function requirements from the requirement excess/insufficiency verification unit 6, the evaluation calculation unit 5 proceeds to step 603.
In the step S602, the evaluation calculation unit 5 receives the security function requirement included in each hierarchy from the input processing unit 4. The step S602 corresponds to the step S205 in
In the step S604, in sequential order from a layer closest to the physical control layer, each layer (nth layer) is extracted as the hierarchy to be evaluated. In an example of
In the step S605, the evaluation calculation unit 5 quantitatively evaluates the protection effectiveness Pnix based on the ith security function requirement in the nth layer against an attack from the xth layer to the nth layer. For example, in
Here, each of a value of the variable i and a value of the variable x may vary. The security function requirement specified by the value of the variable i may be a single security function requirement received in the step S602 or the plurality of (combination of) security requirements received in the step S603.
In the step S606, the evaluation calculation unit 5 quantitatively evaluates the protection effectiveness Pni based on the ith security function requirement in the nth layer against the attack to the evaluation subject system. For example, in
In the step S607, the evaluation calculation unit 5 moves to an (n+1)th layer as the hierarchy to be evaluated. Here, the (n+1)th is set as the nth. For example, in
In the step S608, the evaluation calculation unit 5 determines whether or not the hierarchy to be evaluated is as far as the farthest to the physical control layer, in other words, whether or not n is less than N (n<N). On determination that the hierarchy to be evaluated is as far as the farthest to the physical control layer, the evaluation calculation unit 5 proceeds to the step S609. On determination that the hierarchy to be evaluated is not as far as the farthest to the physical control layer, the evaluation calculation unit 5 returns to the step S604.
Accordingly, in
In the step S609, the evaluation calculation unit 5 calculates the protection effectiveness Pn and the overall protection effectiveness Dn. The protection effectiveness Pn of the nth layer to be evaluated is calculated as follows: Pn=MAX (Pnix), where n equals to x (n=x). The overall protection effectiveness Dn ranged from the nth layer (to be evaluated) to the physical control layer is calculated as follows: Dn=Pn+r*P(n−1)+p*P (n−2)+ . . . ≈ΣPn.
In
Additionally, in
In the step S610, the evaluation calculation unit 5 stores results of the quantitative evaluation for each of the security function requirements, the results obtained in the steps S604 to S609, into the evaluation calculation data table 400 of the evaluation calculation DB 9.
In step S611, similarly to the step S601, the evaluation calculation unit 5 determines whether or not the evaluation calculation unit 5 has processed the security function requirement received from the input processing unit 4.
On determination that the evaluation calculation unit 5 has processed the security function requirement received from the input processing unit 4, the evaluation calculation unit 5 proceeds to step S612. On determination that the evaluation calculation unit 5 has not processed the security function requirement received from the input processing unit 4, in other words, on determination that the evaluation calculation unit 5 has processed the combination of the security function requirements received from the requirement excess/insufficiency verification unit 6, the evaluation calculation unit 5 proceeds to step S613.
In the step S612, the evaluation calculation unit 5 displays to the user 109 the results of the quantitative evaluation stored in the step S610 and ends these process steps. The information displayed to the user 109 may be a part of the results of the quantitative evaluation stored in the step S610. The step S612 corresponds to the step S206 in
In the step S613, the evaluation calculation unit 5 determines whether or not the box of “requirement excess/insufficiency verification” has been ticked in the execution item selection field 800 on the input screen 900. On determination that the box of “requirement excess/insufficiency verification” has been ticked, the evaluation calculation unit 5 proceeds to step S614. On determination that the box of “request excess/insufficiency verification” has not been ticked, the evaluation calculation unit 5 ends these process steps.
In the step S614, the evaluation calculation unit 5 transmits the results of the quantitative evaluation stored in the step S610 to the requirement excess/insufficiency verification unit 6, and ends these process steps. The step S614 corresponds to the step S210 in
Note that, instead of the evaluation calculation unit 5, an external device connected to the secure function safety evaluation device 1 may execute the quantitative evaluation of the protection effectiveness. The evaluation calculation unit 5 may transmit the information such as the security function requirements to the external device, and then receive the results of the quantitative evaluation from the external device.
Here, an item of the quantitative evaluation preferably corresponds to an item of the protection effectiveness targeted. Accordingly, the evaluation calculation unit 5 may receive the protection effectiveness targeted from the input processing unit 4.
Among the process steps above, the step S602 and the steps S604 to S612 correspond to the steps S205 to S206 in
An example of a flowchart of process steps by the requirement excess/insufficiency verification unit 6 of the secure function safety evaluation device 1 will be described with reference to
In the step S701, the requirement excess/insufficiency verification unit 6 receives the protection effectiveness targeted from the input processing unit 4. The step S701 corresponds to the step S207 in
In step S702, the requirement excess/insufficiency verification unit 6 generates each of the combinations of the security function requirements to be evaluated, one combination at a time. The requirement excess/insufficiency verification unit 6 repeats the steps S702 to S707. Here, the security function requirements to be evaluated may correspond to the security function requirements that is stored in the security function requirement 322 of the system structure specification information table 320.
Also, on an assumption that the number of the security function requirements stored in the security function requirement 322 is S, the security function requirements, the number of which is S, may be used to generate each of the combinations. Thus, each of the combinations may include any of two to S of the security function requirements. The combinations of the security function requirements may be generated based on a permutation method or may be generated based on a combination method.
In the step S703, the requirement excess/insufficiency verification unit 6 transmits each of the combinations of the security function requirements generated in the step S702 to the evaluation calculation unit 5. The step S703 corresponds to the step S209 in
In step S704, the requirement excess/insufficiency verification unit 6 receives the result of the quantitative evaluation from the evaluation calculation unit 5. The step S704 corresponds to the step S210 in
In the step S705, the requirement excess/insufficiency verification unit 6 compares the protection effectiveness targeted received in the step S701 with the result of the quantitative evaluation received in the step S704, and sees which is larger. In the step S706, based on a result of the comparison in the step S705, the requirement excess/insufficiency verification unit 6 makes a determination as follows. When the protection effectiveness targeted is equal to or more than the result of the quantitative evaluation, the excess/insufficiency verification unit 6 determines that the combination of the security function requirements is sufficient. When the protection effectiveness targeted is less than the result of the quantitative evaluation, the excess/insufficiency verification unit 6 determines that the combination of the security function requirements is insufficient. Then, the excess/insufficiency verification unit 6 stores a result of the determination.
Note that, in the step S706, the requirement excess/insufficiency verification unit 6 may specify a maximum value from results of one or more quantitative evaluations for each of one or more security function requirements in each of one or more hierarchies, the results based on which the combination of the security function requirements is determined as sufficient.
In the step S707, when any of the combinations of the security function requirements generated in the step S702 still remains, the requirement excess/insufficiency verification unit 6 returns to the step S702. When none of the combinations of the security function requirements generated in the step S702 remains, the requirement excess/insufficiency verification unit 6 ends the steps S702 to S707 repeated and proceeds to step S708.
Note that, in a case where a condition to end the steps S702 to S707 repeated is predetermined, for example, in a case where the upper limit number of the determinations that the combination of the security function requirements is sufficient is predetermined, the requirement excess/insufficiency verification unit 6 may follow the condition predetermined to end these steps repeated. In this case, whether any of the combinations remains or not, the requirement excess/insufficiency verification unit 6 may end the process steps S702 to S707 repeated, and proceed to the step S708.
In the step S708, the requirement excess/insufficiency verification unit 6 transmits to the result processing unit 7 the result of the determination saved in the step S706 as the result of the verification. Concurrently, the requirement excess/insufficiency verification unit 6 transmits to the result processing unit 7 the information regarding the combination of the security function requirements that has been determined as sufficient.
The step S708 corresponds to the step S211 in
Note that, the requirement excess/insufficiency verification unit 6 may store the result of the determination and the combination of the security function requirements in the results DB 11. The combinations of the security function requirements and the result of the determination (verification) are obtained in the process steps above. As a display regarding the information obtained above, a display screen 906 of the recommended result for excess/insufficiency of each of the combinations of the security function requirements will be described later with reference to
Further, the display screen 905 may be displayed based on the information acquired from the evaluation calculation data table 400 stored in the evaluation calculation DB 9. The overall system evaluation result field 811 may include the information from the protection effectiveness targeted field 802 on the input screen 901 in
Further, security function requirements listed in the each security function requirement detailed evaluation result field 812 may not only include “security function requirement 1” and “security function requirement 2”, but may also include each of the combinations of the security function requirements generated in the step S702, such as a combination of the “security function requirement 1” and the “security function requirement 2”.
The display screen 905 is not limited to the example shown in
On the display screen 906, for example, in a combination of the “security function requirement 1”, the “security function requirement 2”, and “security function requirement 4”, “0” is displayed in each block of the combination, and “(1)” is displayed as the combination identifier in “combination”. The combination has been determined as sufficient in the step S706, and thus is displayed in a column “sufficient” of “system evaluation”.
Then, this combination is determined as sufficient and thus may be displayed as a recommended combination. The information displayed as the recommended result for excess/insufficiency of each of the combinations of the security function requirements is not limited to the display screen 906 in
With regard to the combination determined/verified as insufficient, when it is possible to generate a modified combination to satisfy the protection effectiveness targeted, the display screen 906 may include information regarding the modified combination. Further, on an assumption that the modified combination is selected, the display screen 906 may display a result of a quantitative evaluation for the modified combination.
As shown in
As has been described above, in Example 1, it is possible to evaluate the functional safety of the cyber security system. More specifically, it is possible to evaluate the protection effectiveness with respect to a target value of an item that satisfies both a target value of the cyber security system and a target value of the functional safety. Concurrently, it is possible to set up the hierarchy structure in the system that affects the physical control layer related to the functional safety.
Here, it is possible to evaluate the protection effectiveness based on the security function requirement in each of the hierarchies in the system, and thus, it is possible to simplify the evaluation. Further, the overall protection effectiveness of the security function requirements from a specific hierarchy/layer until the physical control layer related to the functional safety is also simply evaluated.
Further, it is possible to determine whether or not the security function requirement evaluated is sufficient alone to satisfy the target value. Accordingly, it is also possible to provide information regarding whether or not a redundant security function requirement exists.
Example 1 has described a preferable example in a case when functional safety system of a cyber security is evaluated in-house. Example 2 is concerned with a case when a functional safety system developed by any of other companies is connected to an in-house network. In Example 2, a preferable example will be described on an assumption that the device is to evaluate whether or not the functional safety system developed by one of other companies satisfies the protection effectiveness targeted to be protective against a cyber attack.
In Example 2, the four databases, i.e., the requirements DB 8, the evaluation calculation DB 9, the verification operation DB 10, and the results DB 11, may be stored in the memory 102 of the secure function safety evaluation device 1. Alternatively, these four databases may be stored in a cloud via the communication device 104.
Further, each unit of the secure function safety evaluation device 1 in
An example of a sequence in Example 2 will be described with reference to
The input processing unit 4 transmits to a system of the other company a message asking for hierarchy processing in the step S203 via the in-house network and the output unit 3, and the message transmitted is displayed on the system of the other company. The input unit 2 receives, from the functional safety system developed by the other company, the information regarding the structure hierarchized in the step S204, and transmits the information received to the input processing unit 4 via the in-house network.
After the process step S204, the process step S205 and the process steps S207 to S211 are executed in the cloud computers, but are the same as the process steps by the secure function safety evaluation device 1 as described in Example 1.
Additionally, the evaluation calculation unit 5 and the result processing unit 7 respectively transmit the results obtained in the step S206 and the step S212 to the system of the other company via the in-house network and the output unit 3, and the results transmitted respectively are displayed on the system of the other company.
In Example 2, the each single system hierarchy information table 310 used in the step S503 is not stored in the requirements DB 8 but in the cloud computer. Accordingly, it is possible to directly feed back a change in the hierarchy structure to data in the cloud computer and thus to update the data efficiently.
As has been described above, in Example 2, the secure function safety evaluation device 1 developed in-house is not only configured to evaluate the functional safety system developed in-house. Even with the functional safety system developed by other companies, the secure function safety evaluation device 1 developed in-house is configured to evaluate the functional safety and the security system.
Example 1 has described an example where each hierarchy, i.e., each of the physical control layer, the information/control layer, the information layer, and the cloud, is independent. In other words, the information received from the user 109 regarding the structure hierarchized is an example of the structure fully divided into hierarchies. Based on this assumption, the input processing unit 4 completes hierarchizing the structure in the step S505.
In Example 3, each of the hierarchies may affect each other, and thus, the information received from the user 109 regarding the structure hierarchized may be an example of the structure not fully divided into hierarchies. In Example 3, the input processing unit 4 additionally includes a hierarchy verification processing section. The hierarchy verification processing section is configured, in an additional process step between the step S504 and the step S505 in
The hierarchy verification processing section determines whether or not the information regarding the structure hierarchized may be further classified, or whether or not the information regarding the structure hierarchized may be further divided into hierarchies.
Then, the hierarchy verification processing section analyzes mutual dependency between each of the hierarchies as well as independence of each of the hierarchies. Based on results of these analyses, the hierarchy verification processing section updates the information regarding the structure hierarchized and increases the number of the hierarchies.
In this condition, the hierarchy verification processing section analyzes dependency between the information/control layer 859 and the physical control layer 853. In
As has been described above, in Example 3, it is possible to have an extendable, massive system fully hierarchized. Accordingly, in a quantitative evaluation for each of the hierarchies, it is possible to eliminate its interference with the other hierarchies and thus to improve accuracy of the quantitative evaluation.
Number | Date | Country | Kind |
---|---|---|---|
2018-028887 | Feb 2018 | JP | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2018/045824 | 12/13/2018 | WO | 00 |