Detection
| CMSEC_9: How do you monitor your in-vehicle software, components, and network for threats? |
|---|
Monitoring in-vehicle activity from threats, vulnerabilities, and fraud is becoming
increasingly important as vehicles become connected. Standards like ISO 21434
Data collection requires the ability to gather and record data from the vehicle and vehicle environments. Some vehicle data may be stored locally at smaller volumes and for specific use cases (e.g., crash event data) but is usually sent to an off-board system for refinement and analysis. The collection of this data may require onboard components depending upon how much processing capability you want to implement onboard before sending the data off-board.
Ingestion requires sending data to an off-board service. Oftentimes this is referred to as a VSIEM (Vehicle Security Information Event Management System) or VSOC (Vehicle Security Operation Center). This data stream will be sent to other backend systems for enrichment and refinement.
[CMSEC_BP9.1] Collect and detect events using onboard components in the vehicle.
You must decide how you will collect data from the vehicle, and how much processing of security events will be done at the vehicle edge. It is recommended that you implement software that can detect vehicle attacks and raise an event to an IDS manager on the ECU. There may be some filtering by the IDS manager at this stage depending upon vehicle software and hardware capability. The events will then be passed to local event memory for storage, where it can be analyzed by an authorized user with a diagnostic tool. The majority of the event data should be sent to the VSOC system from the vehicle gateway for further refinement of raw logs sent from the vehicle.
[CMSEC_BP9.2] Ingest and enrich data by preparing, moving, aggregating, normalizing, transforming, and analyzing the vehicle data.
There are several mechanisms to send your vehicle data to the cloud (see Design principles). As mentioned in the Identity and access management section, we recommend using unique vehicle identities and sending data using secure protocols (see data protection).
You must take a wide a range of actions on your data in order to provide valuable capability to VSOC analysts. The typical pattern is to ingest, store, process, analyze/train, and then visualize the data. At the same time, this flow can include response and remediation in parallel, which is covered in the Incident response section of the pillar. In order to build out detection capabilities, you need to:
Ingest: You can use AWS IoT Fleetwise
Store: AWS provides the ability to easily securely send
vehicle data to AWS. You can use AWS IoT Core Rules that can send
vehicle logs to over 20 different services.
Commonly you will use IoT Core Rules to route vehicle data to Amazon S3,
Process: You can then process and normalize that data in
any way that fits your business case. AWS provides a service called AWS Glue
Analyze: You can then run machine learning and analytics on
this data to understand vehicle related baselines and build models for detection using
services like Amazon SageMaker AI
Visualize: VSIEMs and VSOC can be used to identify security
patterns based on the data and analytics that are run on the large data sets. Selecting the
right visualization tool and strategy is an important aspect of identifying security trends
and KPIs. AWS provides a number of services to help with visualizing vehicle security
patterns in a detailed graph and report. Quick
You can build a pipeline for vehicle data using the AWS services highlighted above. You can
also consider adopting partner services from Argus Cyber
Security
| CMSEC_10: How do you correlate events from vehicles, backend systems, suppliers, vendors, and AWS Partners to generate actionable findings? |
|---|
Organizations must integrate data from many data sources as inputs to VSOCs. It is necessary to gather information feeds from many relevant data sources that may be relevant when analyzing vehicle logs and determining vulnerabilities. Correlation requires trained expertise, proper tooling, and the correct data sources and learning models to provide accurate true positive results from different vehicle scenarios. Based on the analysis results, you can use runbooks to guide your response and recovery on the fleet or vehicle, which is covered in the incident response section of the security pillar.
Analyzing baselines and threat intelligence feeds can provide information that a VSOC analyst can use to build common detection patterns that are likely to occur. As the threat intelligence data is constantly changing and new threats and vulnerabilities emerge, it is important to provide a mechanism to continuously monitor for false positives and improve rules based on new data. Organizations should focus on building monitoring capability around the highest risks to safety and security, the scope of a possible security issue, and the plausibility of the security issue.
[CMSEC_BP10.1] Gather relevant supplier, vendor, production, API, and partner data to enhance detection mechanisms by adding further context.
A vehicle environment contains several different systems that interact with the vehicle and consumer. Log sources should be collected from any relevant system that can provide important security and operational insights related to the connected vehicle. Data collected from backend systems, companion APIs, charging stations, diagnostics databases, AUTOSAR XML databases, production data, partners, and other custom databases that are relevant to a connected mobility system. This data can also be stored in Amazon S3 or Amazon Security Lake in OCSF format.
The goal is to correlate data and build rules based on the models that are trained on
this data. Lastly, correlating findings requires the ability to utilize threat intelligence
and threat hunting resources to inform your environment and your baselines, and this can be
done by integrating threat intelligence and vulnerability feeds to Amazon SageMaker AI mentioned above.
The data can then be integrated into Amazon OpenSearch Service for analytics and uncovering insights, or to
a central IT SOC on AWS or an AWS Partner such as Datadog
It is also important to collect logs from applications that interact with vehicles such as companion or fleet applications. You can use API logs to determine issues such as an unauthorized user gaining access to vehicles they are not authorized to interact with. You can collect logs from sources like Amazon API Gateway and AWS IoT Core.
As previously stated, you can build a pipeline to gather relevant data to enhance detection
using the AWS services highlighted above. You can also consider adopting partner services
from Argus Cyber
Security
| CMSEC_11: How do you monitor and detect unauthorized use of vehicle credentials and identities? |
|---|
You should be monitoring your ECUs for security best practices continuously. Due to the volume of ECUs and client certificates, it is important to monitor certificate and CA expiration and revocation. Organizations must monitor ECU permissions to detect overly permissive actions, and follow best practices when developing authentication and authorization mechanisms. It is also important to track changes in vehicle patterns that are significantly anomalous and deviating from known expected baselines.
[CMSEC_BP11.1] Detect security posture deviations and anomalous behavior
Monitoring certificate expiry and revocation can be a challenging process. Organizations must create processes and policies around the distribution and management of CAs and client certificates. AWS IoT Device Defender Audit provides the ability to monitor CA and client certificates that are nearing expiration (30 days) or that have been revoked. Organizations must detect overly permissive ECUs and scope down permissions as needed. AWS IoT Device Defender Audit can help to identify overly permissive policies that may be granting access to a broad set of resources instead of just a few.
Finally, organizations must build out vehicle baselines and automated alerting on anomalous behavior. Baselines might include expected number of connections, expected subscribed topics, expected protocols, expected payloads, and more. If a vehicle is deviating from those, such as sending suspicious commands, these should be detected. AWS IoT Device Defender Detect can help with the creation of rules or ML baselines to detect anomalous traffic based on pre-defined or custom metrics specific to your fleets, or even a group of devices in a profile.
For example, AWS IoT Device Defender Detect can provide you with visibility into ECU behavior such as the ECU failing authorization to multiple topics which may indicate the ECU trying to gain access to a topic that it is not authorized to publish or subscribe to. You can then trigger an Amazon CloudWatch Alarms which allows you to watch CloudWatch metrics and to receive notifications when the metrics fall outside of the levels (high or low thresholds) that you configure.
Alarms can send Amazon SNS
| CMSEC_12: How do you stay current and monitor on new threats and vulnerabilities after concept and design phase? |
|---|
Organizations must continually ingest data from the vehicle and internal systems, as well as public and private data sources. Vehicles have several potential vulnerabilities that are unlike traditional IT systems. Defining a threat intelligence process and collecting data from a wide range of relevant sources will provide information on expected and emerging threats and vulnerabilities.
While protecting software and firmware from vulnerabilities is important, vehicle
security programs must also consider emerging threats such as sensor fusion risks to the
vehicle. An organization should develop mechanisms to consume a large variety of threat
intelligence as well as share and collaborate across a sharing body such as Auto-ISAC
[CMSEC_BP12.1] Subscribe to threat intelligence feeds from many different sources to detect threats and vulnerabilities
You should analyze threat intelligence feeds from several data sources both public and private, beyond what is coming off of the vehicle or what is in your environment. This can include things like governments, vendors, information sharing bodies, peers, suppliers, open-source intelligence, and more. You may subscribe to specific vulnerability feeds regarding specific software and firmware running on the vehicle to address emerging threats and further enhance detection baselines to respond when emerging threats and vulnerabilities are known. It is important to maintain an inventory of embedded software and firmware, as well as operating systems, packages, and libraries that are used per vehicle model and type so that you are aware of what is relevant to your environment based on threat intelligence feeds.