GB/T 40861-2021 PDF English
US$260.00 · In stock · Download in 9 secondsGB/T 40861-2021: General technical requirements for vehicle cybersecurity Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
GB/T 40861-2021 | English | 260 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
General technical requirements for vehicle cybersecurity
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 40861-2021
GB/T 40861-2021: General technical requirements for vehicle cybersecurity---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT40861-2021
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 430.020
CCS T 40
General Technical Requirements for Vehicle
Cybersecurity
Issued on. OCTOBER 11, 2021
Implemented on. MAY 01, 2022
Issued by. State Administration for Market Regulation;
Standardization Administration of PRC.
Table of Contents
Foreword... 3
Introduction... 4
1 Scope... 6
2 Normative References... 6
3 Terms and Definitions... 6
4 Abbreviations... 8
5 Protected Objects... 9
5.1 General... 9
5.2 In-vehicle system... 9
5.3 Out-of-vehicle communication... 10
6 Technical Requirements... 10
6.1 Principled requirements... 10
6.2 Systematic defence strategy requirements... 11
6.3 Protection dimension requirements... 12
Appendix A (Informative) Information Security Threats... 18
Bibliography... 23
1 Scope
This Document specifies the protected objects and technical requirements of vehicle
cybersecurity.
This Document is applicable to M and N categories of vehicles, their electrical and
electronic systems and components.
2 Normative References
The provisions in following documents become the provisions of this Document
through reference in this Document. For the dated documents, only the versions with
the dates indicated are applicable to this Document; for the undated documents, only
the latest version (including all the amendments) is applicable to this Document.
GB/T 29246-2017 Information Technology - Security Techniques - Information
Security Management Systems - Overview and Vocabulary
GB/T 34590.3-2017 Road Vehicles - Functional Safety - Part 3.Concept Phase
3 Terms and Definitions
For the purposes of this Document, the terms and definitions given in GB/T 29246-
2017 and the following apply.
3.1 Vehicle cybersecurity
The electronic and electrical systems, components and functions of the vehicle are
protected, so that its assets are not threatened.
3.2 Authenticity
An entity is a characteristic of the entity it claims.
3.3 Confidentiality
The characteristic that information is unavailable or non-disclosed to unauthorized
individuals, entities, or processes.
3.4 Integrity
Accurate and complete characteristics.
3.5 Availability
Accessible and usable characteristics according to the requirements of authorized
entities.
3.6 Access controllability
The characteristic that is authorized and restricted based on the business and security
requirements to ensuring the access to the asset.
4 Abbreviations
The following abbreviations are applicable to this Document.
CAN. Controller Area Network;
Dos. Denial of Service;
DDoS. Distributed Denial of Service;
ECU. Electronic Control Unit;
FTP. File Transfer Protocol;
HSM. Hardware Secure Module;
ICCID. Integrate Circuit Card Identity;
IMSI. International Mobile Subscriber Identity;
JTAG. Local Interconnect Network;
LIN. Local Interconnect Network;
OBD. On-Board Diagnostics;
TCM. Trusted Cryptography Module;
TEE. Trusted Execution Environments;
Telnet. Telecommunication Network Protocol;
V2X. Vehicle to Everything;
Wi-Fi. Wireless Fidelity.
5 Protected Objects
5.1 General
According to the category of protected objects, automobiles can be divided into three
types of sub-protected objects. in-vehicle systems, out-of-vehicle communications,
and out-of-vehicle systems, as shown in Figure 2.
5.2 In-vehicle system
The in-vehicle system is divided into the following sub-protected objects.
5.3 Out-of-vehicle communication
The out-of-vehicle communication is divided into the following sub-protected objects.
6 Technical Requirements
6.1 Principled requirements
6.1.1 Principle of business suitability
The information security design of the product shall be combined with the actual needs
of the business or functional environment, while considering the impact on the normal
use of the business or function.
6.1.2 Principle of no backdoor for software
The software system shall not have a backdoor.
6.1.3 Principle of function minimization
The useless software components, protocol ports, and ECU hardware debugging
interfaces shall be disabled or removed; device pin information should not be exposed.
6.1.4 Principle of minimize authorization
Only necessary permissions shall be granted for product access and information
processing activities.
6.1.5 Principle of permissions separation
The information processing activities of important protected objects shall have two or
more authorities; and each authority shall be separated from each other and granted
separately.
6.1.6 Principle of default settings
The product shall complete the default information security settings; this setting shall
minimize and simplify the user's information security requirements.
6.2 Systematic defence strategy requirements
6.2.1 General
The product can adopt one of the following systemic defence strategies.
6.2.2 Requirements for Defence-in-depth
The Defence-in-depth meets the following requirements.
6.2.3 Requirements for active defence
The active defence shall adopt measures including but not limited to intelligence
sharing, intrusion detection technology, dynamic adjustment of information security
strategies, and coordination among various information security modules to reduce the
risks faced by information systems when they are attacked by networks.
6.2.4 Requirements for resilience defence
Information security design shall comprehensively consider reliability, functional safety
and other aspects of engineering design to improve the survivability and self-healing
ability of the system.
6.3 Protection dimension requirements
6.3.1 Protection requirements for the in-vehicle system
6.3.1.1 Protection requirements for software systems
6.3.1.2 Protection requirements for electronic and electrical hardware
6.3.1.3 Protection requirements for in-vehicle data
6.3.1.4 Protection requirements for in-vehicle communication
6.3.1.4.1 Authenticity
In-vehicle communication shall verify the authenticity of the identities of the
communicating parties.
6.3.1.4.2 Confidentiality
In-vehicle communication shall be encrypted and protected.
6.3.1.4.3 Integrity
In-vehicle communication shall adopt an integrity protection mechanism.
6.3.1.4.4 Availability
In-vehicle communication shall have the ability to control communication flow.
EXAMPLE. When being infected by malware software or denial-of-service attack and causing
abnormal communication traffic in the vehicle, it is still able to provide acceptable
communication.
6.3.1.4.5 Access controllability
In-vehicle communication shall meet the following access controllability requirements.
6.3.1.4.6 Accountability
In-vehicle communication shall have the ability to log records.
Example. Record phenomena such as traffic overload and abnormal messages received at a
high frequency.
6.3.1.4.7 Preventability
In-vehicle communication shall have the ability to perceive abnormal messages; when
abnormal messages are perceived, they should have the ability to alert or other safe
responses.
6.3.2 Protection requirements for out-of-vehicle communication
6.3.2.1 Protection requirements for long-distance communication outside the vehicle
6.3.2.1.3 Integrity
The long-distance communication outside the vehicle shall meet the following integrity
requirements.
6.3.2.1.4 Availability
The components communicating with the outside shall support DoS/DDoS attacks.
6.3.2.2 Protection requirements for short-distance communication outside the
vehicle
6.3.2.2.1 Authenticity
The identity authentication function shall be turned on for short-distance
communication outside the vehicle.
6.3.2.2.2 Confidentiality
Encryption function shall be turned on for short-distance communication outside the vehicle.
6.3.2.2.3 Integrity
The integrity protection function shall be turned on for short-distance communication
outside the vehicle.
6.3.2.2.4 Availability
The components communicating with the outside shall support DoS/DDoS attacks.
6.3.2.2.5 Accountability
The short-distance communication outside the vehicle shall have the ability to record
the security-related events of the short-distance communication information; the
content of the record should include the ID of the visiting user and the communication time.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 40861-2021 be delivered?Answer: The full copy PDF of English version of GB/T 40861-2021 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 40861-2021_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 40861-2021_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 40861-2021 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 40861-2021?A step-by-step guide to download PDF of GB/T 40861-2021_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 40861-2021". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|