We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Aerospace Village - Critical Aerospace Cybersecurity

00:00

Formale Metadaten

Titel
Aerospace Village - Critical Aerospace Cybersecurity
Untertitel
A changing paradigm and how you can help
Serientitel
Anzahl der Teile
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Aerospace is changing – Its digital transformation must now be synonymous with being cyber secure. In-cabin systems are looking more like your everyday living room and the numerous potential entry points must be tested for security. During this session we will take you through the offensive testing that we put systems through to show you what is happening to improve the life cycle of aviation systems thanks to cybersecurity-by-design principles influenced by a hack/fix process. From design to operation, blue teams and red teams are working together for a first line of defense to help identify vulnerabilities and ensure more robust and resilient systems – systems which we all rely on, and must be certified by Airworthiness Authorities when safety is at stake. Join Nathalie Feyt, Lawrence Rowell and Yannick Le Ray as they lead a presentation on securing avionics, passenger systems, and air traffic management systems, and show how industry designs, attacks, learns and improves aerospace systems.
HilfesystemGasströmungWeb-SeiteEDV-BeratungOperations ResearchProdukt <Mathematik>Schreib-Lese-KopfInformationCybersexProgrammierparadigmaPhysikalisches SystemEDV-BeratungComputersicherheitCybersexSchreib-Lese-KopfProdukt <Mathematik>Nichtlinearer OperatorOffice-PaketCoxeter-GruppeInformationSoftwareentwicklerEinfach zusammenhängender RaumAnnulatorFokalpunktTafelbild
DigitalsignalTransformation <Mathematik>CybersexComputersicherheitHackerKette <Mathematik>VerschiebungsoperatorGüte der AnpassungAnnulatorProgrammierparadigmaCybersexPhysikalisches SystemComputersicherheitKette <Mathematik>DatenverwaltungSignalverarbeitungFokalpunktHackerComputeranimation
Dienst <Informatik>GeradeSignalverarbeitungGamecontrollerSoftwarewartungCybersexComputersicherheitFlächentheorieRechenschieberCoxeter-GruppePhysikalisches System
Physikalisches SystemProgrammierumgebungKonditionszahlEinfach zusammenhängender RaumSelbst organisierendes SystemComputersicherheitCybersexDreiecksfreier GraphComputerspielHilfesystemSignalverarbeitungZweiAnalytische FortsetzungNichtlinearer OperatorDigitale SignalverarbeitungHacker
HackerDean-ZahlAnalysisSoftwaretestHackerTypentheorieTermProgrammierumgebungUmwandlungsenthalpieVirtuelle RealitätInternetworkingDienst <Informatik>Service providerPhysikalisches SystemDesign by ContractSoftwareschwachstelleServerGamecontrollerRechenschieberGüte der AnpassungAnnulatorComputersicherheit
Produkt <Mathematik>Wort <Informatik>PunktProgrammierparadigmaSchlussregelAggregatzustandSoftwaretestComputersicherheitCybersexCASE <Informatik>GeradeSondierungMultiplikationsoperatorTeilbarkeitMereologiePhysikalisches SystemTypentheorieLeistung <Physik>AnnulatorProdukt <Mathematik>Inverser LimesProgrammierumgebungZahlenbereichZusammenhängender GraphComputerarchitekturVektorraumEndliche ModelltheoriePersönliche IdentifikationsnummerUmsetzung <Informatik>QuaderInformationVektorpotenzialSoftwareschwachstelleDatenverwaltungVerschiebungsoperatorAbgeschlossene MengeMAP
Dienst <Informatik>Ordnung <Mathematik>EvoluteZahlenbereichTermInterface <Schaltung>Physikalisches SystemTouchscreenInformationComputersicherheitMathematikSoftwaretestGüte der AnpassungInternetworkingTrennschärfe <Statistik>FlächeninhaltMereologieAnnulatorNichtlineares GleichungssystemBenutzerfreundlichkeitInhalt <Mathematik>Kartesische KoordinatenSpieltheorieGoogolKonfiguration <Informatik>App <Programm>InformationsspeicherungFastkörperComputeranimation
Public-domain-SoftwareDatenverwaltungWorkstation <Musikinstrument>RechnernetzInternetworkingPersönliche IdentifikationsnummerAnnulatorRPCProdukt <Mathematik>MultiplikationsoperatorWeb SiteKollaboration <Informatik>BenutzeroberflächeDifferenteProgrammierumgebungEvoluteFlächeninhaltÄhnlichkeitsgeometrieFeuchteleitungProzessfähigkeit <Qualitätsmanagement>VektorraumCASE <Informatik>ForcingEuler-WinkelSichtenkonzeptComputersicherheitCybersexMathematikZahlenbereichPhysikalisches SystemSoftwaretestProgrammierparadigmaGüte der AnpassungVerschiebungsoperatorHackerLaurent-ReiheRechter Winkel
HackerPhysikalisches SystemPunktwolkeKlassische PhysikSoftwaretestProgrammierungPhasenumwandlungReelle ZahlHackerMultiplikationsoperatorPatch <Software>Physikalische TheorieWeg <Topologie>PrimzahlzwillingeCybersexFlächeninhaltProdukt <Mathematik>Interaktives FernsehenInternetworkingSimulationWellenpaketGüte der AnpassungInformationstechnikDreiecksfreier GraphNichtlinearer OperatorService providerProgrammierparadigmaFramework <Informatik>NebenbedingungIdentifizierbarkeitIntelligentes NetzAnnulatorPortal <Internet>ProgrammfehlerBaum <Mathematik>MereologieAFDXProtokoll <Datenverarbeitungssystem>RelativitätstheorieKlasse <Mathematik>Folge <Mathematik>FunktionalSelbstrepräsentationInstantiierungNational Institute of Standards and TechnologyZweiLaurent-ReiheIntegralWeb SiteRankingDiagramm
Wiederherstellung <Informatik>HilfesystemExplosion <Stochastik>Physikalisches SystemPatch <Software>SoftwareschwachstelleSoftwaretestDatenfeldMAPCASE <Informatik>KonfigurationsraumPhasenumwandlungFramework <Informatik>Produkt <Mathematik>TeilmengeAnaloge SignalverarbeitungSoundverarbeitungExogene VariableMultiplikationsoperatorMaschinenschreibenGüte der AnpassungInzidenzalgebraComputersicherheitDienst <Informatik>InternetworkingHackerReelle ZahlBetragsflächeBitrateKartesische KoordinatenBitQuellcodeKonfigurator <Softwaresystem>Deskriptive StatistikSoftwarewartungEreignishorizontProgrammierungVideokonferenzAnnulatorTypentheorieNichtlinearer OperatorStandardabweichungNebenbedingungVerkehrsinformationComputeranimation
SoftwareschwachstelleNichtlinearer OperatorInzidenzalgebraExogene VariableKanalkapazitätArithmetisches MittelComputersicherheitSoftwarewartungInformationCybersexPhysikalisches SystemInteraktives FernsehenHackerPunktGemeinsamer SpeicherComputeranimationDiagramm
NebenbedingungNichtlinearer OperatorPhasenumwandlungSelbstrepräsentationPhysikalisches SystemAutomatische HandlungsplanungEingebettetes SystemKette <Mathematik>Güte der AnpassungHackerSoftwareschwachstelleMereologieProgrammierparadigmaMaschinenschreibenWeb SiteSoftwaretestSichtenkonzeptIntegralLorenz-KurveAnnulator
QuantenzustandFreewareProdukt <Mathematik>ComputersicherheitMaschinenschreibenAdressraumTouchscreenArithmetisches MittelExogene VariablePhysikalisches System
Transkript: English(automatisch erzeugt)
Aerospace Systems, a changing paradigm and how you can help. First let me quickly introduce you to our presenters from TALIS. We have Yannick Laray, head of pre-sales and international development for cyber security consulting and operations.
We also have Lawrence Rowell who's the director of product cyber security for our connected cabin and in-flight entertainment systems. And finally we have Natalie Fate who's chief information and product security officer for our global avionics systems. The focus of today's session is to show
how industry design, attack, learn, and improve critical aerospace systems to cyber secure avionics, passenger systems, and air traffic management systems. First we will speak to the changing requirements and what digital transformation has done for cyber security. Then we will explain our paradigm shift with respect to the
design of our systems. And finally we will talk about how we integrate good faith hacking and create a chain of trust. So let's start with Yannick to talk about digital transformation and cyber security. Yannick over to you. Thank you Adam. We wish we would be there physically,
however due to COVID-19 we're in this virtual presentation. Hopefully we'll be there all together next year for the next DEFCON. So now let's talk about digital transformation and cyber security. Today aviation sector is leading to digital transformation.
This playground represents an international and complex ecosystem with a wide threat surface exposure for attackers. As you can see in this slide there are many targets to be protected and some of them we can talk about the air traffic control and air navigation systems, we can talk about the connected aircraft,
the airport, the airline maintenance control center, as well as the UAVs and drones. These targets are associated with multiple risks and have risk exposure and therefore we need to be coherent and with a global approach to better understand and reduce the risk. As I said previously
aeronautics environment is leading to digital transformation with an open and connected world. Digital transformation leads to data driven organization and therefore cyber security. Knowing that for aeronautics safety is the first priority.
We must secure stakeholders trust as well as safety critical aeronautics system putting the passenger as our first priority. No digital transformation without trust, no trust without cyber security. This connected environment raises two challenges for aerospace ecosystem. First safety and security stake requiring to keep up
hackers in a safety environment setting up cyber secure conditions across all system life cycle. And second business continuity needing to value cyber security to help prevent business operational disruptions. Now let's talk about the hackers in these environments. We're going to talk about ethical
good faith hackers and at this we aim to provide the best possible practices and we want to make sure our solutions and services as well as our customers infrastructures are cyber secure and would therefore we perform for example risk analysis
and pen test using our own active hackers sorry and for sure we're talking about ethical hackers and ethical talent hackers. These hackers can act through the internet. For example from one of our air navigation service provider customer we've been able through some services that we provided to them
through a contract we've been able to penetrate their power generation systems and this was enabling us to go into their their server which turned on and off the whole air traffic center. All this through our own facilities in France
going in their own air traffic control where it was not for sure in France. And other tools that we have are specific simulation environments. As you can see in this slide we have the red team versus the blue team. With our simulation environments
we're able to implement the infrastructure of our customer their operational infrastructure where the red team is our own hackers which mission is to of course attack and vulnerabilities of the system and the blue team is our customers. Our customers in this environment are there to be trained and see if they are cyber secured also
their system is cyber secure. More and more we need ethical hackers able to master specific sector expertise. This sector expertise is very specific we're not talking about only ISIT we're talking about operational technologies. More and more we're
facing attackers who are aiming at this type of equipment and trying to be more and more specific to attacking. And I know the floor to Lawrence will develop more on what we do in terms of avionics.
Lawrence. Thanks Yannick. Okay so when we're talking about this changing paradigm it's really important to understand the current and historical state of affairs. In other words how has security been managed to this point and why? And then we're also going to talk about what is changing to drive
the new paradigm. So at Talos the high level approach to cybersecurity is defined by nine cybersecurity rules. One of the rules is really important to this audience in this conversation because it speaks directly to penetration testing. Oftentimes we use a gray box approach
with third-party pin testers and we give them a limited amount of information so they have some understanding about the system components and overall architecture and they can test all the threat vectors. This is good and it's a great start considering where we are today but it
also serves as a very good example of a security practice that does not really reach its full potential. The model I just described is performed by a limited number of people for a limited amount of time. They also only have a limited amount of information and it's done in a closed environment
that is not really remotely accessible due to policy and other technical limitations today. This approach does not really leverage the full power of the good faith hacking community and ultimately it results in what can only be called
a limited snapshot into a product's security posture. We must admit the culture of aerospace and aviation has really kind of contributed to this approach that we have today.
Vulnerability management in aerospace and aviation is pretty difficult. Updating the product in most cases is not easy and this is even true for the non-safety critical part of the aircraft. It usually takes a lot of time, a lot of money
and usually a lot of lost revenue to update the system, the aircraft systems. Historically this has kind of contributed to a closed type of thinking. You know along the lines of hey if we don't look hard enough we'll never find anything
and therefore we must not have a problem. The good news is that this mentality we're seeing a change with this. In a recent Atlantic Council survey 84% of aviation professionals that were polled
indicated that cyber security researchers are good for aviation. So now is the time for the industry to improve and we can do better but first it's under it's important to understand the factors that are driving this shift in thinking before we try to answer the
question of how we do better. Let's use the cabin of today's commercial aircraft as an example. It makes sense to look here first for a couple of reasons. This portion of the aircraft is not deemed safety critical therefore it lends itself to the fastest changes
and is going through a rapid evolution in terms of the technologies and systems deployed to satisfy the airline customer. This means this area of aviation will embrace the good faith hacking community the fastest and with relative ease
and it will likely influence other areas of aviation. So everyone knows the majority of commercial aircraft are connected to the internet as wi-fi is viewed as critical for today's passenger. There are also several other changes that are that are bringing the comforts of the living room
into the cabin in today's passenger. So if we take a look at the in-flight entertainment system it's a really good example it's becoming much more complex in several ways. There's an increasing selection of movies and other entertainment content that has not been released to the public.
This requires protection and ongoing security testing. There's a large influx of third-party applications and games and these are games that are not from the Apple App Store or Google Play and have been validated by Apple and Google. These require ongoing security testing as well. E-commerce
and shopping options are constantly expanding along with more convenient ways to pay for your goods and services and this includes the introduction of technologies like near-field communication. The amount of personal information is
increasing with airlines providing a much more personalized service with more convenient payment systems and this also includes the introduction of advertising that is targeted to specific passengers with their demographic information. In order to support all of this
the number of interfaces that on the aircraft that are accessible by the passenger from their seat is increasing. This includes things like USB, Bluetooth, touchscreen, near-field communication, and Wi-Fi. Now consider this is only part of the overall equation. All of these solutions I just described
to support e-commerce, entertainment, and personalization are supported by constantly expanding ground infrastructure. In this ground infrastructure it has similar cyber security risks. It's exposed to the same regulatory requirements like PCI and GDPR
but there's a big difference. These environments look and feel much more like a traditional IT environment. So one positive aspect of this is that IT oriented DevOps teams have already started to embrace practices like crowdsource pin testing. So in the case of aviation and aerospace
this will be a force that will drive the overall industry towards engaging the good faith hacking community. So before I finish there's one last thing I'd like to mention about how we are seeing the COVID pandemic impact this paradigm shift.
Third-party pin testers who were previously required to be on premise to pin test certain products and solutions cannot travel and be on site to do this yet the pin testing still must be conducted. So we are seeing companies quickly adapting, changing their policies
and methods to do remote pin testing whenever possible. Obviously this is going to be a challenge when it comes to systems and products with physical interfaces but we still see a rapid evolution coming in this area. So COVID is actually knocking down some of the previous barriers when it comes
to embracing the good faith hacking community. To summarize these changes have increased the number of assets that need protection while also increasing the number of threat vectors. At the same time we see the aviation community's attitude and view on embracing the good
faith hacker is changing. This means now is the time to do this it's time to embrace the good faith hacking community and look at changing the traditional approach to cyber security. Now I'll hand it over to Natalie to talk about how we can do this in collaboration with the good faith hacking community.
Thank you, Laurent. You're right. We need to see more on how to integrate those hacking activities in our engineering and operations. So I will use the NIST framework which is what we are following to explain our constraints about that. So when we discuss with Laurent on when in this cycle it will be easiest to integrate good faith
hackers. During the identify protect phase it's more aware we do risk assessments not the theoretical part not that easy but definitely during the the design phase it's important and more naturally into the in-service
phase. So those two phases, the during design phase and in-service phase seems natural to me. Today it's obviously during in-service and that we have already interactions with hackers.
I will tell a little story about a CV that has been published on the Thales cabin product and we all know that there is room for improvements in this area to render this interaction more fruitful and this dialogue more fruitful between industry and hackers. We will
discuss that afterwards. Now I would like definitely to focus on during design phase. Why? Simply because for us it's where it is the easiest to patch and to remediate and this is also the good place where
we can confront the theory of the attack path that we imagine with the real practice with hackers and have the good coverage about it and the most we spend time on cyber robustness the most we are saving also money to be honest in the operational phase and in the interface phase.
So now when we think about how we can manage this during design phase it's not easy. Today I have no example of our Airborne system being virtualized and put in a cloud
and accessible through a web portal for you to do pen tests. As explained by Lawrence, we are performing our own pen tests directly in our labs so you need to imagine fully representative labs. For example CABIN you have an instance of the economy class, first class,
business class and it's big balls running owned by us and they are running 24 hours a day and 356 days a year. So you can imagine how it's not easy to organize a pen test sequence in
in such labs which are used to improve our product and answer customers in new new functionalities. So to be clear there is also due to the fact we are on special technology
if you want to to get good face hackers working with us for example through a bug bounty program then there is an investment to be done on hacker sites because you need to enter into specific technology dedicated for aviation. For example we don't have Ethernet we have
AFDX which is a rank 664. This is a Ethernet oriented for safety and there are lots of examples of that on protocols on operating systems and this is driven by safety related requirements. So when we discuss about bug bounty company on how to
to organize better interactions with good face hackers and they mentioned to us they have already this kind of program for ICT suppliers or for example automotive system providers. But with the changing paradigm as
mentioned by Laurence I think that we are now moving to virtualized simulation benches and labs or connected simulation benches of labs and this is a kind of cyber
twin and I think it's promising for ground system and ground infrastructure we just need to follow what is a good practice in other sectors since they are more IT related and we can easily move to classical bug bounty programs.
So to summarize on how we can work together during the design phase I think there are two tracks we can work on. The first one is dedicated bug bounty programs where you come to our big halls and labs and the second would be more to develop
and it is more on our shoulder cyber twins which are helping for doing those pendants and perhaps being more agile doing it more often and with better coverage and not one or two person during some days. So okay I hope it's clear.
Now we'll go for the second phase which is the in-service phase to explore what we can do. So here this is another story and you see the title we call that managing continuous security is not for you it's for our customers to
for them to understand that security is a it's a long road where you need to update regularly due to the fact the new attacks are coming and in the in-service phase the framework is beginning by the detect. This detection comes to us either through
our customer services which is seeing an incident reporting by a customer or this might be an event found on internet so you know we have a threat intelligence team and services like that that help us in
grabbing kind of videos that may be published by hackers but also more in standard way CV that could be published on our products. So to explain what are the issues today I will give you an example I think it's the best. It was a story that happened to us I think
last year and in fact it was a CV published with a high score of eight which is high toxicity and the CVSS is between the one of them and so it was on the in-flight
entertainment systems. So first of all I would like to recall that in-flight entertainment systems are non-critical system if we consider safety so this rating is a bit high and when our incident response team our
pcerts investigate about that they learn that in fact it was a vulnerability exploited on the sub-party chat application and in fact the impact was just you at your seat hacking the chat application crashing and not propagating to any other seats just
standalone on the seat. So it was a bit surprising to us that Mitre even Mitre has ranked this vulnerability at a level of eight but finally we get in touch with a hacker we had a discussion and we say that this score was fast to high and
so when you see such a situation and we generalize it's often the case like that what are the drawbacks in such a way of managing vulnerability disclosure?
So today there is no direct notification to our incident response team product incident response team so as a consequence they might be very long time more than two weeks before we get in touch really with the the good face hacker and understand
and also as this is illustrated here our sector is not real really and understand today you have seen the high rating by Mitre so we need to to have this kind of education and hopefully there are major airlines
and so they are kind enough since they are doing their own risk assessment to tune the level of patching but if it wouldn't have been the case in this in this story we had imagine you need to know the exact configuration product configuration which aircraft
replace the exploit on our big labs find the source code develop the patch then again test in the big labs and it's not finished you need to go to a real aircraft to obtain what is called the field supplier acceptance tense which is provided by the airline for
them to deploy the patch by ensuring it has no secondary effects on the system and believe me the best we did for this type of operation was something like three weeks
and even today there are some patches that we delivered something like more than one year that are not yet deployed by by some airlines because it's a long process to deploy on all fleets a patch and knowing that some aircraft are under maintenance and things like that so what i would like to have in the
future in a in a better disclosure program would be the following first establishing direct exchange with the good face hacker i think it's really important for us to understand and for the hacker to understand also better then establishing care remediation time
and steps before going to publication because depending on on what is uh what has been found and what it is impacting you understand that we don't have the same constraints than in it world so we need more time in some cases so now if it's better that's where you
would say okay if i have a vulnerability to disclose what are what are my possibility to it today and how can i interact with us with you so this is why we have set up first for the whole
ecosystem sharing information capacities when i say the whole ecosystem i mean airport airlines aircraft manufacturers suppliers um we have very few maintenance operator but it's becoming it has been set up some the first one more than four years ago so now um what are the one you can use
i i would advise uh aviation isaac aviation isaac it's an information it's an aviation information sharing community and they are providing sports they have incident response capacity
to facilitate the interactions between the hacker community and the industry also so it's a it's a good point for for you if you need now a second one particularly in europe is exa it's european center for cyber security in aviation so they they don't have an incident response capacity
but last year for defcon for aerospace delayed they were okay so they set up a portal for you to enter the different subject you would like to discuss and not telling the details but tell i don't know i have something to say about an airport or something to say about
the system airborne system and and then they are putting you through um the good stakeholders that are referenced at exa which is uh which is important also so i hope it helps and it will be
easier for you now so to recap don't tell a site we are definitely considering that with the changing paradigm we need to set up plans to embed
good face hackers in our design and operation phase and to do this with a win-win situation for both sides to tell you to be honest without this covid crisis we have scheduled with with Lawrence to to come to to defcon and what was scheduled is to
bring to you a mini lab representative of an in-flight entertainment system one of our latest generation so that you can have a hands-on exercise on it and also you can learn and try so now we have done
this webinar this webinar is there to explain what we do what are our constraints and challenges and you have heard Yannick telling how the aircraft is is and is the part of the whole
ecosystem and there is not only aircraft to consider but all the rest of the ecosystems Lawrence has explained how is the changing paradigm or the paradigm is changing particularly post-covid with the need of our pen tests to to be done in a distant way and i've turned my views on how
we are seeing the integration of good face hackers in our design and how to improve the vulnerability disclosure for for for you for us and for our industry so i'm sure
that good face hacker can be part of the chain of cross-in aviation and we need to keep in mind that we are talking about safety critical system so now i will tell you that if we want to get in touch with us
um we have a dedicated address you can you can see it on the screen so it's a short i mean it's product security and systems response so it's really dedicated to to to what we are delivering i hope it helps again so thank you for your attention and now i let you the floor for the
patience