Air Traffic Management - Information security for organisations supporting civil aviation operations

EN 16495 defines guidelines and general principles for the implementation of an information security management system in organisations supporting civil aviation operations. Not included are activities of the organisations that do not have any impact on the security of civil aviation operations like for example airport retail and service business and corporate real estate management. For the purpose of this European Standard, Air Traffic management is seen as functional expression covering responsibilities of all partners of the air traffic value chain. This includes but is not limited to airspace users, airports and air navigation service providers. The basis of all requirements in this European Standard is trust and cooperation between the parties involved in Air Traffic Management.

Flugverkehrsmanagement - Informationssicherheit für Organisationen im Bereich der Zivilluftfahrt

Diese Europäische Norm legt Leitlinien und allgemeine Grundsätze für die Umsetzung eines Informations-sicherheits-Managementsystems in Organisationen im Bereich der Zivilluftfahrt fest.
Nicht in den Anwendungsbereich fallen Handlungen der Organisationen, die sich nicht auf die Sicherheit von Tätigkeiten im Bereich der Zivilluftfahrt auswirken, wie z. B. Management von Einzelhandelsgeschäften am Flughafen und Dienstleistungsunternehmen sowie Management von Unternehmensimmobilien (en: corporate real estate management).
Für die Zwecke dieser Europäischen Norm wird Flugverkehrsmanagement als funktioneller Begriff betrachtet, der die Verantwortlichkeiten aller an der Wertschöpfungskette im Luftverkehr Beteiligten abdeckt. Das betrifft Luftraumnutzer, Flughäfen und Flugsicherungsorganisationen, ist jedoch nicht allein darauf beschränkt.
Grundlage für alle Anforderungen in dieser Europäischen Norm sind das Vertrauen und die Zusammenarbeit zwischen den Parteien, die am Flugverkehrsmanagement beteiligt sind.

Gestion du trafic aérien - Sécurité de l’information pour les organismes assurant le soutien des opérations de l’aviation civile

La présente Norme européenne définit les lignes directrices et les principes généraux pour la mise en œuvre d’un système de gestion de la sécurité de l’information dans les organismes assurant le soutien des opérations de l’aviation civile.
Les activités des organismes qui n’ont pas d’incidence sur la sécurité des activités de l’aviation civile comme, par exemple, la gestion des commerces de détail et des services aéroportuaires ainsi que des groupements corporatifs immobiliers ne sont pas incluses.
Pour les besoins de la présente Norme européenne, la gestion du trafic aérien est vue comme une expression fonctionnelle couvrant les responsabilités de tous les partenaires de la chaîne de valeur du trafic aérien. Ceci comprend, mais sans y être limité, les utilisateurs aérospatiaux, les aéroports et les prestataires de services de la navigation aérienne.
Toutes les exigences de la présente Norme européenne sont fondées sur la confiance et la coopération entre les parties impliquées dans la gestion du trafic aérien.

Upravljanje zračnega prometa - Varnost informacij za organizacije na področju dejavnosti civilnega letalstva

General Information

Status
Withdrawn
Publication Date
12-Feb-2014
Withdrawal Date
06-Aug-2019
Technical Committee
Current Stage
9900 - Withdrawal (Adopted Project)
Start Date
25-Jul-2019
Due Date
17-Aug-2019
Completion Date
07-Aug-2019

Relations

Buy Standard

Standard
EN 16495:2014
English language
60 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Flugverkehrsmanagement - Informationssicherheit für Organisationen im Bereich der ZivilluftfahrtGestion du trafic aérien - Sécurité de l’information pour les organismes assurant le soutien des opérations de l’aviation civileAir Traffic Management - Information security for organisations supporting civil aviation operations35.240.60Uporabniške rešitve IT v transportu in trgoviniIT applications in transport and trade03.220.50Air transportICS:Ta slovenski standard je istoveten z:EN 16495:2014SIST EN 16495:2014en,fr,de01-april-2014SIST EN 16495:2014SLOVENSKI
STANDARD



SIST EN 16495:2014



EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM
EN 16495
January 2014 ICS 03.220.50; 35.040 English Version
Air Traffic Management - Information security for organisations supporting civil aviation operations
Gestion du trafic aérien - Sécurité de l'information pour les organismes assurant le soutien des opérations de l'aviation civile
Flugverkehrsmanagement - Informationssicherheit für Organisationen im Bereich der Zivilluftfahrt This European Standard was approved by CEN on 9 November 2013.
CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same status as the official versions.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre:
Avenue Marnix 17,
B-1000 Brussels © 2014 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. EN 16495:2014 ESIST EN 16495:2014



EN 16495:2014 (E) 2 Contents Page Foreword .4 1 Scope .5 2 Normative references .5 3 Terms and definitions .5 4 Information security management in aviation .5 4.1 Structure of this European Standard .5 4.2 Information security management systems in aviation .6 4.3 Assessment of information security risks .6 4.4 Selecting controls . 10 4.5 Levels of trust . 10 4.6 Statement of applicability . 12 4.7 Measurement and auditing of security . 12 5 Security policy . 12 5.1 Information security policy . 12 6 Organisational security . 13 6.1 Internal organisation . 13 6.2 External parties . 14 7 Asset management . 15 7.1 Responsibility for assets . 15 7.2 Information classification . 15 8 Human resources security . 16 8.1 Prior to employment . 16 8.2 During employment . 17 8.3 Termination or change of employment . 17 9 Physical and environmental security . 18 9.1 Secure areas . 18 9.2 Equipment security. 18 10 Communications and operations management . 19 10.1 Operational procedures and responsibilities . 19 10.2 Third party service delivery management . 19 10.3 System planning and acceptance . 20 10.4 Protection against malicious and mobile code . 20 10.5 Back-up . 20 10.6 Network security management . 21 10.7 Media handling . 21 10.8 Exchange of information . 21 10.9 Electronic commerce services . 22 10.10 Monitoring . 22 11 Access control . 23 11.1 Business requirement for access control . 23 11.2 User access management . 23 11.3 User responsibilities . 25 11.4 Network access control . 25 11.5 Operating system access control . 26 11.6 Application and information access control . 27 11.7 Mobile computing and teleworking. 27 SIST EN 16495:2014



EN 16495:2014 (E) 3 12 Information systems acquisition, development and maintenance . 28 12.1 Security requirements of information systems . 28 12.2 Correct processing in applications . 28 12.3 Cryptographic controls . 30 12.4 Security of system files . 31 12.5 Security in development and support processes . 31 12.6 Technical Vulnerability Management . 31 13 Information security incident management . 33 13.1 Reporting information security events and weaknesses . 33 13.2 Management of information security incidents and improvements . 34 14 Business continuity management . 34 14.1 Information security aspects of business continuity management . 34 15 Compliance . 36 15.1 Compliance with legal requirements . 36 15.2 Compliance with security policies and standards, and technical compliance . 37 15.3 Information systems audit considerations . 37 Annex A (informative)
Implementation examples . 38 A.1 General . 38 A.2 Security of information in web applications and web services (LoT-A-WEB) . 39 A.2.1 General . 39 A.2.2 Parameters for the Level of Trust of a web application / web service . 39 A.2.3 Determination of the web application / the web service (LoT-A-WEB) . 39 A.2.4 Consequences . 40 A.3 Connections between multiple organisations /external connections (LoT-A-NET) . 40 A.3.1 Determination of the necessary protection controls . 40 A.3.2 Effects of the coupling of networks . 46 A.4 Certificates / Public Key Infrastructure (LoT-A-PKI) . 47 A.4.1 Parameters for the Level of Trust of the certificate management . 47 A.4.2 Determination of the Level of Trust of the certificate management (LoT-A-PKI) . 47 A.4.3 Effects: Recognition of Certificates / PK . 47 A.5 Identity Management (LoT-A-IDM) . 48 A.5.1 Parameters for the Level of Trust of Identity Management . 48 A.5.2 Determination of the Level of Trust of the Identity Management (LoT-A-IDM) . 48 A.5.3 Effects: Recognition of identities . 49 Annex B (informative)
Level of Trust – Implementation Example. 50 Bibliography . 60
SIST EN 16495:2014



EN 16495:2014 (E) 4 Foreword This document (EN 16495:2014) has been prepared by Technical Committee CEN/TC 377 “Air Traffic Management”, the secretariat of which is held by DIN. This European Standard shall be given the status of a national standard, either by publication of an identical text or by endorsement, at the latest by July 2014, and conflicting national standards shall be withdrawn at the latest by July 2014. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights. According to the CEN/CENELEC Internal Regulations, the national standards organisations of the following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. SIST EN 16495:2014



EN 16495:2014 (E) 5 1 Scope This European Standard defines guidelines and general principles for the implementation of an information security management system in organisations supporting civil aviation operations. Not included are activities of the organisations that do not have any impact on the security of civil aviation operations like for example airport retail and service business and corporate real estate management. For the purpose of this European Standard, Air Traffic management is seen as functional expression covering responsibilities of all partners of the air traffic value chain. This includes but is not limited to airspace users, airports and air navigation service providers. The basis of all requirements in this European Standard is trust and cooperation between the parties involved in Air Traffic Management. 2 Normative references The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. ISO/IEC 27000:2012, Information technology — Security techniques — Information security management systems — Overview and vocabulary ISO/IEC 27002:2005, Information technology — Security techniques — Code of practice for information security controls 3 Terms and definitions For the purposes of this document, the terms and definitions given in ISO/IEC 27000:2012 and the following apply. 3.1 Air Traffic Management aggregation of the airborne and ground-based functions (air traffic services, airspace management and air traffic flow management) required to ensure the safe and efficient movement of aircraft during all phases of operations 3.2 trust situation where one party is willing to rely on the actions of another party Note 1 to entry: Trust is more than what can be achieved by assurance. However, assurance represents a supporting instrument to trust building. 4 Information security management in aviation 4.1 Structure of this European Standard This European Standard is structured in line with ISO/IEC 27002. ISO/IEC 27002 is merely referenced in all cases in which its measures can be applied without being amended or supplemented. In all cases in which the implementation of ISO/IEC 27002 measures requires supplementation specific to aviation, this has been integrated directly in the respective section. SIST EN 16495:2014



EN 16495:2014 (E) 6 Implementation examples for specific application areas are described in Annex A (informative). This relates to the following areas: — Security of information in web applications and web services; — Connections between multiple organisations /external connections; — Certificates / Public Key Infrastructure; — Identity Management. 4.2 Information security management systems in aviation This European Standard is a guideline for implementing and controlling an information security management system in aviation organisations. It is based on the international standard ISO/IEC 27002 (Code of practice for information security management). Aviation organisations have also to consider the security measures listed in this European Standard in addition to the objectives and measures of ISO/IEC 27002. Information security management has a high priority in aviation regardless of the respective position of the organisation within the service chain. Without an effective information security management system, the risks in connection with the confidentiality, availability and integrity of the information/data required for service delivery increase critically. Service delivery in aviation is greatly defined by the cooperation of the individual participants. An organisation's information security management is therefore dependent on the information security management of the organisations with which it cooperates to deliver service. This European Standard therefore focusses on aspects of cooperation. This cooperation requires — sharing the results of risk assessments along the business process chain, — agreement on the required level of trust, — agreement on the required security controls and their implementation. 4.3 Assessment of information security risks 4.3.1 Internal information security risk management To understand its own security position, an organisation will need to have an understanding of the security position of its partners. Making network connections and exchanging data are based on a trust assessment between the parties involved. The extent to which the network traffic and data needs to be controlled and checked is determined by the degree of trust. This is further explored in 4.5. To enable a secure external connection and data exchange the organisation shall assess the trust it can place in the connection and in the data being received, and ensure itself that the trust assessment is validated. It is important to stress that this does not mean the organisation needs to know everything about its partners’ security. What is needed is enough information to provide the required level of assurance, based on risk assessments. Generic Interconnectivity cases may be constructed and assessed based on a common set of parameters and processes. When these cases apply to concrete interconnectivity cases, additional risk assessments are not necessary. An example of a generic interconnectivity case can be found in Annex A. SIST EN 16495:2014



EN 16495:2014 (E) 7 Organisations shall share this information to the required level with their partners in civil aviation. This European Standard specifies what information needs to be shared. The underlying risk assessment process is compatible with ISO/IEC 27005:2011. This applies especially to the terminology used below. Activities described in subsequent clauses may be conducted in a different order depending on the methodology used.
Key Boxes with a double line indicate information to be shared as discussed in 4.3.3 Boxes with triple line indicate criteria that have to be established as part of the organisations risk management process. They are then used as fixed inputs to the individual risk assessments Figure 1 A. Impact criteria Impact criteria should be developed and specified in terms of the degree of damage or costs to the organisation caused by an information security event. SIST EN 16495:2014



EN 16495:2014 (E) 8 B. Likelihood evaluation criteria Likelihood evaluation criteria should be developed that are understood in a similar way by all organisations involved and affected. C. Risk evaluation criteria Risk evaluation criteria should be developed for evaluating the organisation's information security risk considering the following: — the strategic value of the business information process; — the criticality of the information assets involved; — legal and regulatory requirements, and contractual obligations; — operational and business importance of availability, confidentiality and integrity; — stakeholders' expectations and perceptions, and negative consequences for goodwill and reputation. D. Risk acceptance criteria Risk acceptance criteria should be developed and specified. The risk assessment process should include the following steps. Step 1. Scope and boundaries: Function: To ensure that all relevant assets are taken into account and to assess risks that might arise through the organisation's boundaries. Additionally, the organisation should provide justification for any exclusion from the scope. Results: The specification of the assessment scope and boundaries. Step 2. Assets: Function: To identify anything that has value to the organisation and which therefore requires protection. An asset shall have a single set of attributes that can be related to threats and vulnerabilities, to allow for analysis in the following steps. Results: A list of assets to be risk-managed and a list of business processes related to assets and their relevance together with the relevant owners. Step 3. Threats: Function: To identify threats which have the potential to harm assets such as information, processes and systems. A threat may arise from within or from outside the organisation. Results: A list of threats with the identification of threat type and source. Step 4. Existing controls: Function: To identify the existing or planned controls to see how they would reduce threat likelihoods and the ease of exploiting vulnerabilities, or the impact of an incident. Results: A list of all existing and planned controls, their implementation and usage status. SIST EN 16495:2014



EN 16495:2014 (E) 9 Step 5. Vulnerabilities: Function: To identify the features inherent to the assets and business processes can be exploited to deliver an attack. Not all vulnerabilities will be known at the time of the assessment (particularly the technical so-called zero-day vulnerabilities). This possibility needs to be addressed in security controls that allow for rapid reassessment of risk when they are discovered. Results: A list of vulnerabilities in relation to assets, threats and controls. Step 6. Scenarios: Function: To identify the effects to the organisation that could be caused by a threat scenario. A threat scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities to attack assets, despite existing controls. Results: A list of threat scenarios with their effects related to the organisation's assets and business processes as well as those of other affected organisations. Step 7. Consequences (assessment): Function: To assess the consequences of each scenario, related to asset valuation and based on the business impact criteria. Results: A list of assessed consequences of an incident scenario expressed with respect to assets and impact criteria. Step 8. Likelihood: Function: To assess the likelihood of each scenario occurring. Results: Likelihood of threat scenarios (quantitative or qualitative). Step 9. Evaluated Risk: Function: To turn scenarios into evaluated risks based on the consequences and likelihood and the risk evaluation criteria defined during the context establishment. Aggregation of multiple low or medium risks may result in much higher overall risks and need to be addressed accordingly. Results: A list of risks ranked according to risk evaluation criteria in relation to the threat scenarios that lead to those risks. Step 10. Assessed Risk: Function: To assess the list of ranked risks for acceptability based on the risk acceptance criteria previously defined. Results: A list of assessed risks with related threat scenarios prioritised according to risk acceptance criteria. This will include information on consequences and likelihood for each risk. 4.3.2 Interoperability issues of risk assessments Interoperability of risk assessments is an important issue within an environment that can be characterised as “system of systems”. In such an environment, risk assessments covering (sub-parts of) these systems will exist and it is important to identify the correspondences amongst risks identified and mitigation controls proposed in these assessments. This will allow for a coherent security policy for the entire complex system. In order to achieve interoperability of risk assessments if different risk assessment methodologies are used, SIST EN 16495:2014



EN 16495:2014 (E) 10 — an understanding about the correspondence between the issues/notions/terms introduced in each of the underlying risk assessment methodologies needs to be established and — the depth and width of each assessment needs to be compared and assessed in order to understand the assumed environment and the decisions regarding the security level of the system at hand. Terminology issues might also be relevant, as even if the underlying methods are the same, it might happen that issues/notions/terms are being assigned different semantics. To ensure comparability across multiple organisations, the organisation shall share at least information on scope and boundaries, threat scenarios and the assessed risks. Information sharing should be based on the need to know principle to the extent necessary to deal with shared risks. Due to the sensitive nature of the catalogues of assessed risks, these results are usually developed by each organisation internally and are kept internally confidential. The exchange of the information needs to be backed by appropriately binding confidentiality agreements between the organisations affected. 4.4 Selecting controls Controls should be selected and implemented in line with the results of the information security risk assessments: — controls from ISO/IEC 27002; — controls supplementing those stated in ISO/IEC 27002. These are described in this European Standard as implementation specifications specific to aviation. 4.5 Levels of trust 4.5.1 Introduction As stated above in 4.2, service delivery in aviation is defined by a high level of cooperation between the organisations involved. Guaranteeing the security of information and the systems that process that information within an individual organisation in a shared business process and the underlying proprietary business processes entails a high level of individual agreements and reviews. Aviation organisations working in partnership should agree that levels of trust backed by reasonable evidence (from 1:1 relationships between two parties or through third-party verification) be recognised in further shared business processes (including with third parties). The “Level of Trust of the organisation” (LoT-O) relates to the respective organisation. Classification always relates to the aspect of the shared process handled by the respective organisation. In particular, this takes into account potential information security risks that can arise for the respective party through linking business processes. In addition to the organisation's overall assessment, a level of trust can also be classified for a specific subarea application area as described in the examples in Annex A. 4.5.2 Scale of trust levels A six-point scale is used to classify the “Level of Trust”: — Trusted; — Limited Trust 0; SIST EN 16495:2014



EN 16495:2014 (E) 11 — Limited Trust 1; — Limited Trust 2; — Limited Trust 3; — Untrusted. The general definitions for the different levels should be as follows: a) Trusted
The “trusted” category is only applied to an organisation's own departments, subsidiaries or business processes that are fully subject to
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.