ISO/SAE 21434 审核要求与WP的映射关系
《ISO/PAS 5112 Road vehicles-Guidelines for auditing cybersecurity engineering》是针对ISO/SAE 21434的审核标准,用于指导对CSMS的审核。ISO/PAS 5112在附录A给出了审核问卷的示例参考,包括6个模块,分别是:网络安全管理、持续性网络安全活动、风险评估及方法、概念及产品开发阶段、后开发阶段以及分布式网络安全活动。每个模块都有具体的问题和对应的证据示例,证据示例主要来自于ISO/SAE 21434中的WP和部分没有要求输出WP的RQ(之前《ISO 21434 工作产品与要求的映射关系》的文章也有说明,PS:欢迎关注公众号Vehicle CyberSecurity,获取更多内容)。
具体的审计问题与证据的映射关系如下。
|
Audit questionnaire |
Evidence examples |
|
A.2.1 Cybersecurity management |
|
|
Q1.1 Are cybersecurity policy, rules and processes defined? |
[WP-05-01] Cybersecurity policy, rules and processes |
|
Q1.2 Are cybersecurity-relevant processes managed? |
[WP-05-01] Cybersecurity policy, rules and processes |
|
Q1.3 Are cybersecurity culture and cybersecurity awareness established,
implemented, and maintained? |
[WP-05-02] Evidence of competence management, awareness management and continuous improvement |
|
Q1.4 Is a process established, implemented, and maintained to manage
project dependent cybersecurity? |
[WP-06-01] Cybersecurity plan |
|
A.2.2 Continual cybersecurity activities |
|
|
Q2.1 Is a process established, implemented, and maintained to monitor
for cybersecurity information? |
[WP-08-01] Sources for cybersecurity information |
|
Q2.2 Is a process established, implemented, and maintained to evaluate
cybersecurity events? |
[WP-08-04] Weaknesses from cybersecurity events |
|
Q2.3 Is a process established, implemented, and maintained to identify
and analyse vulnerabilities? |
[WP-08-05] Vulnerability analysis |
|
Q2.4 Is a process established, implemented, and maintained to manage
identified vulnerabilities? |
[WP-08-06] Evidence of managed vulnerabilities |
|
A.2.3 Risk assessment and methods |
|
|
Q3.1 Are methods established, implemented, and maintained to determine cybersecurity
risks for an item across concept, product development and post-development
phases? |
[WP-15-04] Impact ratings with associated impact categories |
|
Q3.2 Is a process established, implemented, and maintained to perform a
threat analysis and risk assessment (TARA) for an item across concept,
product development and post-development phases? |
[WP-15-01] Damage scenarios |
|
Q3.3 Is a process established, implemented, and maintained to treat
cybersecurity risks for the item across concept, product development and
post-development phases? |
[WP-09-04] Cybersecurity claims |
|
A.2.4 Concept and product development phase |
|
|
Q4.1 Is a process established, implemented, and maintained to define the
item and specify cybersecurity requirements? |
[WP-09-01] Item definition |
|
Q4.2 Is a process established, implemented, and maintained for
verification of cybersecurity requirements on components during the
development phase? |
[WP-10-04] Verification report for the cybersecurity specifications |
|
Q4.3 Is a process established, implemented, and maintained for
validation of cybersecurity goals and claims at an item level? |
[WP-11-01] Validation report |
|
A.2.5 Post-development phase |
|
|
Q5.1 Is there a process established, implemented, and maintained for
release of an item or component for post development phases? |
[WP-06-04] Release for post-development report |
|
Q5.2 Is a process established, implemented, and maintained to apply the
cybersecurity requirements for post-development during production? |
[WP-12-01] Production control plan |
|
Q5.3 Is a process established, implemented, and maintained to respond to
cybersecurity incidents? |
[WP-13-01] Cybersecurity incident response plan |
|
Q5.4 Is a process established, implemented, and maintained for updates
to items or components after production? |
Software update management related to cybersecurity Related work products which are required according to ISO/SAE 21434: 2021 from concept and product development phases |
|
Q5.5 Is a procedure established, implemented, and maintained for
communicating end of cybersecurity support? |
[WP-14-01] Procedures to communicate the end of cybersecurity support |
|
Q5.6 Is a procedure established, implemented, and maintained for making
available cybersecurity requirements for decommissioning? |
Appropriate documentation (e.g. instructions, user manuals) relating to such requirements can enable decommissioning with regard to cybersecurity. |
|
A.2.6 Distributed cybersecurity activities |
|
|
Q6.1 Is a process established, implemented, and maintained to manage
dependencies that may exist within the entire, relevant supply chain
regarding the cybersecurity management system? |
[WP-07-01] Cybersecurity interface agreement Evidence of supplier capabilities |

浙公网安备 33010602011771号