Linked Knowledge Nuggets: arrow_forward "Fo(u)rces of Cybersecurity Engineering"
personAuthor: Timo Karasch,
Florian Schmitt
Cybersecurity Goals, Controls, Requirements and Threats are important forces for cybersecurity engineering. It is nearly impossible to separate them in a timely manner. In fact, they influence each other during definition.
This webinar gives a simple example of the interaction of these four forces and addresses the consistency to existing standards in Cybersecurity (ISO 21434 and Automotive SPICE for Cybersecurity). It shows a possible approach for implementation in your organization.
school
Webinar recording and slides
arrow_forward "Testmanagement"
personAuthor: Process Fellows
Test Management ensures that testing activities are strategically planned, monitored, and evaluated across all development phases. From unit tests to system-level integration, this cross-cutting discipline defines methods, tools, documents, and roles to ensure traceable and efficient verification and validation.
school
PF_Testmanagement_Extract.pdf Short Overview of Test Management (related to all Automotive SPICE® verification processes)
arrow_forward "Verification level vs. Verification timepoint"
personAuthor: Process Fellows
The execution of a verification measure is not necessarily linked to the verification time point.
It is possible that a verification measure from SWE.6 is carried out as part of the verification of the SW component and integration verrifcation if the setup or the environment is better suited to this.
However, it remains a verification of the SW requirements.
The decisive factor is what a verification measure is derived from.
However, it is important to ensure that this verification measure is included in and part of the report and in the summary of the SW verification.
Pay attention to the sequences and dependencies to be followed.
# PROCESS PURPOSE
The purpose is to confirm that the integrated (System = A collection of interacting items organized to accomplish a specific function or set of functions within a specific environment.) achieves the associated (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.).
# PROCESS OUTCOMES
O1
Risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures are specified based on the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.).
O2 (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures are selected according to defined criteria, including criteria for regression (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.).
O3
The integrated (System = A collection of interacting items organized to accomplish a specific function or set of functions within a specific environment.) is validated using the specified (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures, and the results of the (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) are recorded.
O4 (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.) and bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) are established between the (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures and the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.); and bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) is established between (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results and (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures.
O5
The results of the risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) are summarized and communicated to all affected parties.
Specify the risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures to provide evidence for achievement of the associated (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.).
Note 1: Risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures typically use cybersecurity-relevant methods to detect unidentified vulnerabilities (e.g., penetration (Testing = Activity in which an item (system, hardware, or software) is executed under specific conditions; and the results are recorded, summarized and communicated.)).
Note 2: Methods of deriving test cases may include generation and analysis of equivalence classes, boundary values analysis, negative tests and/or (Error = The difference between a computed, observed, or measured value or condition and the true, specified, or theoretically correct value or condition.) guessing based on knowledge or experience.
BP2
Select validation measures. (
O2 )
Document the selection of (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures according to defined criteria including criteria for regression (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.). The documented selection of (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures shall have sufficient coverage of the (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.).
Validate the integrated (System = A collection of interacting items organized to accomplish a specific function or set of functions within a specific environment.) using the selected risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures. Record the (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results and corresponding (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure data.
Note 3: See SUP.9 for handling (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results that deviate from expected results.
Linked Knowledge Nuggets: arrow_forward "Archiving test results"
personAuthor: Process Fellows
Don’t lose your evidence. With perspective to testing, SUP.8.BP1 in combination with SUP.8.BP8 expects structured storage of test logs, verdicts, anomalies, and configuration info. This is not only a formality: It enables you to later on reproduce details about a certain system version.
BP4
Ensure consistency and establish bidirectional traceability. (
O4 )
Ensure (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.) and establish bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures and (Cybersecurity goal = Concept-level cybersecurity requirement associated with one or more threat scenarios.). Establish bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results and (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures.
Note 4: Bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) supports (Consistency = Consistency addresses content and semantics and ensures that work products are not in contradiction to each other. Consistency is supported by bidirectional traceability.), facilitates impact analysis, and supports demonstration of (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) coverage. (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) alone, e.g., the existence of links, does not necessarily mean that the information is consistent.
Linked Knowledge Nuggets: arrow_forward "Consistency vs. Traceability – What’s the Difference?"
personAuthor: Process Fellows
Consistency ensures that related content doesn’t contradict itself – e.g., requirements align with architecture and test. Traceability, in contrast, is about links: can you follow a requirement through to implementation and verification? Both are needed – consistency builds trust, traceability enables control. Typically, traceability strongly supports consistency review.
arrow_forward "The role of traceability in risk control"
personAuthor: Process Fellows
Traceability isn’t just about completeness — it’s about managing impact. When a requirement changes, trace links tell you what’s affected. That’s your early-warning system.
arrow_forward "The true benefit of traceability
"
personAuthor: Process Fellows
Sometimes the creation of traceability is seen as an additional expense, the benefits are not recognized.
Traceability should be set up at the same time as the derived elements are created. Both work products are open in front of us and the creation of the trace often only takes a few moments.
In the aftermath, the effort increases noticeably and the risk of gaps is high.
If the traceability is complete and consistent, the discovery of dependencies is unbeatably fast and reliable compared to searching for dependencies at a later stage, when there may also be time pressure.
It also enables proof of complete coverage of the derived elements and allows the complete consistency check.
BP5
Summarize and communicate results. (
O5 )
Summarize the risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results and communicate them to all affected parties.
Note 5: This may include information from the risk treatment (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) activities and important findings concerning additional vulnerabilities to enable other parties to judge the consequences.
# OUTPUT INFORMATION ITEMS
13-52
Communication Evidence (
O5 )
All forms of interpersonal communication such as:
e-mails, also automatically generated ones
tool-supported workflows
meeting, verbally or via meeting minutes (e.g. daily standups)
podcast
blog
videos
forum
live chat
wikis
photo protocol
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
SEC.2 Cybersecurity Implementation
SEC.3 Risk Treatment Verification
SEC.4 Risk Treatment Validation
Used by these process attributes:
PA2.1 Performance Management
13-51
Consistency Evidence (
O4 )
Demonstrates bidirectional (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) between artifacts or information in artifacts, throughout all phases of the life cycle, by e.g.:
tool links
hyperlinks
editorial references
naming conventions
Evidence that the content of the referenced or mapped information coheres semantically along the (Traceability = The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another.) chain, e.g., by
performing pair working or group work
reviewing by peers, e.g., spot checks
maintaining revision history in documents
providing change commenting (via e.g., meta-information) of database or repository entries
Note: This evidence can be accompanied by e.g., Definition of Done (DoD) approaches.
Used by these processes:
SEC.1 Cybersecurity Requirements Elicitation
SEC.2 Cybersecurity Implementation
SEC.3 Risk Treatment Verification
SEC.4 Risk Treatment Validation
08-59
Validation Measure (
O1 )
A (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure can be a test case, a measurement, a simulation, an emulation, or an end user survey
The specification of a (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure includes:
pass/fail criteria for (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures (completion and end criteria)
a definition of entry and exit criteria for the (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures, and abort and re-start criteria
Techniques
Necessary (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) environment & infrastructure
Necessary sequence or ordering
Used by these processes:
SEC.4 Risk Treatment Validation
03-55
Validation Measure Data (
O3 )
(Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure data are data recorded during the execution of a (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure, e.g.:
logs
traces
raw data
crash dumps
review protocols
Used by these processes:
SEC.4 Risk Treatment Validation
08-57
Validation Measure Selection Set (
O2 )
Include criteria for re- (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) in the case of changes (regression)
Identification of (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measures, also for regression
Used by these processes:
SEC.4 Risk Treatment Validation
13-24
Validation Results (
O3 )
(Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) data, logs, feedback, or documentation
(Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure passed
(Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure not passed
(Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) measure not executed, and a rationale
Information about the (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) execution (date, participants etc.)
Abstraction or summary of (Validation = Validation demonstrates that the work item can be used by the users for their specific tasks.) results