Heavy Duty Vehicle Cybersecurity Requirements (HD VCR)
NMFTA Telematics (Vehicle Connection Component) Security Requirements
  • AC-010

    Vendor devices will implement least privilege for the memory spaces of processes handling protected data. i.e. data in-use, of the categories of sensitive protected data above, or shall be segmented from software components which do not handle such data. Acceptable segmentations include Mandatory Filesystem Access Controls and Mandatory Volatile Memory Access Controls.

VEH-AC-010

This Vehicle Connection component must satisfy requirement AC-010

  • AC-020

    All actions taken by the vendor's telematics system that are capable of supporting access controls shall be configured such that each user account or process/service account are assigned only the minimal privileges required to perform the specific, intended, actions of the user or process/service account.

VEH-AC-020

This Vehicle Connection component must satisfy requirement AC-020

  • AC-030

    The vendor's system shall employ cryptographic authentication to prevent unauthorized access to telematics systems and data.

VEH-AC-030

This Vehicle Connection component must satisfy requirement AC-030

  • AC-040

    The vendor shall identify all instances where the telematics system includes actions that cannot support access authentication and/or execute with elevated privileges

VEH-AC-040

This Vehicle Connection component must satisfy requirement AC-040

  • AC-041

    Identifying information about the connected devices will not be made available without authentication first.

VEH-AC-041

This Vehicle Connection component must satisfy requirement AC-041

  • AC-050

    All remote access methods and possible remote actions to/on telematics system shall be documented.

VEH-AC-050

This Vehicle Connection component must satisfy requirement AC-050

  • AC-060

    For all components of the system, the vendor shall provide a listing of all wireless communication interfaces to the system and specify how the interfaces can be configured and/or disabled.

VEH-AC-060

This Vehicle Connection component must satisfy requirement AC-060

  • AC-061

    The vendor shall not use any deprecated encryption+authentication on any Wi-Fi interface of the device. At the time of drafting this includes WEP, WPS or open/none.

VEH-AC-061

This Vehicle Connection component must satisfy requirement AC-061

  • AC-062

    The vendor shall implement, for all Bluetooth interfaces, pairing that must be specifically allowed by physical controls on the device and be time-limited. Furthermore, pairing will not use legacy pairing or passkey entry.

VEH-AC-062

This Vehicle Connection component must satisfy requirement AC-062

  • AC-063

    Any and all software or firmware implementing wireless interface encrytion+authentication (those satisfying AC-061 and AC-062 above) will be prepared for future deprecation of methods. i.e. That software/firmware is upgradable.

VEH-AC-063

This Vehicle Connection component must satisfy requirement AC-063

  • AC-080

    All authentication offered on device-local interfaces shall expect credentials which are unique to each device instance and uncorrelated to any and all public information about the device.

VEH-AC-080

This Vehicle Connection component must satisfy requirement AC-080

  • CM-010

    All components of the vendor's system shall be configured to utilize the principle of least functionality and use only the services necessary for secure operations of the system. Additionally, customers should have the option of disabling any features they do not want or do not need by having unnecessary services’ executables removed or at least disabled such that their execution (by even superuser) is not possible in deployed systems.

VEH-CM-010

This Vehicle Connection component must satisfy requirement CM-010

  • CM-020

    The vendor’s devices shall have all services used for troubleshooting disabled or properly protected from unauthorized access and use.

VEH-CM-020

This Vehicle Connection component must satisfy requirement CM-020

  • CM-030

    Vendor ensures that any and all interfaces used for testing or debug are unavailable in production builds of the devices

VEH-CM-030

This Vehicle Connection component must satisfy requirement CM-030

  • CM-040

    The vendors’ devices shall have a default system configuration that ensures security ‘out of the box’. In other words, the default configuration should be the most-secure and any additional features should be disabled by default and have their security implications communicated in documentation.

VEH-CM-040

This Vehicle Connection component must satisfy requirement CM-040

  • IA-010

    All remote hosts of the vendor's system shall be configured to uniquely identify and authenticate all other remote hosts of the system and/or any other interfacing systems.

VEH-IA-010

This Vehicle Connection component must satisfy requirement IA-010

  • IA-020

    Any authenticators (unique identification) for devices used in vendor’s systems shall be uncorrelated to any and all public information about the device, e.g. lot number, product number, serial number MAC address are all unacceptable inputs to device identifiers.

    Where public information is any information that is visible (externally or internally) on the device or discoverable by searches based on that visible information.

VEH-IA-020

This Vehicle Connection component must satisfy requirement IA-020

  • IA-030

    Cryptographic modules used in the vendors system shall be compliant with Federal Information Processing Standards (FIPS) 140-2: Level 1.

VEH-IA-030

This Vehicle Connection component must satisfy requirement IA-030

  • IR-010

    The vendor shall have a documented incident response plan (IRP) in place which provides the carriers with a point of contact for components used within their telematics system

VEH-IR-010

This Vehicle Connection component must satisfy requirement IR-010

  • M-010

    The vendor shall have procedures in place to ensure that components outside of the carrier’s direct control are not updated or modified without prior coordination and approval by an organization-defined individual or role

VEH-M-010

This Vehicle Connection component must satisfy requirement M-010

  • M-040

    Vendors must provide manual backup/override capabilities to their safety related services to ensure that any failure of the device does not result in a safety issue.

VEH-M-040

This Vehicle Connection component must satisfy requirement M-040

  • PS-010

    The vendor shall have personnel security policies & procedures, position risk categorization, personnel screening, personnel termination, personnel transfer, access agreements and third-party personnel security.

VEH-PS-010

This Vehicle Connection component must satisfy requirement PS-010

  • RA-010

    Vendor shall have risk assessments conducted at an industry accepted rate. Resulting risk assessment documentation should include all components and the overall system that is within the vendor's control. The rate suggested is twice per product release; both at product design and at integration phases

VEH-RA-010

This Vehicle Connection component must satisfy requirement RA-010

  • RA-020

    The vendor shall use the results of risk assessments to influence systems development and processes.

VEH-RA-020

This Vehicle Connection component must satisfy requirement RA-020

  • SAA-010

    The vendor shall have an Information Security Management Plan (ISMP).

VEH-SAA-010

This Vehicle Connection component must satisfy requirement SAA-010

  • SAA-020

    The vendor shall have penetration testing performed, to an industry accepted best practice, at an industry accepted pace.

    Penetration testing can be performed by teams internal to the TSP; industry best practice is to have external pentesting performed periodically also.

VEH-SAA-020

This Vehicle Connection component must satisfy requirement SAA-020

  • SAA-030

    Vendor shall have Security Testing and Evaluation (ST&E) of the system and/or components that includes all results of the security testing and evaluation, including discovered vulnerabilities and a plan/process to mitigate discovered vulnerabilities or weaknesses in the system.

VEH-SAA-030

This Vehicle Connection component must satisfy requirement SAA-030

  • SAA-040

    The vendor shall perform due diligence to ensure its suppliers also meet the vendor's security requirements

VEH-SAA-040

This Vehicle Connection component must satisfy requirement SAA-040

  • SAA-050

    Cryptographic keys used in the vendors’ systems must be generated, stored and managed according to industry best practice.

VEH-SAA-050

This Vehicle Connection component must satisfy requirement SAA-050

  • SCP-010

    Communication paths that traverse outside controlled boundaries must protect confidentiality and integrity of data

VEH-SCP-010

This Vehicle Connection component must satisfy requirement SCP-010

  • SCP-011

    Communication path cryptographic protections must not use identities, keys or shared secrets which are common across multiple deployed devices

VEH-SCP-011

This Vehicle Connection component must satisfy requirement SCP-011

  • SCP-020

    Measures will be taken by vendors to protect the confidentiality of any information at rest on the devices that could be interpreted as Sensitive and/or Personally Identifiable Information. This sensitive information is defined in SCP-030 where ‘at rest’ is understood to mean any state where the data is in a non-volatile storage medium, e.g. eMMC not RAM.

VEH-SCP-020

This Vehicle Connection component must satisfy requirement SCP-020

  • SCP-030

    Vendors will supply documentation detailing what data is and is not protected at rest by cryptography.

    Vendors are encouraged to expand the list of categories of data which will be protected on-device.

VEH-SCP-030

This Vehicle Connection component must satisfy requirement SCP-030

  • SCP-040

    Data of the categories above will be protected using cryptographic keys which are not correlated to any public information about the devices.

    Public information is any information that is visible (externally or internally) on the device or discoverable by searches based on that visible information.

VEH-SCP-040

This Vehicle Connection component must satisfy requirement SCP-040

  • SCP-060

    The vendor shall enforce controls integrated into the telematics device to limit the possible commands and data transmitted to the vehicle network.

VEH-SCP-060

This Vehicle Connection component must satisfy requirement SCP-060

  • SCP-100

    The vendor's system shall separate execution domains and/or processes (i.e. process isolation within both the telematics device and back-end system and between the serial communications in the telematics device and the interface to the vehicle network)

VEH-SCP-100

This Vehicle Connection component must satisfy requirement SCP-100

  • SCP-140

    Vendors must ensure that their authentication mechanism is protected against brute force attacks. This includes ensuring that any password storage functions provide sufficient security through the use of industry best practice hashing mechanisms (such as BCrypt), as well as providing limits on access to sensitive services.

VEH-SCP-140

This Vehicle Connection component must satisfy requirement SCP-140

  • SII-010

    The vendor shall have a process for remediating flaws in deployed telematics devices and backend systems.

    In the case of telematics devices, firmware update capabilities are important to be able to remediate all flaws that could be located in the device.

VEH-SII-010

This Vehicle Connection component must satisfy requirement SII-010

  • SII-011

    The vendor shall implement/deploy secure over the air update systems including assurances of integrity&authenticity. Also rollback protections and a means of denying the use of old potentially compromised signing keys.

VEH-SII-011

This Vehicle Connection component must satisfy requirement SII-011

  • SII-020

    The vendor shall have a capability to mitigate vulnerabilities across all of the telematics devices, backend applications, and systems. Identified vulnerabilities are remediated or mitigated using suitable compensating controls on a timeline predicated by the severity of the vulnerability identified.

VEH-SII-020

This Vehicle Connection component must satisfy requirement SII-020

  • SII-021

    Identified vulnerabilities are remediated or mitigated using suitable compensating controls on a timeline predicated by the severity of the vulnerability identified. Taking no longer than the following elapsed times: high in 30d, moderate in 90d and low in 180d.

    Vendors shall provide a document that defines vulnerabilities severities (e.g. CVSS). Negotiation of mutually aggregable exceptions to the remediation timelines is acceptable to compensate for cases where the complexity of remediation or mitigations of the vulnerability is prohibitively expensive to execute in the prescribed timeline. In general, the timelines of remediation can be agreed -to in a SLA.

VEH-SII-021

This Vehicle Connection component must satisfy requirement SII-021

  • SII-030

    The vendor shall use digitally signed software on telematics devices and prohibit execution of unsigned or invalidly signed software.

VEH-SII-030

This Vehicle Connection component must satisfy requirement SII-030

  • SII-040

    The vendor shall utilize a boot verification process built with (asymmetric) cryptographic digital signatures and implemented such that the public key used for verification or the hash of the public key used for verification is protected from being tampered on the device.

VEH-SII-040

This Vehicle Connection component must satisfy requirement SII-040

  • SII-041

    Vendors shall implement a hardware based root of trust for boot authentication of the device.

VEH-SII-041

This Vehicle Connection component must satisfy requirement SII-041

  • SII-060

    The vendor shall provide a means (and document the process) for customers to verify the firmware in their devices.

VEH-SII-060

This Vehicle Connection component must satisfy requirement SII-060

  • SII-070

    The vendor shall utilize an array of code safety features across the entire collection of executables in its devices: ASLR, DEP, CFI, Stack Guards, Fortification, and RELRO. Unless that code safety feature is not applicable on the system architecture, in which case it should be noted.

VEH-SII-070

This Vehicle Connection component must satisfy requirement SII-070

  • SII-071

    The vendor shall use the techniques of sanitizing/filtering inputs, segmenting memory spaces of input parsers from other execution and/or using provably correct or memory safe languages for input processing.

VEH-SII-071

This Vehicle Connection component must satisfy requirement SII-071

  • SII-080

    The vendor shall design security components that fail-secure to protect integrity of systems and data.

VEH-SII-080

This Vehicle Connection component must satisfy requirement SII-080

  • SII-081

    The vendor shall utilize protective mechanisms to protect components from unauthorized runtime/volatile modification of code.

VEH-SII-081

This Vehicle Connection component must satisfy requirement SII-081

  • SII-090

    The vendor shall maintain a responsible disclosure program that allows for vulnerabilities discovered in the system (device, mobile app or backend) by researchers, and other external entities to be reported, tracked and mitigated.

    Vulnerability programs should include sufficient legal provisions to provide for a “Legal Safe Harbor” for researchers.

VEH-SII-090

This Vehicle Connection component must satisfy requirement SII-090

  • SII-120

    The vendor shall have a vulnerability management process that includes steps to triage any found vulnerabilities and plan remediation.

VEH-SII-120

This Vehicle Connection component must satisfy requirement SII-120

  • SII-130

    The vendor shall verify code and best practice standards prior to deployment including:

    Static Code Analysis / Static Application Security Testing (SCA/SAST)

    Dependency Scanning for known vulnerabilities in third party components

VEH-SII-130

This Vehicle Connection component must satisfy requirement SII-130

  • SII-140

    The vendor shall implement ongoing monitoring and protection against malicious code in production using a well governed process that addresses all entry and exit points in the system.

VEH-SII-140

This Vehicle Connection component must satisfy requirement SII-140

  • SII-150

    The vendor shall verify code according to best-practice coding standards

VEH-SII-150

This Vehicle Connection component must satisfy requirement SII-150

  • SII-170

    The vendor shall actively monitor resources such as NIST Common Vulnerabilities and Exposures (CVE), Bugtraq, for security alerts and advisories related to the telematics system’s components

VEH-SII-170

This Vehicle Connection component must satisfy requirement SII-170

  • SII-171

    The vendor shall notify their customers of any vulnerabilities discovered in the telematics systems components via monitoring or vulnerability disclosure programs. The notification to customers will happen in a timely manner.

VEH-SII-171

This Vehicle Connection component must satisfy requirement SII-171

  • SII-180

    Remediation SLA or objectives are defined and are adhered to by the security and development teams. Identified vulnerabilities are remediated or mitigated using suitable compensating controls

VEH-SII-180

This Vehicle Connection component must satisfy requirement SII-180

  • SII-200

    The vendor shall participate in a cybersecurity information sharing and analysis group in the heavy vehicle industry

VEH-SII-200

This Vehicle Connection component must satisfy requirement SII-200