CAP1753 - The Cyber Security Oversight Process For Aviation
CAP1753 - The Cyber Security Oversight Process For Aviation
CAP1753 - The Cyber Security Oversight Process For Aviation
CAP 1753
Published by the Civil Aviation Authority, 2020
You can copy and use this text but please ensure you always use the most up to date version and use it in
context so as not to be misleading and credit the CAA.
Enquiries regarding the content of this publication should be addressed to: [email protected]
The latest version of this document is available in electronic format at: www.caa.co.uk/CAP1753
CAP 1753 Contents
Contents
Contents 3
1. Introduction 4
2. Background 5
3. Purpose 6
4. Roles and Responsibility 7
Department for Transport 7
Civil Aviation Authority 7
National Cyber Security Centre 7
Accountable Manager 8
Cyber Security Responsible Manager 8
ASSURE Cyber Suppliers 8
ASSURE Cyber Professionals 8
5. Applicable Regulation 9
6. CAP1753 – Cyber Security Oversight Process for Aviation 10
Step 1 - Engagement 11
Step 2 - Critical System Scoping 11
Step 3 - Cyber Self-Assessment 12
Step 4 - ASSURE Cyber Audit 12
Step 5 - Provisional Statement of Assurance 14
Step 6 - Final Statement of Assurance and Certificate of Compliance 15
7. Frequency 16
8. Notification of Cyber Security Change 17
8.1. Notification of Change of Cyber Security Responsible Manager 17
Annex A: Information Handling 18
Annex B: The CAA’s Regulatory Enforcement Approach (non-NIS) 19
Annex C: NIS Regulation 20
Annex D: DfT’s Stepped Enforcement Approach for NIS 21
Annex E: Good Practice 22
1. Introduction
Cyber security risk profiles are dynamic, meaning attackers are always looking to exploit
vulnerabilities and can quickly develop new ways of breaching cyber security. The aviation
industry’s progressively interconnected systems require the industry to maintain an up to
date awareness of both direct and indirect cyber security threats. The changing threat
landscape therefore, encourages a proactive approach to cyber security and in response
means aviation organisations need dynamic protection.
Cyber security can be defined as:
“Cyber security refers to the protection of information systems (hardware, software and
associated infrastructure), the data on them, and the services they provide, from
unauthorised access, harm or misuse. This includes harm caused intentionally by the
operator of the system, or accidentally, as a result of failing to follow security procedures.”
UK National Cyber Security Strategy1 - The Cyber Security Body of Knowledge (CyBOK)2
The Civil Aviation Authority’s (CAA) cyber security oversight strategy must be reviewed
regularly in order to keep pace with these ever-changing cyber security trends.
“To have a proportionate and effective approach to cyber security oversight that enables
aviation to manage their cyber security risks without compromising aviation safety, security
or resilience.
To stay up-to-date and positively influence cyber security within aviation to support the
UK’s National Cyber Security Strategy.”
1
https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021
2
https://www.cybok.org/knowledgebase/
2. Background
The CAA’s approach to cyber security oversight has been harmonised and consolidated to
align with Better Regulation principles, this provides;
▪ improved transparency.
The CAA commit to, broad and collaborative engagement with industry and key
stakeholders to continuously improve our cyber security oversight model.
Working closely with Department for Transport (DfT) and National Cyber Security Centre
(NCSC) the CAA has developed the Cyber Assessment Framework (CAF) for Aviation3. Like
the core CAF, the CAF for Aviation has been designed with scalability and consistency in
mind. This allows it to be applied to aviation organisations of varying size and complexity
whilst maintaining a consistent approach across different scopes including; safety, security,
and resilience.
The CAA and the Council for Registered Ethical Security Testers (CREST)4, a not-for-profit
accreditation and certification body, partnered to create an accreditation scheme
(ASSURE). This service enables aviation organisations to procure accredited cyber security
audit5 capabilities to audit their completed CAF for Aviation self-assessments6, where
applicable.
3
The CAF for Aviation is an aviation specific adaptation of the core CAF v3 produced by NCSC
4
https://crest-approved.org/index.html
5
Step 4 – ASSURE Cyber Audit
6
Step 3 – Cyber Self-Assessment for Aviation
3. Purpose
CAP1753 outlines the CAA’s approach to cyber security oversight, which includes:
The Cyber Security Oversight Process for Aviation involves six key steps:
Step 1:
Engagement
Step 6:
Step 2:
Final Statement of Assurance
Critical Systems Scoping
and Certificate of Compliance
Step 5:
Step 3:
Provisional Statement of
Cyber Self Assessment
Assurance
Step 4:
ASSURE Cyber Audit
The CAA Cyber Security Oversight Team is responsible for all cyber security regulatory
activity within any of the CAA regulatory domains (for example Continuing Airworthiness,
Flight Operations, Aerodromes, Airspace, Air Traffic Management, and Aviation Security).
The team is also the first point of contact at the CAA for all questions and issues relating to
the cyber security oversight process for aviation and can be contacted at
[email protected].
7
http://www.legislation.gov.uk/uksi/2018/506/made
Accountable Manager
The Accountable Manager(s) is an individual or individuals designated by their aviation
organisation as the person(s) responsible to the CAA in respect of the functions which are
subject to regulation. It is expected that the role of Accountable Manager is held by an
individual who has corporate authority for ensuring that all operational activities can be
financed and carried out to the standard required by the CAA.
ASSURE Cyber Professionals are accredited in one or more of the following three
specialisms (all specialisms must be present for an ASSURE Cyber Audit):
8
Detail of the competency and vetting requirements can be found in the Cyber Security Responsible
Manager Nomination Form.
5. Applicable Regulation
All aviation organisations that have regulatory cyber security obligations to comply with
existing safety, security, and resilience requirements are deemed to be in scope of
CAP1753. Following initial engagement9, each aviation organisation may be required to
complete all or part of the of the steps detailed herein.
Existing regulations applicable to aviation organisations under CAP1753 include but are
not limited to:
Note: This is an evolving area of regulation and the aviation organisation is responsible for
staying abreast of regulatory requirements which may change from time to time.
The CAA recommend that regardless of the level of our regulatory involvement, aviation
organisations should proactively apply appropriate and proportionate cyber security good
practice10 into their operations.
9
Step 1 – Engagement
10
Annex E - Good Practice
Step 1:
Engagement
Step 6:
Final Statement of Step 2:
Assurance and Certificate Critical Systems Scoping
of Compliance
Step 5:
Step 3:
Provisional Statement of
Cyber Self Assessment
Assurance
Step 4:
ASSURE Cyber Audit
Step 1 - Engagement
The CAA will notify an aviation organisation’s Accountable Manager that under applicable
regulatory obligations their organisation is now deemed in scope of CAP1753 and will
issue an engagement pack containing:
▪ CAP1753;
▪ Cyber Security Responsible Manager Nomination Form*;
▪ Critical System Scoping Template and guidance (CAP1849);
▪ Cyber Assessment Framework (CAF) for Aviation, guidance (CAP1850) and
applicable profile (see Step 3); and
▪ Statement of Assurance.
*The aviation organisation’s Accountable Manager will be required to nominate a Cyber
Security Responsible Manager and provide their contact information to the CAA.
When considering the scope of critical systems, the CAA expect an aviation organisation
to make an informed and competent consideration of reasonable and expected impacts.
The CAA does not expect an aviation organisation to consider implausible scenarios or
highly complex chains of events or failures, a reasonable worst-case scenario should be
used.
An aviation organisation is ultimately responsible for their own risks and the identification
and validation of their critical system scope. To ensure that the scope is accurate and
includes critical systems that would reasonably be considered in scope, an aviation
organisation must be able to demonstrate that a logical method was followed and included
all stakeholders deemed relevant by the organisation (e.g. workshops with supporting
documentation, board level discussions and decisions, business impact assessments,
etc). The CAA will arrange individual calls with aviation organisations to validate the
method used, dates for these calls will be set out in the initial engagement pack.
11
https://www.caa.co.uk/Commercial-industry/Cyber-security-oversight/Cyber-security-compliance/
The CAF for Aviation has also been designed with scalability and consistency in mind.
This allows it to be applied to aviation organisations of varying size and complexity, whilst
maintaining a consistent approach.
Each aviation organisation will have an expected benchmark which will be pre-determined
by profiles developed by the CAA in conjunction with NCSC. These profiles will be
informed by sector and national assessments of risk, minimum regulatory requirements
and the capabilities demonstrated by threat actors likely to target aviation organisations. .
To ensure proportionate cyber security oversight the CAA will inform an aviation
organisation of the expected profile during Step 1 (i.e. the expected balance of outcomes
that need to be ‘achieved’, ‘partially achieved’ or in some cases ‘not achieved’).
Each aviation organisation may be required to produce, as an output of the Cyber Self-
Assessment step:
Please refer to the CAP1850 “CAF for Aviation Guidance” for more detail14.
12
https://www.caa.co.uk/CAP1849
13
https://www.caa.co.uk/Commercial-industry/Cyber-security-oversight/Cyber-security-compliance/
14
https://www.caa.co.uk/CAP1850
regulations. Each ASSURE Cyber Supplier must nominate ASSURE Cyber Professionals
who are then accredited to conduct an ASSURE Cyber Audit on behalf of the CAA.
The ASSURE Scheme provides a mechanism for the CAA (in partnership with associated
accreditation bodies) to ensure that ASSURE Cyber Suppliers and ASSURE Cyber
Professionals are accredited to a high standard, are qualified and competent to conduct
ASSURE Cyber Audits in a consistent professional manner in accordance with CAP 1753
and the CAA’s requirements. These requirements are signed up to in an ASSURE Code of
Conduct and are further detailed in the ASSURE section on the CAA website.15
Each aviation organisation, when required to by the CAA, must procure cyber audit
services from an accredited ASSURE Cyber Supplier via the ASSURE Scheme. To
prevent a conflict of interest this must not be an ASSURE Cyber Supplier that has;
interests in products or services within scope of the audit, implemented or consulted on the
cyber elements covered in the scope of the audit or has personal relationships between
members of staff responsible for the management of or undertaking of ASSURE Cyber
Audits and staff within the aviation organisation. If you are unsure if there is a conflict of
interest, please contact us at [email protected] for further clarification.
An aviation organisation will be required to make the following available to the ASSURE
Cyber Professional(s) during the audit:
▪ Completed list of critical systems and diagrams from the Critical Systems Scoping
Template;
▪ completed CAF for Aviation for all in-scope systems; and
▪ all necessary supporting evidence.
During the ASSURE Cyber Audit the ASSURE Cyber Professional(s) will complete the
relevant ASSURE sections in the CAF for Aviation and issue an ASSURE Cyber Audit
Report to the aviation organisation detailing:
Once the final ASSURE Cyber Audit Report has been submitted to the aviation
organisation, the ASSURE Cyber Professional(s) are required to have a “wash-up” call
15
https://www.caa.co.uk/Commercial-industry/Cyber-security-oversight/Cyber-security-compliance/
with the CAA to discuss the ASSURE Cyber Audit. Please refer to the ASSURE section
of our website for more detail in the associated ASSURE Implementation Guide.
Step 5 - Provisional Statement of Assurance
The provisional Statement of Assurance constitutes a commitment from an aviation
organisation that it is complying with the Cyber Security Oversight Process and that it is
providing an accurate representation of their cyber risk posture. For guidance on completing
a Statement of Assurance please see CAP1850.
An aviation organisation is required to send, following the information handling instructions,
a provisional Statement of Assurance to the CAA by the agreed deadline, which must
include the following:
The CAA’s Cyber Security Oversight Team will conduct an analysis of the information
provided and request additional supplementary information if clarification is required.
As part of ongoing cyber security oversight, the CAA’s Cyber Security Oversight Team will
engage with CAA Performance Based Oversight16 (PBO) providing a view of the aviation
organisation’s ability to;
Ultimately determining an effective and appropriate oversight regime for that organisation.
Engagement with PBO will include briefing the relevant CAA Capability Teams and
working with the Oversight Managers to agree if there is a safety, security, or resilience
impact that needs to be addressed.
The CAA will engage in discussions with an aviation organisation to review the provisional
Statement of Assurance including any amendments to corrective action plans. Following
engagement, an aviation organisation will be required to finalise their Statement of
Assurance ensuring it is signed by the Accountable Manager and returned to the CAA.
16
https://www.caa.co.uk/Safety-initiatives-and-resources/How-we-regulate/Safety-Plan/Enhancing-CAA-
oversight/Performance-based-oversight/
To achieve compliance with CAP1753 an aviation organisation must meet the following
requirements, where deemed applicable by the CAA:
7. Frequency
The continued frequency by which an aviation organisation is required to comply with the
steps of the cyber security oversight process varies and is decided by the CAA in
conjunction with existing Performance Based Oversight (PBO) processes. The factors
used to determine frequency of audits include:
▪ cyber security controls which would change the aviation organisation’s CAF for
Aviation response;
▪ corrective action plan, including any changes to the corrective actions themselves,
or the implementation timeframes.
A Notification of Cyber Security Change must not include any sensitive information or
attachments (i.e. network diagrams). The CAA accept no liability for sensitive information
which is shared by an aviation organisation non-securely or without prior agreement.
The notification email should include a high-level description of the nature of the change
(i.e. change to critical suppliers, scope change, change in controls effecting the CAF
response) and the date the change was effective from. The CAA will then contact the
Cyber Security Responsible Manager to discuss the change further and make appropriate
arrangements for secure information sharing if required.
Note: This is in addition to any change notification required under existing safety or
security regulations.
The notification of a new Cyber Security Responsible Manager must include a completed
Cyber Security Responsible Manager Nomination form which can be requested from and
submitted to [email protected].
The CAA intends to share relevant information with DfT and NCSC in line with Section 23
of the Civil Aviation Act 198217 and Part 2 of the Network and Information Systems
Regulation 201818 to:
▪ Support the assessment of national level and transport sector cyber security risk;
Where the sharing of identifiable information beyond the above scope is considered
necessary, the CAA will request written consent from the aviation organisation and provide
a clear statement setting out the;
▪ Information to be shared;
Further information on our data publication principles can be found on the CAA website19.
Any cyber security related questions can be sent to the CAA Cyber Security Oversight Team
at [email protected].
17
http://www.legislation.gov.uk/ukpga/1982/16/contents
18
http://www.legislation.gov.uk/uksi/2018/506/made
13
https://www.caa.co.uk/Data-and-analysis/
The CAA may take enforcement action in cases where an aviation organisation is found to
be in breach of any of the applicable regulatory requirements. More information can be
found online in the CAA’s Regulatory Enforcement Policy20.
5 6
4 Prosecutions
2 3 Directions /
Enforcement
1
Formal Notice
Review
Deficiency
Notice
Persuade
Advise
20
https://www.caa.co.uk/Our-work/About-us/Enforcement-and-prosecutions/
21
https://www.gov.uk/government/publications/implementing-the-network-and-information-systems-directive-
in-the-transport-sector
Risk management: ISO/IEC 27005:2018 The organisation takes appropriate steps to identify,
Risk
ISO/IEC 27001:2017 assess and understand security risks to the critical
The organisation takes Management
systems. This includes an overall organisational
appropriate steps to identify, ISO/IEC 3100:2018 Process
approach to risk management.
22
https://www.ncsc.gov.uk/collection/caf/table-view-principles-and-related-guidance
assess and understand ISA/IEC 62443 1-1 You have gained confidence in the effectiveness of
security risks to the critical ISA/IEC 62443 2-1 the security of your technology, people, and
systems supporting the processes relevant to critical systems.
NIST SP800-30
operation of essential
functions. This includes an NIST SP800-37
overall organisational NIST SP800-39 Assurance
approach to risk management.
NIST SP800-82
Eurocae ED202A, ED203A,
ED204 & ED205
CyBOK Risk Management &
Governance Knowledge Area
Asset management: ISO/IEC 55001:2019 Principle applies.
Everything required to deliver, ISO/IEC27002: 2013
maintain or support critical ISA 62443-1-1
systems is determined and Asset
NIST SP800-82
understood. This includes Management
data, people and systems, as NIST SP800-53
well as any supporting
infrastructure (such as power
or cooling).
Supply chain: Principle applies.
ISO/IEC 27002:2013
The organisation understands ISO/IEC 27036-2
and manages security risks to
critical systems supporting the ISO/IEC 27036-3
operation of essential functions ISA/IEC 62443-2-1
that arise as a result of Supply Chain
NIST SP800-53
dependencies on external
suppliers. This includes NIST SP800-37
ensuring that appropriate Eurocae ED201
measures are employed where
third party services are used.
Function protection policies ISO/IEC 27001:2017 You have developed and continue to improve a set
Policy and
and ISO/IEC 27002:2013 of cyber security and resilience policies and
Process
processes: processes that manage and mitigate the risk of
ISO/IEC 22301:2019 Development
adverse impact on the critical system.
The organisation defines,
ISA/IEC 62443-1-1
implements, communicates You have successfully implemented your security
and enforces appropriate NIST SP800-53 Policy and policies and processes and can demonstrate the
policies and processes that Process security benefits achieved.
NIST SP800-82
direct its overall approach to Implementatio
securing critical systems and n
data that support operation of
essential functions.
Identity and access control: ISO/IEC 27001:2019 Identity You robustly verify, authenticate and authorise
Protecting ISO/IEC 27002:2013 verification, access to the critical systems.
The organisation understands,
against authentication
documents and manages NIST SP800-53
cyber- and
access to critical systems
attack NIST SP800-82 authorisation
supporting the operation of
essential functions. Users (or Eurocae ED204 Device You fully know and have trust in the devices that are
automated functions) that can CyBOK Authentication, Management used to access your critical systems and data.
access critical data or critical Authorisation and Accountability
systems are appropriately Knowledge Base Privileged You closely manage privileged user access to critical
verified, authenticated and User systems supporting the essential functions.
authorised. Management
access, modification, or ISA/IEC 62443-3-3 parties storing or accessing data important to the
deletion that may cause an NIST SP800-53 operation of critical systems.
adverse impact on critical
NIST SP800-82 You have protected the transit of data important to
systems. Such protection
Data in Transit the operation of the critical systems. This includes
extends to the means by which Eurocae ED204 & ED205
the transfer of data to third parties.
authorised users, devices and
systems access critical data You have protected stored data important to the
Stored Data
necessary for the operation of operation of the critical system.
critical systems. It also covers
You have protected data important to the operation
information that would assist Mobile Data
of the critical system on mobile devices.
an attacker, such as design
details of critical systems. Media / You appropriately sanitise media and equipment
Equipment holding data critical to the operation of the critical
Sanitisation systems.
System security: ISO/IEC 27002:2013 You design security into the critical systems. You
ISA/IEC 62443-1-1 minimise their attack surface and ensure that the
Critical systems and
Secure by operation of the critical system should not be
technology critical for the ISA/IEC 62443-2-1
Design impacted by the exploitation of any single
operation of essential functions
ISA/IEC 62443-3-3 vulnerability.
are protected from cyber
attack. An organisational NIST SP800-53
understanding of risk to the NIST SP800-82 Secure You securely configure critical systems.
critical system informs the use
Eurocae ED202A, ED203A, Configuration
of robust and reliable
ED204 & ED205
protective security measures You manage your organisation's critical systems to
to effectively limit opportunities Secure enable and maintain security.
for attackers to compromise Management
networks and systems.
You manage known vulnerabilities in your critical
Vulnerability systems to prevent adverse.
Management
Resilient Networks and ISO/IEC 27002:2013 Resilience You are prepared to restore the operation of your
Systems: ISO/IEC 27035-3 Preparation critical system following adverse impact.
The organisation builds ISA/IEC 62443-1-1 You design critical systems to be resilient to cyber
resilience against cyber-attack Design for
NIST SP800-53 security incidents. Critical systems are appropriately
and system failure into the Resilience
segregated, and resource limitations are mitigated.
design, implementation, NIST SP800-82
operation and management of You hold accessible and secured current backups of
Backups data and information needed to recover operation of
critical systems.
your critical system.
Staff Awareness and NCSC 10 Steps: User Education Cyber Security You develop and pursue a positive cyber security
Training: and Awareness Culture culture.
Staff have appropriate ISO/IEC 27001:2019
The people who support the operation of your critical
awareness, knowledge and ISO/IEC 27002:2013 system are appropriately trained in cyber security. A
skills to carry out their range of approaches to cyber security training,
ISA/IEC 62443-2-1
organisational roles effectively Cyber Security awareness and communications are employed.
in relation to the security of NIST SP800-53 Training
critical systems supporting the NIST SP800-82
operation of essential
functions.
Security monitoring: NCSC Introduction to logging for The data sources that you include in your monitoring
Monitoring
security purposes allow for timely identification of security events which
The organisation monitors the Coverage
NCSC 10 Steps: Monitoring might affect the operation of your critical system.
security status of the networks
and systems supporting the CREST – Cyber Security You hold log data securely and grant read access
Detecting operation of critical systems in Monitoring Guide only to accounts with business need. No employee
cyber order to detect potential ISO/IEC 27002:2019
Securing Logs should ever need to modify or delete log data within
security security problems and to track an agreed retention period, after which it should be
the ongoing effectiveness of ISO/IEC 27002:2013 deleted.
events
protective security measures. ISO/IEC 27035:1-3
Evidence of potential security incidents contained in
Generating
ISA/IEC 62443-2-1 your monitoring data is reliably identified and triggers
Alerts
alerts.
NIST SP 800-53 Identifying You contextualise alerts with knowledge of the threat
NIST SP800-82 Security and your systems to identify those security incidents
Incidents that require some form of response.
NIST SP800-94
Monitoring staff skills, tools and roles, including any
that are out-sourced, should reflect governance and
Monitoring
reporting requirements, expected threats and the
Tools and
complexities of the network or system data they
Skills
need to use. Monitoring staff have knowledge of the
critical systems they need to protect.
Proactive security event ISO/IEC 27001:2019 System You define examples of abnormalities in system
discovery: ISO/IEC 27002:2013 Abnormalities behaviour that provide practical ways of detecting
for Attack malicious activity that is otherwise hard to identify.
The organisation detects, ISO/IEC 27035-3 Detection
within critical systems,
ISA/IEC 62443-2-1
malicious activity affecting, or You use an informed understanding of more
with the potential to affect, the NIST SP800-53 sophisticated attack methods and of normal system
operation of essential functions behaviour to monitor proactively for malicious
even when the activity evades Proactive activity.
standard signature-based Attack
security prevent/detect Discovery
solutions (or when standard
solutions are not deployable).
Response and recovery NCSC 10 Steps: Incident You have an up-to-date incident response plan that
planning: Management Response is grounded in a thorough risk assessment that takes
Minimising ISO/IEC 27035 (all) Plan account of your essential functions and covers a
There are well-defined and
the impact range of incident scenarios.
tested incident management ISO/IEC 22301:2019
of cyber processes in place, that aim to You have the capability to enact your incident
security ISO/IEC 27002:2013
ensure continuity of essential Response and response plan, including effective limitation of impact
incidents functions in the event of NIST SP800-61 Recovery on the operation of your critical systems. During an
system or service failure. NIST SP800-53 Capability incident, you have access to timely information on
Mitigation activities designed which to base your response decisions.
to contain or limit the impact of NIST SP800-82 Your organisation carries out exercises to test
compromise are also in place. Eurocae ED204 response plans, using past incidents that affected
Testing &
your (and other) organisation, and scenarios that
Exercising
draw on threat intelligence and your risk
assessment.
Lessons learned: NCSC 10 Steps: Incident Incident Root When an incident occurs, steps must be taken to
Management Cause understand its root causes and ensure appropriate
When an incident occurs,
ENISA Good Practice for Analysis remediating action is taken.
steps are taken to understand
its root causes and to ensure Incident Management Guide
Your organisation uses lessons learned from
appropriate remediating action ISO/IEC 27035:2-3 incidents to improve your security measures.
is taken to protect against ISO/IEC 22301:2019
future incidents. Using
ISO/IEC 27001:2019 Incidents to
ISO/IEC 27002:2013 Drive
NIST SP800-61 Improvements
NIST SP800-53