-
Notifications
You must be signed in to change notification settings - Fork 3
/
Telematics_Security_Requirements_Matrix.sdoc
2738 lines (2295 loc) · 132 KB
/
Telematics_Security_Requirements_Matrix.sdoc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
[DOCUMENT]
TITLE: NMFTA Telematics Security Requirements Matrix
[GRAMMAR]
ELEMENTS:
- TAG: REQUIREMENT
FIELDS:
- TITLE: UID
TYPE: String
REQUIRED: False
- TITLE: LEVEL
TYPE: String
REQUIRED: False
- TITLE: STATUS
TYPE: String
REQUIRED: False
- TITLE: TAGS
TYPE: String
REQUIRED: False
- TITLE: CATEGORY
TYPE: String
REQUIRED: False
- TITLE: CRITICALITY
TYPE: String
REQUIRED: False
- TITLE: TITLE
TYPE: String
REQUIRED: False
- TITLE: STATEMENT
TYPE: String
REQUIRED: False
- TITLE: RATIONALE
TYPE: String
REQUIRED: False
- TITLE: COMMENT
TYPE: String
REQUIRED: False
- TITLE: PUB_REFS
TYPE: String
REQUIRED: False
- TITLE: VERIFICATION
TYPE: String
REQUIRED: False
RELATIONS:
- TYPE: Parent
ROLE: Refines
[FREETEXT]
These recommended security requirements are intended to be informative, not directional in nature. While all reasonable steps have been taken to ensure that the recommendations are well-supported by our research and third-party verification, NMFTA and the parties contributing to these recommendations do not accept liability or responsibility for any damage or harm incurred as a result of actions taken based upon these recommendations.
[/FREETEXT]
[SECTION]
TITLE: Acknowledgements
[FREETEXT]
We would like to acknowledge the contributions of DOT/Volpe Center and the members of the Cybersecurity Requirements for Telematics Systems working group. At the time this report was published, named participants included Derek Held of Zonar Systems, several representatives from Geotab, Altaz Valani of Security Compass, Mark Zachos, President of DG Technologies, Richard M. Litwinczuk, Senior Cybersecurity Engineer, Land Cyber Mission Assurance Program DND, Jacob D'Aoust, Junior Researcher, DeepMicro Limited. The working group benefited greatly from the contributions of several other fleet managers and telematics service providers (TSPs) who wish to remain anonymous.
The authors would also like to acknowledge the contributions of the NMFTA Request for Proposal Contract Template Language (RFPCTL) working group.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: List of Abbreviations
[FREETEXT]
============== =======================================================
Abbreviation Term
============== =======================================================
ASVS Application Security Verification Standard
BSIMM Building Security in Maturity Model
CAIQ Consensus Assessment Initiative Questionnaire
CTIA Cellular Telecommunications and Internet Association
Cyber ITL Cyber Independent Testing Labs
DHS Department of Homeland Security
DOT Department of Transportation
DOT Department of Transportation
ELD Electronic Logging Device
ETSI European Telecommunications Standards Institute
FM Fleet Manager
FMI Fleet Management Information
HMI Human Machine Interface
IEC International Electrotechnical Commission
IS Information System
ISO International Organization for Standardization
IVG Intelligent Vehicle Gateway
MAC Mandatory Access Controls
MASVS Mobile Application Security Verification Standard
MSTG Mobile Security Testing Guide
NIST National Institute of Standards and Technology
NMFTA National Motor Freight Traffic Association, Inc.
OWASP Open Web Application Security Project
RFP Request for Proposal
RFPCTL Request for Proposal Contract Template Language
============== =======================================================
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Foreword
[FREETEXT]
After the US DOT/Volpe published “Telematics Cybersecurity Primer for Agencies” in June 2017, we wanted to create resources for use by our motor freight carrier members to procure new telematics systems such as Electronic Logging Devices (ELD). Starting with the telematics cybersecurity controls and recommendations made by the Primer, a working group was assembled to complete a detailed list of testable cybersecurity requirements for all the components of a telematics system. We are fortunate to have been able to collaborate with DOT/Volpe and to see the efforts of the working group come to fruition through the publication of this report, which is a natural refinement of the security controls defined in the Primer.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Preface
[FREETEXT]
THE INFORMATION CONTAINED HEREIN IS PROVIDED “AS IS” WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
INFORMATION IS WITH THE USER.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Executive Summary
[FREETEXT]
The purpose of this document is to provide government agency Fleet
Managers and private industry stakeholders (e.g. TSPs, carriers, OEMs,
Tier 1 suppliers, and others) responsible for the selection and
procurement of Telematics, Fleet Management Information Systems (FMIS)
and/or ELDs with situational awareness of potential cybersecurity risks
of deploying such systems. This report also delivers a comprehensive
list of cybersecurity requirements that should be satisfied by all
components of a Telematics, Fleet Management Information System (FMIS)
and/or Electronic Logging Devices (ELD), including validation steps for
federal agencies and private industry stakeholders when deploying such
systems.
The audience for this report is the agencies and private industry stakeholders responsible for the selection and procurement of Telematics, Fleet Management Information Systems (FMIS) and/or ELDs, as was the case in the previously released “Telematics Cybersecurity Primer for Agencies” report. The working group believes that any stakeholder that must procure Telematics, FMIS and/or ELDs will also find the requirements outlined in this document relevant. The complete list of requirements outlined in Appendix A will remain a living document which can respond to feedback from industry and technical experts. The requirements are hosted at https://github.com/nmfta-repo/nmfta-telematics_security_requirements and readers are encouraged to check there for updates to, and to offer feedback on, the requirements.
The comprehensive list of cybersecurity requirements for Telematics, FMIS and/or ELDs presented here was developed in collaboration with a diverse working group. The requirements are prioritized and include references to public authoritative sources containing more information, should the reader require additional details. The complete listing will provide purchasers with sufficient information to prioritize the need for cybersecurity in the Telematics, FMIS and/or ELD as well as validate the presence of the controls upon delivery of a system.
It is the recommendation of the working group that agencies and private stakeholders use these cybersecurity requirements when procuring new Telematics, FMIS and/or ELDs as well as when evaluating their current systems when the need to evaluate cybersecurity arises. The working group continues to refine the requirements and the reader is encouraged to visit https://github.com/nmfta-repo/nmfta-telematics_security_requirements to obtain the most up-to-date copy of the requirements, which is also `available in a supplier questionnaire format <../tsrm_questionnaires.xlsx>`_. The site should also be used to give feedback to the working group on ways that the requirements can be further refined. It is NMFTA’s recommendation that motor freight carriers use these requirements as a natural successor to “Telematics Cybersecurity Primer for Agencies.”
The complete list of cybersecurity requirements can be found in Appendix A. Requirements are prioritized for use by stakeholders via a Criticality field to encourage adoption incrementally. These requirements are presented for all the components of a Telematics, FMIS and/or ELD: Vehicle Connection, Connectivity/Communications, Mobile App, and Cloud or Back-end and must be taken in their entirety for any assurances of cybersecurity to be realized.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Introduction
[FREETEXT]
The deployment of Telematics, FMIS and/or ELDs in motor vehicles is
pervasive today. As with any Information System (IS), it is the
owner/operator of that system who bears the responsibility for managing
the security of that system. This includes security of the information
being collected, managed and stored, but also the security of the assets
being monitored which – if not considered in procurement – could have
their security posture worsened by the introduction of a Telematics,
FMIS and/or ELD. In the case of agencies as the owners of an IS, their
responsibility is detailed in the Federal Information Security
Management Act of 2014[^1].
A core objective of this document is to provide information to owners of
Telematics, FMIS and/or ELDs in the phases of procurement of these
systems so they can manage risks to security. An additional objective is
to provide comprehensive cybersecurity requirements that can be
consulted by the owner and potential vendors to provide sufficient
information that can prioritize the needs for cybersecurity in the
Telematics, FMIS and/or ELD and validate the presence of the controls
upon delivery of the system.
The approach taken to create this list included consultations with many
authoritative sources of cybersecurity controls and then mapping them to
the components of a Telematics, FMIS and/or ELD. To do this, the report
considers a simplified model of a Telematics, FMIS and/or ELD. The four
components of such a simplified system are broken down by *Vehicle
Connection*, *Connectivity/Communications*, *Mobile App*, and *Cloud or
Back-end* and are depicted in the figure below:
.. image:: media/telematics-diagram.png
:alt: Figure 1. Abstracted Telematics, Fleet Management Information Systems (FMIS) and/or ELD
:class: image
The Cybersecurity Requirements for Telematics Systems matrix uses the
following terms for the components of a Telematics, FMIS and/or ELD:
- *Vehicle Connection Device* – The component of Telematics, FMIS
and/or ELD that is connected to vehicle networks -- tractor and/or
trailer. There may also be a Human Machine Interface (HMI) aspect to
this component. In cases where the HMI is a separate device from that
which connects to vehicular networks, then all the requirements
identified as being applicable to the ‘Mobile App’ (see below) should
be considered to apply to the HMI device.
- *Connectivity/Communications* – The component of a Telematics, FMIS
and/or ELD which communicates data with the *Cloud or Back-end* (see
below). This may or may not be the same device as the *Vehicle
Connection Device*. In cases where they are the same device, both
sets of the requirements identified as being applicable to a *Vehicle
Connection Device* and the requirements identified as being
applicable to *Connectivity/Communications* components should be
considered to apply to the device.
- *Cloud or Back-end* – The component or components of a Telematics,
FMIS and/or ELD which are internet facing, where data is collected,
where commands or remote control of vehicular components are possible
and where monitoring of the entire fleet or subsets thereof is made
possible by dashboard or operations center features. In some cases,
these components will be hosted by service providers, while in others
they may be hosted by the owner. In either case, all the requirements
identified as being applicable to *Cloud or Back-end* should be
considered to apply to the device.
- *Mobile App* – The component of a Telematics, FMIS and/or ELD, which
presents Human Machine Interfaces to drivers or other users of the
system, may or may not have its own communications paths to the
*Cloud or Back-end* and may or may not be hosted in a device separate
from the *Vehicle Connection Device,* but is otherwise able to
connect to and communicate with that vehicular component.
A goal of the working group was to ensure that stakeholders who procure
equipment could also be capable of verifying that the equipment
satisfies cybersecurity requirements. Therefore, each requirement
includes a validation step which is intended to be executed by the
purchaser. In some cases, the verification of the cybersecurity
requirement requires more specialized knowledge than is reasonable to
expect the purchaser to have. In these few cases, the validation steps
recommend consulting a 3rd party report.
In recognizing that implementing cybersecurity for systems is an ongoing
process for which there are rarely enough resources, each requirement
has been each assigned a ‘criticality.’ These criticalities can be used
to prioritize implementation by vendors or selection of vendors by
purchasers.
We have avoided any requirements that are novel or otherwise unique in
favor of referencing publicly available authoritative sources; at the
time of drafting this report the authoritative references include:
1. National Institute of Standards and Technology, Computer Security
Resource Center. “Federal Information Security Modernization Act
(FISMA).” Last modified December 2014. Accessed February 2020.
`http://csrc.nist.gov/drivers/documents/FISMA-final.pdf <http://csrc.nist.gov/drivers/documents/FISMA-final.pdf>`__
2. National Institute of Standards and Technology, Computer Security
Resource Center. “Security and Privacy Controls for Information
Systems and Organizations.” Last modified December 2020. Accessed
May 2021.
`https://doi.org/10.6028/NIST.SP.800-53r5 <https://doi.org/10.6028/NIST.SP.800-53r5>`__
3. CTIA Certification LLC. “Cybersecurity Certification Test Plan for
IoT Devices.” (CCTPID) Last modified January 2021. Accessed June
2021.
`https://ctiacertification.org/wp-content/uploads/2020/10/CTIA-Cybersecurity-Test-Plan-1.2.2.pdf <https://ctiacertification.org/wp-content/uploads/2020/10/CTIA-Cybersecurity-Test-Plan-1.2.2.pdf>`__
4. ETSI Technical Committee Cyber Security (TC CYBER). “EN 303 645.”
Last modified April 2020. Accessed May 2021.
`https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.00_30/en_303645v020100v.pdf <https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.00_30/en_303645v020100v.pdf>`__
5. Cloud Security Alliance. “Consensus Assessment Initiative
Questionnaire (CAIQ).” Last modified September 2019. Accessed May
2021.
`https://cloudsecurityalliance.org/artifacts/consensus-assessments-initiative-questionnaire-v3-1 <https://cloudsecurityalliance.org/artifacts/consensus-assessments-initiative-questionnaire-v3-1>`__
6. Open Web Application Security Project (OWASP). “Application Security
Verification Standard (ASVS).” Last modified March 2019. Accessed
June 2019.
`https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.pdf <https://github.com/OWASP/ASVS/raw/master/4.0/OWASP%20Application%20Security%20Verification%20Standard%204.0-en.pdf>`__
7. Cyber ITL. “Methodology.” Accessed June 2019.
`https://cyber-itl.org/about/methodology/ <https://cyber-itl.org/about/methodology/>`__
8. ISO/IEC. “29147:2018 Information technology – Security techniques –
Vulnerability disclosure.” Last modified Oct 2018. Accessed June
2019.
`https://www.iso.org/standard/72311.html <https://www.iso.org/standard/72311.html>`__
9. Elazari, Amit. “#LegalBugBounty Hall of Fame.” Accessed June 2019.
`https://amitelazari.com/%23legalbugbounty-hof <https://amitelazari.com/%23legalbugbounty-hof>`__
10. The Building Security In Maturity Model. “BSIMM.” Accessed June
2019.
`https://www.bsimm.com/download.html <https://www.bsimm.com/download.html>`__
11. Open Web Application Security Project (OWASP). “Mobile Application
Security Verification Standard (MASVS).” Accessed June 2019.
`https://github.com/OWASP/owasp-masvs/releases/tag/1.2RC <https://github.com/OWASP/owasp-masvs/releases/tag/1.2RC>`__
12. Klinedinst, D. CMU, US DOT, FMCSA Office of Analysis, Research and
Technology et. al. . “Cybersecurity Best Practices for
Integration/Retrofit of Telematics and Aftermarket Electronic
Systems into Heavy Vehicles.” Lost modified May 11th 2020. Accessed
May 12th 2020.
`https://rosap.ntl.bts.gov/view/dot/49248 <https://rosap.ntl.bts.gov/view/dot/49248>`__
13. DHS, Binding Operational Directive 20-01. Last modified September 2,
2020. Accessed Jan 18th 2021.
`https://cyber.dhs.gov/bod/20-01/ <https://cyber.dhs.gov/bod/20-01/>`__
14. Open Web Application Security Project (OWASP). “Embedded Application
Security Project.” Last modified September 2020. Accessed May 2021.
`https://owasp.org/www-project-embedded-application-security/ <https://owasp.org/www-project-embedded-application-security/>`__
Additional authoritative sources will be included in future versions of
this report.
With regards to the FMCSA report "Cybersecurity Best Practices for
Integration/Retrofit of Telematics and Aftermarket Electronic Systems
into Heavy Vehicles" reference which is included in the references: the
Cybersecurity Requirements for Telematics Systems Requirements matrix is
aligned with the guidelines recommended by the FMCSA in their report.
However, there are some differences between the audiences of the FMCSA
report and the Cybersecurity Requirements for Telematics Systems
Requirements matrix and also some requirements in the matrix which do
not have a corresponding guideline in the FMCSA report. For more details
on these topics please see `the NMFTA bulletin on the FMCSA
"Cybersecurity Best Practices for Integration/Retrofit of Telematics and
Aftermarket Electronic Systems into Heavy
Vehicles." <http://www.nmfta.org/documents/hvcs/NMFTA%20Bulletin%20on%20FMCSA%20Heavy%20Vehicles%20Telematics%20Cybersecurity%20Best%20Practices%20v1.0.pdf?v=1>`__
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Cybersecurity Requirements for Telematics Systems Matrix Description
[FREETEXT]
Each requirement captured is augmented with *Criticality*, *Verification
Steps*, *Public Requirements References,* etc. A sample requirement is
shown below:
.. image:: media/sample_requirement.png
:alt: Sample Requirement for Reference
:class: image
The example requirement above demonstrates the form in which each
requirement is presented in Appendix A.
**UID**
shows a unique value assigned to the requirement for easy reference
**CATEGORY**
groups like requirements together
**CRITICALITY**
assigns a ‘priority’: a recommendation to the purchaser for each
requirement:
- **High**: the working group advises that purchasers do not accept
proposals that do not meet all ‘High’ criticality requirements
- **Medium**: the working group advises that purchasers may accept
proposals that do not meet ‘Medium’ criticality requirements when the
failure is justifiable or mitigated by the vendor
- **Low**: the working group advises that purchasers may accept
proposals that do not meet ‘Low’ criticality requirements
..
**CHILDREN**
Captures the applicable component categories; shows to which of the components of the Telematics, FMIS and/or ELD that this requirement applies by listing the child requirements that are specific to Cloud, Connectivity, Mobile, or Vehicle Connection components.
**PUB_REFS**
Captures the public requirements references / descriptions from external authoritative requirements as were known to the working group at the time of this draft. These references are included so that
- Purchasers can easily refer to the referenced sections of the
document for further clarification on what are acceptable norms when
evaluating vendor responses to RFPs AND
- Vendors can use the referenced sections of the documents for
establishing common language and terms in the responses to RFPs to
amortize the costs of developing detailed responses.
..
**STATEMENT**
Shows the requirement as it applies to the components of a Telematics,
FMIS and/or ELD. The working group made every effort to make these
requirements shorter and more succinct than the authoritative external
references.
**VERIFICATION**
shows the steps which can be executed by purchasers to confirm that a
given Telematics, FMIS and/or ELD satisfies this requirement. There are
several cases where the working group does not expect that purchasers
will perform their own verification. Where it is recommended that either
a third party be engaged to provide an analysis which can be used by the
purchasers to verify vendor claims, or that the vendor perform a
demonstration that the requirement is satisfied which can be observed
and confirmed by the purchaser. In such cases, rationale will be given.
Due to the costly nature of delegating to a third party or of preparing
a demonstration, this will only be recommended in cases where the
requirement has been listed as having high *Criticality*. Because of the
high *Criticality* of these requirements, it would be ideal to verify
them relying on both a third party and a demonstration; the
recommendation of the working group is that one or the other is
sufficient.
- In the context of verification via reports from a third party it is
acceptable to either, as a purchaser, contract the third party for
testing or to verify documentation provided by a third party
contracted by the vendor.
- In the context of demonstration by the vendor, it is important that
the purchaser ensure the demonstration covers the non-functional
aspects of these requirements, (e.g. for secure boot it is not
sufficient to demonstrate that valid images are bootable, but rather
it is necessary to demonstrate that tampered images are not
bootable.)
..
**COMMENT**
Shows comments or notes from the working group.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Questionnaire Description
[FREETEXT]
This project `available in a supplier questionnaire format <../tsrm_questionnaires.xlsx>`_, one sheet for each of *Vehicle Connection*, *Connectivity/Communications*, *Mobile App*, and *Cloud or Back-end*.
.. image:: media/sample_questionnaire.png
:alt: Questionnaire Excerpt
:class: image
These questionnaires can be sent in request to vendors to evaluate each of the applicable components of a telematics system that is being procured.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Recommendations and Conclusions
[FREETEXT]
The working group has produced the comprehensive list of cybersecurity requirements for Telematics, FMIS and/or ELDs found in Appendix A. These requirements are prioritized via Criticality and assigned to one or more components in a generic Telematics, FMIS and/or ELD. They also include references to public, authoritative sources for more details on the requirement for the benefit of additional understanding on the part of the purchaser and vendor.
The working group recommends that federal agency fleet managers and private industry stakeholders use these requirements when procuring new Telematics, FMIS and/or ELDs, as well as when evaluating their current systems when the need to evaluate cybersecurity arises. It is NMFTA’s recommendation that motor freight carriers use these requirements as a natural successor to “Telematics Cybersecurity Primer for Agencies.” The requirements contained in this report complete several key areas which are missing in the Primer.
The working group continues to refine the requirements and the reader is encouraged to visit https://github.com/nmfta-repo/nmfta-telematics_security_requirements to obtain the most up-to-date copy of the requirements, which is also available in a supplier questionnaire format. The site should also be used to give feedback to the working group on ways that the requirements can be further refined.
[/FREETEXT]
[/SECTION]
[SECTION]
TITLE: Appendix A
[FREETEXT]
In this section the reader will find all of the requirements of the TSRM. The latest version can be found at https://github.com/nmfta-repo/nmfta-telematics_security_requirements
[/FREETEXT]
[REQUIREMENT]
UID: AA-010
CATEGORY: >>>
Audit and Accountability
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
The vendor's system shall record event and system logs
<<<
COMMENT: >>>
Ideally the logs are immutable, backed up, and retained for a certain period of time
<<<
PUB_REFS: >>>
NIST 800-53 r5 AU-2 – EVENT LOGGING
a. Identify the types of events that the system is capable of logging in support of the audit function: [Assignment: organization-defined event types that the system is capable of logging];
b. Coordinate the event logging function with other organizational entities requiring audit related information to guide and inform the selection criteria for events to be logged;
c. Specify the following event types for logging within the system: [Assignment: organization defined event types (subset of the event types defined in AU-2a.) along with the frequency of (or situation requiring) logging for each identified event type];
d. Provide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; and
e. Review and update the event types selected for logging [Assignment: organization-defined frequency].
CTIA CCTPID 4.7 Audit Log
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing locations where audit logs are stored and the types of events logged.
<<<
[REQUIREMENT]
UID: AC-010
CATEGORY: >>>
Protecting Data on Devices
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Vendor devices will implement least privilege for the memory spaces of processes handling protected data. i.e. data in-use, of the categories of sensitive protected data above, or shall be segmented from software components which do not handle such data. Acceptable segmentations include Mandatory Filesystem Access Controls and Mandatory Volatile Memory Access Controls.
<<<
COMMENT: >>>
e.g. a Linux system with MAC configured to deny access to the processes dealing with protected data and also denying debugger access to the memory space of those processes.
<<<
PUB_REFS: >>>
NIST 800-53 r5 SI-16 - MEMORY PROTECTION
Implement the following controls to protect the system memory from unauthorized
code execution: [Assignment: organization-defined controls].
NIST 800-53 r5 AC-6 (4) - LEAST PRIVILEGE | SEPARATE PROCESSING DOMAINS
Provide separate processing domains to enable finer-grained allocation of user privileges.
NIST 800-53 r5 SC-2 – SEPARATION OF SYSTEM AND USER FUNCTIONALITY
Separate user functionality, including user interface services, from system management
functionality.
NIST 800-53 r5 SC-2 (1) - SEPARATION OF SYSTEM AND USER FUNCTIONALITY | INTERFACES FOR NON-PRIVILEGED USERS
Prevent the presentation of system management functionality at interfaces to nonprivileged users.
NIST 800-53 r5 AC-25 – REFERENCE MONITOR
Implement a reference monitor for [Assignment: organization-defined access control policies] that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.
NIST 800-82 r3 PR.DS 6.2.3 - DATA SECURITY
Identify critical physical and electronic file types and data to protect while at rest. This may include personally identifiable information and sensitive, proprietary, or trade secret information.
UL 1376 3.9 Least privilege: Systems must implement 'least privilege', or utilize hardware based features to protect sensitive code and data
<<<
VERIFICATION: >>>
Inspection of vendor-supplied design documentation detailing the privilege separation of the device. Ensure that 1) a Mandatory Access Control scheme is employed 2) there are separate domains/users/roles (whichever is applicable to the MAC) for dealing with the sensitive information (vendor defined, see SCP-030) and finally 3) accounts for running system tasks (e.g. crond, portmap, systemd) are not in the separate domains/users/roles for dealing with sensitive information.
<<<
[REQUIREMENT]
UID: AC-020
CATEGORY: >>>
Protecting Actions on Devices
<<<
CRITICALITY: >>>
High
<<<
STATEMENT: >>>
All actions taken by the vendor's telematics system that are capable of supporting access controls shall be configured such that each user account or process/service account are assigned only the minimal privileges required to perform the specific, intended, actions of the user or process/service account.
<<<
COMMENT: >>>
This principle underpins system security
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-6 – LEAST PRIVILEGE
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
NIST 800-53 r5 AC-6 (1) - LEAST PRIVILEGE | AUTHORIZE ACCESS TO SECURITY FUNCTIONS
Authorize access for [Assignment: organization-defined individuals or roles] to:
(a) [Assignment: organization-defined security functions (deployed in hardware, software, and firmware)]; and
(b) [Assignment: organization-defined security-relevant information].
CTIA CCTPID 5.17 Design-In Features “designed to isolate critical functions from less critical functions”
OWASP E5 – Identity Management
<<<
VERIFICATION: >>>
Inspection of vendor documentation or a demonstration by the vendor that details how software privileges are assigned in vendor systems. Ensure that principles of least privilege are met.
<<<
[REQUIREMENT]
UID: AC-030
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
High
<<<
STATEMENT: >>>
The vendor's system shall employ cryptographic authentication to prevent unauthorized access to telematics systems and data.
<<<
COMMENT: >>>
Identity management is critical
e.g. PINs, single-sign on with carrier’s identity provider (SAML or other), vendor managed identity provider (SAML or other)
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-6 – LEAST PRIVILEGE
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
NIST 800-53 r5 AC-3 – ACCESS ENFORCEMENT
Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
FMCSA GDL 32 Make sure local wireless interfaces like Bluetooth or Wi-Fi don't provide admin access without authentication.
UL 1376 4.1 Sensitive services require authentication: Sensitive services must require authentication and ensure the confidentiality and integrity of data
UL 1376 6.3 Authentication for remote communications: Connections to remote services must implement cryptographic authentication
<<<
VERIFICATION: >>>
Inspection of vendor documentation detailing the methods used to authenticate users. Ensure that an acceptable method of authentication is available for all components which be interfaced-to by carrier staff and systems.
In the case of single-sign-on delegation, ensure that your (carrier) system requirements are met with respect to security assertions (e.g. SAML is supported).
<<<
[REQUIREMENT]
UID: AC-040
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
The vendor shall identify all instances where the telematics system includes actions that cannot support access authentication and/or execute with elevated privileges
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-14 – PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
a. Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and
b. Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
NIST 800-53 r5 AC-6 – LEAST PRIVILEGE
Employ the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation listing system actions and interfaces that do not require authentication. Ensure that the list is short, that each entry in the list is acceptable to you (the carrier), and there is a justifiable reason for no-authentication on each item in the list.
<<<
[REQUIREMENT]
UID: AC-041
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Identifying information about the connected devices will not be made available without authentication first.
<<<
COMMENT: >>>
e.g. it should not be possible to identify the device type nor firmware version by port scanning a connected device. Also, it should not be able to determine that a vehicle is operational or not via non-authorized connections.
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-14 – PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
a. Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and
b. Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation listing system actions and interfaces that do not require authentication. Ensure that no information leaks are possible from these unauthenticated actions.
<<<
[REQUIREMENT]
UID: AC-050
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
All remote access methods and possible remote actions to/on telematics system shall be documented.
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-17 – REMOTE ACCESS
a. Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
b. Authorize each type of remote access to the system prior to allowing such connections
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation listing the methods of remote access and the actions that can be performed. Ensure that the remote access methods and actions are justifiable and also ensure that all remote methods require authentication (i.e. ensure none of them are listed in vendor documentation for AC-040)
<<<
[REQUIREMENT]
UID: AC-060
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
For all components of the system, the vendor shall provide a listing of all wireless communication interfaces to the system and specify how the interfaces can be configured and/or disabled.
<<<
COMMENT: >>>
e.g. Bluetooth, cellular, satellite, Wi-Fi hotspot, Wi-Fi client, infrared, NFC, RFID
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-18 – WIRELESS ACCESS
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
b. Authorize each type of wireless access to the system prior to allowing such connections.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing what wireless communications hardware is present, which wireless communications methods can be disabled, and how wireless communications enablement or disablement is managed.
<<<
[REQUIREMENT]
UID: AC-061
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
The vendor shall not use any deprecated encryption+authentication on any Wi-Fi interface of the device. At the time of drafting this includes WEP, WPS or open/none.
<<<
PUB_REFS: >>>
FMCSA GDL 39 Only use WPA2 authentication / encryption. Never use WEP, WPS, or “open” Wi-Fi.
UL 1376 6.2 Industry standard Wi-Fi security: Device must support industry accepted wireless security defaults for any Wi-Fi connections
<<<
VERIFICATION: >>>
Test that the device will not connect to WEP, WPS or open Wi-Fi hotspots.
<<<
[REQUIREMENT]
UID: AC-062
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
The vendor shall implement, for all Bluetooth interfaces, pairing that must be specifically allowed by physical controls on the device and be time-limited. Furthermore, pairing will not use legacy pairing or passkey entry.
<<<
PUB_REFS: >>>
FMCSA GDL 44 Make sure Bluetooth devices support and use Secure Simple Pairing (SSP) rather than legacy pairing.
FMCSA GDL 45 Numeric Comparison is preferred to Passkey Entry for pairing.
<<<
VERIFICATION: >>>
Test that it is not possible to pair with the device 5 minutes after enabling pairing on the device. Test that pairing does not support SSP or passkey, only numeric comparison.
<<<
[REQUIREMENT]
UID: AC-063
CATEGORY: >>>
Access Control
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Any and all software or firmware implementing wireless interface encrytion+authentication (those satisfying AC-061 and AC-062 above) will be prepared for future deprecation of methods. i.e. That software/firmware is upgradable.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation confirming upgradability of the software implementing encryption+authentication of wireless interfaces.
<<<
[REQUIREMENT]
UID: AC-070
CATEGORY: >>>
Identification and Authentication
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Authentication attempts to the vendor’s devices and backends shall be rate-limited to an industry accepted rate.
<<<
PUB_REFS: >>>
NIST 800-53 r5 AC-7 - UNSUCCESSFUL LOGON ATTEMPTS
a. Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
b. Automatically [Selection (one or more): lock the account or node for an [Assignment: organization-defined time period]; lock the account or node until released by an administrator; delay next logon prompt per [Assignment: organization-defined delay algorithm]; notify system administrator; take other [Assignment: organization-defined action]] when the maximum
number of unsuccessful attempts is exceeded.
CTIA CCTPID 5.2 Password Management Test
UL 1376 2.8 Brute force protection: Implement protection against brute force attacks
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing the methods used to enforce rate limiting.
<<<
[REQUIREMENT]
UID: AC-080
CATEGORY: >>>
Device-Local Authentication
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
All authentication offered on device-local interfaces shall expect credentials which are unique to each device instance and uncorrelated to any and all public information about the device.
<<<
COMMENT: >>>
This requirement applies to many common facilities found on devices. e.g. local management portals, local Wi-Fi access points, Bluetooth pairing codes, local ssh servers, local serial console logins
<<<
PUB_REFS: >>>
ETSI EN 303 645 V2.1.0 Provision 5.1-1 Where passwords are used and in any state other than the factory default, all consumer IoT device passwords shall be unique per device or defined by the user.
FMCSA GDL 32 Make sure local wireless interfaces like Bluetooth or Wi-Fi don't provide admin access without authentication.
FMCSA GDL 40 Always use a complex, unique password per device.
FMCSA GDL 43 Always use a complex, unique password per device.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing the local authentication and how the unique credential is generated. Ensure that the generation of this credential cannot be guessed from public information.
<<<
[REQUIREMENT]
UID: CM-010
CATEGORY: >>>
Protecting Actions on Devices
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
All components of the vendor's system shall be configured to utilize the principle of least functionality and use only the services necessary for secure operations of the system. Additionally, customers should have the option of disabling any features they do not want or do not need by having unnecessary services’ executables removed or at least disabled such that their execution (by even superuser) is not possible in deployed systems.
<<<
COMMENT: >>>
E.g. this is particularly true of unauthenticated or unencrypted transport services (which would not satisfy protected communication requirements above) such as File Transfer Protocol, telnet, Short Messaging Service, etc.
<<<
PUB_REFS: >>>
NIST 800-53 r5 CM-7 – LEAST FUNCTIONALITY
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
CTIA CCTPID 5.17 Design-In Features “designed to deny all inbound and outbound network communications, except for those that are essential for the device to operate properly“
FMCSA GDL 20 Give applications the least privilege they need to function
FMCSA GDL 21 Where possible, remove code that isn't used
OWASP E6 – Embedded Framework and C-Based Hardening
UL 1376 3.3 Unwanted functionality can be disabled: Customer access to disable unwanted features
UL 1376 3.6 Unwanted / Unnecessary features removed: Unwanted / unnecessary features are removed
<<<
VERIFICATION: >>>
Inspection of vendor documentation asserting that unnecessary software or services are not present or disabled on the device.
<<<
[REQUIREMENT]
UID: CM-020
CATEGORY: >>>
Configuration Management
<<<
CRITICALITY: >>>
High
<<<
STATEMENT: >>>
The vendor’s devices shall have all services used for troubleshooting disabled or properly protected from unauthorized access and use.
<<<
COMMENT: >>>
Deploying with test or debug facilities enabled is egregious
<<<
PUB_REFS: >>>
NIST 800-53 r5 CM-7 – LEAST FUNCTIONALITY
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
FMCSA GDL 54 Disable unnecessary debugging interfaces in production.
FMCSA GDL 55 Authenticate debugging and diagnostic interfaces.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing all services (listening ports or outbound connections) available on deployed devices.
Ensure that none of the services available are without authentication (see AC-030) and furthermore that any troubleshooting functionality is ideally disabled, or at least the service available requires unique credentials for authorization of that feature.
<<<
[REQUIREMENT]
UID: CM-030
CATEGORY: >>>
Configuration Management
<<<
CRITICALITY: >>>
High
<<<
STATEMENT: >>>
Vendor ensures that any and all interfaces used for testing or debug are unavailable in production builds of the devices
<<<
COMMENT: >>>
Deploying with test or debug facilities enabled is egregious.
Functionality that allows for the direct execution of scripts or commands by the device or system can often be exploited by a malicious party and therefore must be disabled.
<<<
PUB_REFS: >>>
NIST 800-53 r5 CM-7 – LEAST FUNCTIONALITY
a. Configure the system to provide only [Assignment: organization-defined mission essential capabilities]; and
b. Prohibit or restrict the use of the following functions, ports, protocols, software, and/or services: [Assignment: organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services].
CAIQ CCC-03.6 Are mechanisms in place to ensure that all debugging and test code elements are removed from released software versions?
FMCSA GDL 31 Make sure debugging interfaces (JTAG, serial, USB) have authentication required.
FMCSA GDL 54 Disable unnecessary debugging interfaces in production.
FMCSA GDL 55 Authenticate debugging and diagnostic interfaces.
OWASP E7 – Usage of Debug Code and Interfaces
UL 1376 3.1 Protect communication and debug ports: Communication and debug ports must be protected against misuse
UL 1376 4.4 No direct execution of commands / scripts: No direct execution of scripts / commands using system interfaces and or user-facing components
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing all service (listening ports or outbound connections) available on deployed devices.
Ensure that there are no services for test or debug active in the device. Ideally, look for assurances that any test or debug executables cannot be run on the device.
<<<
[REQUIREMENT]
UID: CM-040
CATEGORY: >>>
Configuration Management
<<<
CRITICALITY: >>>
High
<<<
STATEMENT: >>>
The vendors’ devices shall have a default system configuration that ensures security ‘out of the box’. In other words, the default configuration should be the most-secure and any additional features should be disabled by default and have their security implications communicated in documentation.
<<<
COMMENT: >>>
Sufficient customer guidance should be provided to allow for that customer to understand the risks associated with enabling any insecure features of the device.
<<<
PUB_REFS: >>>
UL 1376 3.2 Systems configured to secure defaults: Systems must be configured to secure defaults
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation confirming that a) all device configuration options have their security tradeoffs documented and that b) the device’s default configuration is the most-secure.
<<<
[REQUIREMENT]
UID: IA-010
CATEGORY: >>>
Identification and Authentication
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
All remote hosts of the vendor's system shall be configured to uniquely identify and authenticate all other remote hosts of the system and/or any other interfacing systems.
<<<
COMMENT: >>>
e.g. that a remote system authenticate the other remote parties by referring to the unique identifiers using mutually authenticated TLS
<<<
PUB_REFS: >>>
NIST 800-53 r5 IA-3 – DEVICE IDENTIFICATION AND AUTHENTICATION
Uniquely identify and authenticate [Assignment: organization-defined devices and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing how devices and components are uniquely identified.
Ensure that interfacing systems can query and/or inspect these unique identifiers.
<<<
[REQUIREMENT]
UID: IA-020
CATEGORY: >>>
Identification and Authentication
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Any authenticators (unique identification) for devices used in vendor’s systems shall be uncorrelated to any and all public information about the device, e.g. lot number, product number, serial number MAC address are all unacceptable inputs to device identifiers.
Where public information is any information that is visible (externally or internally) on the device or discoverable by searches based on that visible information.
<<<
PUB_REFS: >>>
NIST 800-53 r5 IA-3 – DEVICE IDENTIFICATION AND AUTHENTICATION
Uniquely identify and authenticate [Assignment: organization-defined devices and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.
<<<
VERIFICATION: >>>
Inspection of vendor documentation detailing the inputs to the authenticator generation process per device. Ensure that no input is information that can be easily-guessed from simple facts about the device.
<<<
[REQUIREMENT]
UID: IA-030
CATEGORY: >>>
Identification and Authentication
<<<
CRITICALITY: >>>
Medium
<<<
STATEMENT: >>>
Cryptographic modules used in the vendors system shall be compliant with Federal Information Processing Standards (FIPS) 140-2: Level 1.
<<<
COMMENT: >>>
e.g.
• For each attempt to use the authentication mechanism, the probability shall be less than one in 1,000,000 that a random attempt will succeed, or a false acceptance will occur (e.g., guessing a password or PIN, false acceptance error rate of a biometric device, or some combination of authentication methods)
• For multiple attempts to use the authentication mechanism during a one-minute period, the probability shall be less than one in 100,000 that a random attempt will succeed, or a false acceptance will occur
• Feedback of authentication data to an operator shall be obscured during authentication (e.g., no visible display of characters when entering a password).
• Feedback provided to an operator during an attempted authentication shall not weaken the strength of the authentication mechanism
<<<
PUB_REFS: >>>
NIST 800-57 Part 3 r1 - 2.3.3 Cryptographic Modules
3. Ensure that relying party and user cryptographic modules are validated as meeting FIPS 140-2 Level 1 or higher.
UL 1376 2.4 Industry-standard cryptography: Industry standard cryptographic algorithms must be used for security services.
UL 1376 2.5 RNG with sufficient entropy: Random number generation must ensure sufficient entropy
<<<
VERIFICATION: >>>
Inspection of vendor-supplied documentation detailing their procurement requirements for cryptographic modules.
Ensure that their procurement processes require that all cryptographic modules are FIPS 140-2 compliant.
<<<