CEN ISO/TS 17574:2009
(Main)Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009)
Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009)
ISO/TS 17574:2009 provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system.
ISO/TS 17574:2009 should be read in conjunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content.
Elektronische Gebührenerfassung - Leitfaden für Sicherheitsprofile
Perception de télépéage - Lignes directrices concernant les profils de protection de la sécurité (ISO/TS 17574:2009)
Cestna transportna in prometna telematika - Elektronsko pobiranje pristojbin (EFC) - Smernice za zaščito varnostnih profilov EFC (ISO/TS 17574:2009)
General Information
- Status
- Withdrawn
- Publication Date
- 14-Sep-2009
- Withdrawal Date
- 20-Jan-2026
- Technical Committee
- CEN/TC 278 - Road transport and traffic telematics
- Drafting Committee
- CEN/TC 278 - Road transport and traffic telematics
- Current Stage
- 9960 - Withdrawal effective - Withdrawal
- Start Date
- 29-Mar-2017
- Completion Date
- 28-Jan-2026
Relations
- Effective Date
- 22-Dec-2008
- Effective Date
- 08-Jun-2022
- Effective Date
- 28-Jan-2026
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.
Great Wall Tianjin Quality Assurance Center
Established 1993, first batch to receive national accreditation with IAF recognition.

Innovative Quality Certifications Pvt. Ltd. (IQCPL)
Known for integrity, providing ethical & impartial Assessment & Certification. CMMI Institute Partner.
Sponsored listings
Frequently Asked Questions
CEN ISO/TS 17574:2009 is a technical specification published by the European Committee for Standardization (CEN). Its full title is "Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009)". This standard covers: ISO/TS 17574:2009 provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system. ISO/TS 17574:2009 should be read in conjunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content.
ISO/TS 17574:2009 provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system. ISO/TS 17574:2009 should be read in conjunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content.
CEN ISO/TS 17574:2009 is classified under the following ICS (International Classification for Standards) categories: 03.220.20 - Road transport; 35.240.60 - IT applications in transport. The ICS classification helps identify the subject area and facilitates finding related standards.
CEN ISO/TS 17574:2009 has the following relationships with other standards: It is inter standard links to CEN ISO/TS 17574:2004, CEN ISO/TS 17574:2017, EN ISO 1135-5:2015. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
CEN ISO/TS 17574:2009 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
SLOVENSKI STANDARD
01-november-2009
1DGRPHãþD
SIST-TS CEN ISO/TS 17574:2005
&HVWQDWUDQVSRUWQDLQSURPHWQDWHOHPDWLND(OHNWURQVNRSRELUDQMHSULVWRMELQ
()&6PHUQLFH]D]DãþLWRYDUQRVWQLKSURILORY()&,6276
Road transport and traffic telematics - Electronic fee collection (EFC) - Guidelines for
EFC security protection profiles (ISO/TS 17574:2009)
Elektronische Gebührenerfassung - Richtlinien für Sicherheitsprofile (ISO/TS
17574:2009)
Transports routiers et télématique routière - Systèmes de péage électronique - Lignes
directrices concernant les profils de protection de la sécurité des péages (ISO/TS
17574:2009)
Ta slovenski standard je istoveten z: CEN ISO/TS 17574:2009
ICS:
03.220.20 Cestni transport Road transport
35.240.60 Uporabniške rešitve IT v IT applications in transport
transportu in trgovini and trade
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
TECHNICAL SPECIFICATION
CEN ISO/TS 17574
SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION
September 2009
ICS 35.240.60; 03.220.20 Supersedes CEN ISO/TS 17574:2004
English Version
Electronic fee collection - Guidelines for security protection
profiles (ISO/TS 17574:2009)
Perception de télépéage - Lignes directrices concernant les Elektronische Gebührenerfassung - Richtlinien für
profils de protection de la sécurité (ISO/TS 17574:2009) Sicherheitsprofile (ISO/TS 17574:2009)
This Technical Specification (CEN/TS) was approved by CEN on 14 September 2009 for provisional application.
The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to submit their
comments, particularly on the question whether the CEN/TS can be converted into a European Standard.
CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available
promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in parallel to the CEN/TS)
until the final decision about the possible conversion of the CEN/TS into an EN is reached.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland,
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2009 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN ISO/TS 17574:2009: E
worldwide for CEN national Members.
Contents Page
Foreword .3
Foreword
This document (CEN ISO/TS 17574:2009) has been prepared by Technical Committee CEN/TC 278 "Road
transport and traffic telematics", the secretariat of which is held by NEN, in collaboration with Technical
Committee ISO/TC 204 "Intelligent transport systems".
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
This document supersedes CEN ISO/TS 17574:2004.
According to the CEN/CENELEC Internal Regulations, the national standards organizations of the following
countries are bound to announce this Technical Specification: Austria, Belgium, Bulgaria, Cyprus, Czech
Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia,
Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain,
Sweden, Switzerland and the United Kingdom.
TECHNICAL ISO/TS
SPECIFICATION 17574
Second edition
2009-09-15
Electronic fee collection — Guidelines
for security protection profiles
Perception de télépéage — Lignes directrices concernant les profils
de protection de la sécurité
Reference number
ISO/TS 17574:2009(E)
©
ISO 2009
ISO/TS 17574:2009(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
© ISO 2009
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
Contents Page
Foreword. iv
Introduction . v
1 Scope . 1
2 Normative references . 5
3 Terms and definitions. 5
4 Abbreviations . 8
5 Outlines of Protection Profile . 9
5.1 Structure . 9
5.2 Context. 9
Annex A (informative) Procedures for preparing documents. 11
Annex B (informative) Example of threat analysis evaluation method. 43
Annex C (informative) Abstract from Definition of threats and security controls for the Charging
Interface in Electronic Fee Collection. 46
Annex D (informative) Common Criteria Recognition Arrangement (CCRA). 58
Bibliography . 60
ISO/TS 17574:2009(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In other circumstances, particularly when there is an urgent market requirement for such documents, a
technical committee may decide to publish other types of document:
⎯ an ISO Publicly Available Specification (ISO/PAS) represents an agreement between technical experts in
an ISO working group and is accepted for publication if it is approved by more than 50 % of the members
of the parent committee casting a vote;
⎯ an ISO Technical Specification (ISO/TS) represents an agreement between the members of a technical
committee and is accepted for publication if it is approved by 2/3 of the members of the committee casting
a vote.
An ISO/PAS or ISO/TS is reviewed after three years in order to decide whether it will be confirmed for a
further three years, revised to become an International Standard, or withdrawn. If the ISO/PAS or ISO/TS is
confirmed, it is reviewed again after a further three years, at which time it must either be transformed into an
International Standard or be withdrawn.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/TS 17574:2009 was prepared by the European Committee for Standardization (CEN) Technical
Committee CEN/TC 278 Road Transport and Traffic Telematics in collaboration with Technical Committee
ISO/TC 204, Intelligent transport systems, in accordance with the Agreement on technical cooperation
between ISO and CEN (Vienna Agreement).
This second edition cancels and replaces the first edition (ISO/TS 17574:2004) which has been technically
revised.
iv © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
Introduction
Electronic Fee Collection (EFC) systems are subject to several ways of fraud both by users and operators but
also from people outside the system. These security threats have to be met by different types of security
measures including security requirements specifications.
It is recommended that EFC operators or national organizations, e.g. highway authorities or transport
ministries, use the guideline provided by this Technical Specification to prepare their own EFC/PP, as security
requirements should be described from the standpoint of the operators and/or operators', organizations.
It should be noted that this Technical Specification is of a more informative than normative nature and it
cannot be used without also using the ISO/IEC 15408 series. Most of the content of this Technical
Specification is an example shown in Annex A on how to prepare the security requirements for EFC
equipment, in this case a DSRC based OBE with an IC-card loaded with crucial data needed for the EFC. The
example refers to a Japanese national EFC system and should only be regarded and used as an example.
After an EFC/PP is prepared, it can be internationally registered by the organization that prepared the EFC/PP
so that other operators or countries that want to develop their EFC system security services can refer to an
already registered EFC/PP.
This EFC related standard on security service framework and EFC/PP is based on the ISO/IEC 15408 series.
ISO/IEC 15408 includes a set of requirements for the security functions and assurance of IT relevant products
and systems. Operators, organizations or authorities defining their own EFC/PP can use these requirements.
This will be similar to the different PPs registered by several financial institutions, e.g. for payment instruments
like IC-cards.
The products and systems that were developed in accordance with ISO/IEC 15408, can be publicly assured
by the authentication of the government or designated private evaluation agencies.
TECHNICAL SPECIFICATION ISO/TS 17574:2009(E)
Electronic fee collection — Guidelines for security protection
profiles
1 Scope
This Technical Specification provides a guideline for preparation and evaluation of security requirements
specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446.
By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that
meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC
system.
This Technical Specification should be read in conjunction with the underlying standards ISO/IEC 15408 and
ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how
to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the
reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as
an example to describe both the structure of the PP as well as the proposed content.
Figure 1 shows how this document fits in the overall picture of EFC security architecture. The shaded boxes
are the aspects mostly related to the preparation of PPs for EFC systems.
Operator’s and user’s domain
Legal and Data
Data protection needs and
institutional protection
objectives
framework awareness
Threats
Reassess
Data protection
policy
Risk analysis
Probabilty
Impact
Data protection
requirements
Evaluate
System domain
Data protection
measures
Application
domain’s
Costs
Audit
requirements
and
constraints
Implementation
Figure 1 — Overall view of security architecture
The main purpose of a PP is to analyse the security environment of a subject and then to specify the
requirements meeting the threats that are the output of the security environment analysis. The subject studied
ISO/TS 17574:2009(E)
is called the target of evaluation (TOE). In this document, an OBE with an ICC is used as an example of the
TOE.
The preparatory work of EFC/PP consists of the steps shown in Figure 2 (in line with the contents described in
Clause 5).
1. Prepare an introduction
2. Prepare a description of the TOE, e.g. an entity or an interface, and state the need
and/or security problem to be addressed.
3. Prepare a description of the Security Environments of the TOE in which the threat
analysis and security policies must be described concretely
4. Prepare Security Objectives giving information on how
and to what extent the security needs are to be met
5. Prepare security functional requirements and assurance requirements using requirements for the
security functions provided in ISO/IEC 15408. The security functional requirements explain what must be
done by the TOE and the environment of the TOE to meet the security objectives. The assurance
requirements explain the degree of confidence expected in the security functions of the TOE
6. Prepare a Rationale in which Security Objectives and
Security Requirements should be checked
Figure 2 — The process of preparing a Protection Profile for EFC equipment
A PP may be registered publicly by the entity preparing the PP in order to make it known and available to
other parties that may use the same PP for their own EFC systems.
By a Security Target (ST) is meant a set of security requirements and specifications to be used as the basis
for evaluation of an identified TOE. While the PP could be looked upon as the EFC operator requirements the
ST could be looked upon as the documentation of a supplier as for the compliance with and fulfilment of the
PP for the TOE, e.g. an OBE.
Figure 3 shows a simplified picture and example of the relationships between the EFC operator, the EFC
equipment supplier and an evaluator. For an international registry organization, i.e. Common Criteria
Recognition Arrangement (CCRA) and current registered PPs, please refer to Annex D.
2 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
International registrar
register applied PP for
OBEs internationally
A toll service provider A toll service provider
National registrar
prepares a PP for OBEs to May register his PP for OBEs to register applied PP
be provided to his customers be provided to his customers for OBEs
Another toll
service provider
An evaluator
An OBE supplier may use the PP for OBEs
to be provided by himself
- evaluates the PP for an OBE
Prepares an ST for his OBEs
- may confirm the ST compliance
with the PP
An OBE supplier
Designs and manufactures
OBEs based on his ST
Figure 3 — Relationships between operators, suppliers and evaluators
The ST is similar to the PP, except that it contains additional implementation-specific information detailing how
the security requirements are realised in a particular product or system. Hence, the ST includes the following
parts not found in a PP:
⎯ a TOE summary specification that presents the TOE-specific security functions and assurance measures;
⎯ an optional PP claims the portion that explains PPs with which the ST is claimed to be conformant (if
any);
⎯ a rationale containing additional evidence establishing that the TOE summary specifications ensure
satisfaction of the implementation-independent requirements, and that claims about PP conformance are
satisfied;
⎯ actual security functions of EFC products will be designed based on this ST; see example in Figure 4.
ISO/TS 17574:2009(E)
Example:
ST for EFC OBE
1. Introduction
2. TOE
3. Security environments
Select requirements of
ISO/IEC
4. Security objectives
security functions and
15408 5. Security requirements
assurance
6. Security specification /
Development method
7. Rationale
Example:
PP for EFC OBE
1. Introduction
2. TOE
3. Security environments
Design/manufacture/manage
4. Security objectives
5. Security requirements
6. Rationale
Authentication /Registration
Application
Authenticated EFC OBE
Application agency
in accordance with PP
Protection profile database
Figure 4 — Example of design based on a PP
TOE for EFC is limited to EFC specific roles and interfaces shown in Figure 5. Since the existing financial
security standards and criteria are applicable to other external roles and interfaces, they are assumed to be
outside the scope of TOE for EFC.
Overall management
of the toll charging
environment
Provision of the Charging of the toll
EFC service
Use of the service
Figure 5 — Scope of TOE for EFC
The security evaluation is performed by assessing the security related properties of roles, entities and
interfaces defined in STs, as opposed to assessing complete processes which often are distributed over more
entities and interfaces than those covered by the TOE of this CEN/ISO Technical Specification.
4 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial
to apply when evaluating the security of a system.
In Annex A, the guideline for preparing EFC/PP is described by using an OBE as an example of EFC products.
The crucial communication link (between the OBE and the RSE) is based on DSRC.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO/IEC 15408-1, Information technology — Security techniques — Evaluation criteria for IT security —
Part 1: Introduction and general model
ISO/IEC 15408-2, Information technology — Security techniques — Evaluation criteria for IT security —
Part 2: Security functional requirements
ISO/IEC 15408-3:2008, Information technology — Security techniques — Evaluation criteria for IT security —
Part 3: Security assurance requirements
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
assurance requirement
security requirements to assure confidence in the implementation of functional requirements
3.2
audit
recognising errors such as illicit systems and/or illicit access and recording and analysing information related
to security relevant activities and events in order to attain proper security control in accordance with security
policy
3.3
availability
dependability with respect to readiness for usage and a measure of correct service delivery based on the
alternation of correct and incorrect service
3.4
Central Communication Unit
part of the central equipment serving as a mobile communication interface to the OBE
3.5
central equipment
system components at fixed centralized locations
NOTE Central equipment is not the same as central system. Central equipment is used in the GNSS/CN based EFC
system.
3.6
certification
action by a third party, demonstrating that adequate confidence be provided that a duly identified product,
process or service is in conformity with a specific standard or other normative document
ISO/TS 17574:2009(E)
3.7
confidentiality
prevention of information leakage to non-authenticated individuals, parties and/or processes
3.8
customer
〈of a toll service provider〉 person or legal entity that uses the service of a toll service provider
NOTE Depending on the local situation the customer may be the owner, lessor, lessee, keeper, (fleet) operator,
holder of the vehicle's registration certificate, driver of the vehicle, or any other third person.
3.9
Evaluation Assurance Level
EAL
assurance levels to evaluate securities for products and systems
3.10
functional requirement
security requirements to determine the security functions, which are required for systems and/or products
3.11
integrity
property that information (data) has (have) not been altered or destroyed in an unauthorized manner
3.12
international registrar
company authorized to register Protection Profiles at an international level
3.13
Key Management
Encryption Key Control
generation, distribution, storage, application and deletion of encryption keys
3.14
On-Board Equipment
OBE
equipment fitted within or on the outside of a vehicle and used for toll purposes
NOTE The OBE does not need to include payment means.
3.15
personalization card
set-up card
IC card to transcribe individual data such as vehicle information into On-Board Equipment
3.16
privacy
right of individuals to control or influence what information related to them may be collected and stored and by
whom and to whom that information may be disclosed
3.17
protection
act of protecting, or the state of being protected
EXAMPLE Preservation from loss, theft, damage or unauthorized access.
3.18
rationale
verification
process determining that a product of each phase of the system life cycle development process fulfils all the
requirements specified in the previous phase
6 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
3.19
reliability
attribute of any system that consistently produces the same results, preferably meeting or exceeding its
specifications
3.20
responsibility
state of being responsible, accountable or answerable, as for an entity, function, system, security service or
obligation
3.21
road side equipment
RSE
equipment located at a fixed position along the road transport network, for the purpose of communication and
data exchanges with the On-Board Equipment of passing vehicles.
3.22
secure application module
SAM
physically, electrically and logically protected module intended to contain algorithm(s), related keys, security
procedures and information to protect an application in such a way that unauthorized access is not possible
3.23
security policy
set of rules that regulate how to cope with security threats or to what degree of security levels should be kept
3.24
security threat
potential action or manner to violate security systems
3.25
security target
ST
set of security requirements and specifications to be used as the basis for evaluation of an identified TOE
3.26
target of evaluation
TOE
information security product or system for the subject of security evaluation
3.27
toll charger
legal entity charging a toll for vehicles in a toll domain
NOTE In other documents the terms operator or toll operator can be used.
3.28
toll service provider
legal entity providing to his customers toll services on one or more toll domains for one or more classes of
vehicle
NOTE 1 In other documents the terms issuer or contract issuer might be used.
NOTE 2 The toll service provider can provide the OBE or might provide only a magnetic card or a smart card to be
used with an OBE provided by a third party (like a mobile telephone and a SIM card can be obtained from different parties).
NOTE 3 The toll service provider is responsible for the operation (functioning) of the OBE.
ISO/TS 17574:2009(E)
3.29
validity
quality or state of being valid; having legal force
4 Abbreviations
⎯ CC Common Criteria
⎯ CCRA Common Criteria Recognition Arrangement
⎯ CN Cellular Networks
⎯ DSRC Dedicated Short Range Communication
⎯ EAL Evaluation Assurance Level
⎯ EFC Electronic Fee Collection
⎯ GNSS Global Navigation Satellite Systems
⎯ HMI Human Machine Interface
⎯ I/F Interface
⎯ ICC Integrated Circuit(s) Card
⎯ IT Information Technology
⎯ OBE On-Board Equipment
⎯ PP Protection Profile
⎯ RSE Road Side Equipment
⎯ SAM Secure Application Module
⎯ SFP Security Function Policy
⎯ SOF Strength of Function
⎯ ST Security Target
⎯ TOE Target of Evaluation
⎯ TSF TOE Security Functions
8 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
5 Outlines of Protection Profile
5.1 Structure
The content of a Protection Profile for a part or interface of an EFC system is shown in Figure 6.
6. Rationale
5. Security
requirements
4. Security
objectives
3. Security
environment
2. Target of
evaluation
1. Introduction
NN EFC
system
Protection
Profile for….
Figure 6 — Content of a Protection Profile
5.2 Context
Guidelines for preparing PP are as follows:
a) Introduction (See Clause A.1).
b) Target of Evaluation (TOE, See Clause A.2).
The scope of the TOE shall be specified.
c) Security environments (See Clause A.3).
Development, operation and control methods of the TOE are described in order to clarify the
working/operation requirements. Regarding these requirements, IT assets, for which the TOE must be
protected, and the security threats to which the TOE is exposed, shall be specified.
d) Security objectives (See Clause A.4).
Security policies for threats to the TOE are determined. The policies are divided into technical policy and
operational/control policy.
Security objectives should be consistent with the operational aim or product purpose of the TOE.
Operational/control policy is defined as personnel and physical objectives in the status for which the TOE is
used or operated. The operational/control policy includes control and operational rules for operators.
e) Security requirements (See Clause A.5).
In accordance with the security objectives defined in Clause A.4, concrete security requirements for security
threats stated in Clause A.3 are specified. The security requirements consist of functional requirements
(technical requirements) and assurance requirements for security quality.
ISO/TS 17574:2009(E)
Functional requirements are provided selecting necessary requirements from ISO/IEC 15408-2 and
determining parameters.
Regarding assurance requirements, assurance requirements designated in ISO/IEC 15408-3 are adopted by
determining evaluation levels for assurance requirements, which are provided in ISO/IEC 15408-2 and
ISO/IEC 15408-3.
f) Rationale of justification/effectiveness (See Clause A.6).
The contents of PP are checked when necessary and cover security requirements for the TOE. The checked
items are as follows:
1) all security environments needed are covered;
2) security objectives should completely meet the security environments;
3) security requirements should implement security objectives.
10 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
Annex A
(informative)
Procedures for preparing documents
A.1 Introduction
A.1.1 General
A general outline of the document for Protection Profile (PP) is described.
It should be noted that this clause is informative in nature. Most of the content is an example on how to
prepare the security requirements for EFC equipment, in this case an OBE with a smart card (ICC) loaded
with crucial data needed for the Electronic Fee Collection.
NOTE The examples are only that and nothing more.
A.1.2 Identification information
Identification information for the document is as follows:
a) document title;
b) version/release number;
c) preparation date;
d) prepared by.
EXAMPLE Identification information:
1) document title: EFC On-Board Equipment Security Protection Profile;
2) reference/version number: 1.0;
3) preparation date: 2002-10-20;
4) prepared by: ABC Association.
A.1.3 Target of evaluation (TOE) description
TOE is identified as follows:
a) product;
b) version/release number;
c) developer.
EXAMPLE TOE description:
1) product: EFC On-Board equipment;
2) version/release number: 1.0;
3) developer: ABC Co., Ltd.
ISO/TS 17574:2009(E)
A.1.4 Accordance with the ISO/IEC 15408 series
The prepared “Protection Profile” in accordance with ISO/IEC 15408 is stated explicitly.
The version and preparation data of referenced ISO/IEC15408 documents are also stated.
EXAMPLE ISO/IEC 15408 conformance statement according to:
⎯ ISO/IEC 15408-1 Second Edition 2005-09-22
⎯ ISO/IEC 15408-2 Third Edition 2008-08-19
⎯ ISO/IEC 15408-3 Third Edition 2008-08-19
A.1.5 Outline of TOE
A.1.5.1 Classification of TOE
EXAMPLE
1.4.1 Classification of TOE
EFC On-Board Equipments
A.1.5.2 TOE functional outline
For users of security “Protection Profile”, the types of device described in “Protection Profile” are described
explicitly to help them determine the application.
EXAMPLE
1.4.2 TOE functional outline (OBE for EFC system)
The functional outline is as follows.
a) EFC function:
1) mutual authentication with IC card;
2) transcription (caching) of IC card data to OBE;
3) encryption of radio communication with RSE;
4) assurance of message integrity;
5) mutual authentication with RSE;
6) storage of secured information (encryption key) used in OBE during EFC transaction.
b) Set-up function:
1) authentication of set-up card;
2) caching of vehicle information from IC card to OBE.
c) HMI function:
1) report of EFC billing results to users;
2) guidance of EFC lane.
12 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
A.1.5.3 Evaluation Assurance Level (EAL)
Evaluation Assurance Levels for objectives are selected. Each EAL defines a package consisting of
assurance components and determines the degree of assurance requirements on security systems. The
justification for the selected EAL is stated.
EXAMPLE
A.1.5.3 EFC OBE (EAL is 5)
OBE functions as equipment for e-Commerce in EFC transactions. The security systems of EFC OBE are vulnerable to
attack under the control of individual users. Therefore, a high assurance level (EAL) will be required for EFC OBE.
A.2 Target of Evaluation (TOE)
A.2.1 TOE objectives and methodology
A.2.1.1 TOE use objectives
The following indicates objectives for TOE use and the type of environment in which it is used.
EXAMPLE EFC members (users) use the EFC system at tollgates by inserting the IC card with EFC member
contract information for settlement. Vehicle information such as an automobile inspection certification is stored in OBE
beforehand. For storing vehicle information, a personalization card for initialization is used. The OBE (TOE), which
reads/writes data to IC cards for set-ups/settlements and transmits/receives data to roadside equipment for toll collection
transactions, protects interface and internal data from external threats.
A.2.1.2 TOE use methodology
a) User preparations:
steps to be taken by users before use of TOE.
b) Operators preparation:
necessary hardware/software and control systems are described when operators operate TOE.
c) Operational procedures:
procedures for operation and maintenance are described.
d) Use procedures:
procedures for users are described.
e) Limitations of use:
limitations of use such as time zones and geographical zones are described.
EXAMPLE
a) User preparations:
Users request an operator to install an OBE and set-up vehicle information such as automobile inspection
certification to OBE. In addition, users receive the ICC with EFC member contract information.
b) Operator preparations:
Operators issue set-up information in response to user’s requests.
ISO/TS 17574:2009(E)
c) Operation procedures:
When users are passing through tollgates, the tolls are billed to the IC cards for settlement with EFC member
contract information, which is inserted in the installed On-Board Equipment with vehicle information. When a
legitimate IC card for settlement is inserted in the OBE with correct vehicle information, the toll fee is calculated in the
communication zone of RSE at tollgates.
For a change or update of EFC member contract information, such, as vehicle information, set-up cards and ICC are
updated (reissued/reregistered).
d) Use procedures:
Users use the EFC system of inserting IC cards with EFC member contract information at tollgates according to the
EFC member contract or OBE manuals.
e) Limitations of use:
In general, 24 h use is available, as long as EFC lanes are open at tollgates.
A.2.2 TOE functions
A.2.2.1 Functions provided by TOE
Functions, which are provided by the TOE, are described. All functions for data transactions, which must be
protected, are listed.
EXAMPLE
a) EFC transactions
1) EFC communication control function;
2) non-secure data record function;
3) HMI input/output control function;
4) IC card insert status detect function;
5) On-Board Equipment self-check function.
b) Security module
1) data storage or protection function;
2) user access control function;
3) authentication function(DSRC, ICC);
4) encryption/decryption function;
5) ICC interface function;
6) EFC transaction interface function;
7) set-up card read function.
A.2.2.2 Functions not provided by TOE
When the TOE function is a part of the functions of an entire system, the scope of the TOE in the whole
system should be shown as in Figure A.1 which shows an example where the OBE is the scope of the TOE.
14 © ISO 2009 – All rights reserved
Provided by
Held by
ISO/TS 17574:2009(E)
EXAMPLE
Used
Toll service
by
provider
On-board
Roadside equipment
Toll charger
equipment
(RSE)
Personali-
(OBE)
zation card
IC card
(ICC)
User
Figure A.1 — An example where the TOE is shown in its context
A.2.2.3 Missing functions
When functions, which usually should be provided by the TOE in this section, are not included in the TOE, the
function contents and reasoning for exclusion should be described.
A.2.3 TOE structure
A.2.3.1 Hardware structure
The structure with related hardware units on TOE operation is described. The scope of TOE in the structure
should be shown as in Figure A.2.
EXAMPLE
Toll service
On-board equipment (OBE)
provider’s
HMI
personalization
card
Communication
control
Modem
ICC
Roadside
interface
RF module
EFC application equipment
User’s
(RSE)
prosessor
IC card (ICC) Antenna
Figure A.2 — An example of TOE hardware structure
A.2.3.2 Software structure
The structure with related software in the operation of the TOE is described. In the structure, the scope of the
TOE in the structure should be stated. Especially, when the operation of the TOE depends on operating
system (OS) and data control programs, the distribution of functions should be described.
DSRC
Operated by
DSRC
Inserted in
ISO/TS 17574:2009(E)
A.2.3.3 Rationale
It should be verified that the described items are consistent.
a) Absence of inconsistent provision items.
b) Absence of undefined or unclear sections of provided contents in this clause.
A.3 Security environment
A.3.1 Operation/operational environment of TOE
A.3.1.1 General
Security requirements to determine security objectives for the TOE operation are provided.
A.3.1.2 Operational environments
The methodology of the use of the TOE such as the operational environment, operational time, operational
site, use procedure and location of use is described. The described contents of A.2.1.2 are described in detail
from the aspect of functionality.
a) Operational procedures
Regarding the operational procedures of the TOE, the operation of an integrated EFC system including the
related vehicles and ICC for payment are described.
b) Operational time
The operational time zone of the TOE is described.
EXAMPLE The operational time is any time that EFC vehicles use on EFC toll roads
c) Operational sites
Operational sites of the TOE are described.
d) Use procedures
The procedures from the purchase (obtain) to the disposal of the TOE by users are described including
installation of the TOE, set-up of the TOE and operation at toll roads.
EXAMPLE:
1) Users purchase EFC OBE at OBE dealers (car dealers, car shops). An OBE is installed in a vehicle. In addition,
the On-Board information needed for the EFC operation such as vehicle information is stored as On-Board
information.
2) After an EFC member contract is established, users get an ICC, which is issued by credit card companies.
3) Users will be able to use the EFC system by inserting an ICC in an OBE installed in a vehicle. The vehicles,
which are capable of using EFC systems, are called EFC vehicles.
4) Users use toll roads with the ICC inserted in an OBE in an EFC vehicle and pass through the tollgates without
stopping.
Users can voluntarily dispose of unnecessary OBE.
16 © ISO 2009 – All rights reserved
ISO/TS 17574:2009(E)
e) Use sites
Sites, where users are able to use TOE, are described.
EXAMPLE Toll roads, along which EFC RSE are installed.
f) Limits and requirements in use such as available numbers of TOE are described.
EXAMPLE
1) The number of OBE installed per vehicle is limited to one.
2) OBE are fixed (built-in) in a vehicle.
3) OBE can be used 24 h a day as long as EFC lanes are open for operation.
A.3.1.3 Physical control
Physical control related to the operation of the TOE is described.
a) Installation sites and control
Installation sites and physical control of the TOE are described.
EXAMPLE OBE is fixed (built-in) in a vehicle.
b) User unit
For use of the TOE, the physical control requirements of ICC for payments, which users possess, is described.
EXAMPLE Users are responsible for their ICC.
A.3.1.4 Personnel requirements
The personnel requirements for the responsibility and confidence of the TOE operations are described. In
addition, the requirements for potential uses, motivations, methods and expertise of attacks are provided.
a) TOE related agents
The following items regarding the manufacturers, operators and users of TOE are stated.
1) Type
2) Role
3) Authorization
4) Reliance
5) Risk of illicit use
6) Expertise
7) Trail
ISO/TS 17574:2009(E)
EXAMPLE Personnel requirements:
Type: Manufacturer of On-Board Equipment.
Role: Manufacturing and shipping based on standard specification of EFC OBE.
Authorization: None.
Reliance: No responsibility for security control.
Risk of illicit use: There are risks of illicit use since the responsibility for security control is absent.
Expertise: No need of expertise for security.
Trail: Negative list check is implemented while EFC vehicles are passing through tollgates.
b) Attackers
The following items are described for illicit user requirements against which countermeasures are taken
by the TOE
1) Type
2) Purpose of illicit use
3) Motivation
4) Means
5) Expertise
EXAMPLE Attackers:
i) Type: Illicit third party among EFC users.
ii) Purpose of illicit use: OBE data forgery, manipulation, obtaining of personal information. Forgery and
illicit modification of OBE medium.
iii) Motivation: To reduce toll fees or avoid toll fee claims by illicit use of information. Sale of forged
OBE.
iv) Means: Forgery of vehicle information on On-Board Equipments. Forgery of I/F data
between OBE and ICC to counterfeit someone’s card. Forgery of EFC OBE by
analysing OBE internally.
v) Expertise: Comprehend the internal transaction by analysing EFC On-Board Equipment
internally.
A.3.1.5 Connectivity/operational environments
The environment for TOE connectivity and operation is provided. Only the structure, which is provided in this
subclause, shall be TOE.
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...