We are in an age of near-instantaneous data delivery that is colored by the increasing occurrence and complexity of cyberattacks.
So it is ironic that the air transport and business aviation industry’s necessary but diverse drive for security is preventing the development of processes and procedures that would enable us to work together more efficiently, secure our products more effectively, and make the work of hackers and cyberterrorists a lot more difficult.
This is a challenge for the aviation industry. Two overarching areas are of particular concern:
- We must fundamentally agree on a framework that spells out the shared responsibilities of suppliers, OEMs, and airlines for creating, delivering and maintaining aircraft digital security.
- We must evolve the three determiners of aviation digital security; how we assess risk, how we deliver software updates, and how we ensure software authenticity and integrity.
First, we must have an approved framework for delineating shared responsibilities. Just as OEMs have established responsibilities to demonstrate the safety of the aircraft to the certifying agency, we must follow a similar path so that digital security can respond appropriately in a dynamic environment driven by the speed of connectivity. This framework for shared responsibilities is crucial to address the following issue effectively.
Second, we must evolve the three determiners of aviation digital security. Here is a high-level look at each:
There is no question that the evolution of digital operations is progress. Yet, with this digital evolution, risk is introduced through the use of open systems, especially processes that use connectivity and internet-like connections that can be accessed by others. So this progress brings with it an environment that attracts new and more malicious digital threats. This means we, as an industry, are addressing more risks to secure information exchanges on and off the aircraft.
However, suppliers, OEMs and airlines assess risk differently and have different processes for determining vulnerability. Because there is little commonality among these assessments, the process of determining and agreeing on the level of risk is inefficient and time intensive. As systems become more complex and cyberthreats become more sophisticated, this could lead to increased security vulnerabilities.
Avionics system software may contain millions of lines of code. When this software is updated with new component features or fixes, the recertification is as rigorous as certifying the original software. Further, it can take a substantial amount of time to update all the aircraft in service.
We must become more nimble in delivering software updates in response to current and future threats. There are ways to simplify the recertification process without losing confidence in the integration of updated software. These processes and procedures should be explored in depth.
Software authenticity & integrity
Suppliers of software deliverables need to provide a consistent means for installers to validate their software’s authenticity and integrity; authenticity—ensuring the software comes from the supplier, and integrity—ensuring the software has not been modified since it was created.
Historically, authenticity was assumed and integrity was assured by a simple cyclic redundancy check, methods that don’t hold up in a world of cyberthreats.
Today, digital signatures enable suppliers to ensure their software’s authenticity and integrity, but the usage and application of digital signatures is inconsistent in avionics systems. Chasing different implementations makes it inefficient for OEMs and operators to manage software delivery.
This challenge is especially noteworthy. At MRO Europe in October, Penton Research reported the results of its global Aviation Cybersecurity Study. Respondents from airlines and air cargo operators indicated “digitally signed software for avionics” is among the top four priorities for their company’s cybersecurity investments in the next two years.
Despite these challenges it’s important to note that we are making progress. Industry partners and competitors alike are examining the process for delivering digital security more efficiently through the Digital Signature Working Group and the Aviation Information Sharing and Analysis Center. And just recently, the RTCA program-management committee (’s top technical advisors), approved language making it clear that cybersecurity protections should be part of future standards used industrywide.
This work is welcome because the aviation industry is not convinced that the government is doing everything it can and should do to ensure cybersecurity. The Penton Research Aviation Cybersecurity Study confirmed that just 30% of aviation industry respondents agree that the government is doing enough to support the industry to keep aviation secure.
So while we are making progress, we have more work to do. The air transport and business aviation industry must agree on a framework that clearly spells out specific, shared responsibilities for digital security between suppliers, OEMs and airlines. And we must evolve the three determiners of aviation digital security with “the next generation” of processes and procedures for assessing risk, delivering software updates, and ensuring software authenticity and integrity.
We must get this right. The result will be an aviation industry that works together more efficiently, secures our products more effectively, and makes the work of hackers and cyberterrorists a lot more difficult. This is reason enough for us to embrace these challenges and move forward expeditiously toward solutions that better ensure aircraft digital security in a cyber-connected world.
Kent L. Statler is EVP and COO, Commercial Systems,.