ISO/PAS 5112 附录A 与21434 WPs的映射关系
Audit questionnaire | Evidence examples |
A.2.1 Cybersecurity management 网络安全管理 | |
Q1.1 Are cybersecurity policy, rules and processes defined? | [WP-05-01] Cybersecurity policy, rules and processes |
Q1.2 Are cybersecurity-relevant processes managed? | [WP-05-01] Cybersecurity policy, rules and processes |
Q1.3 Are cybersecurity culture and cybersecurity awareness established, implemented, and maintained? | [WP-05-02] Evidence of competence management, awareness management and continuous improvement |
Q1.4 Is a process established, implemented, and maintained to manage project dependent cybersecurity? | [WP-06-01] Cybersecurity plan |
A.2.2 Continual cybersecurity activities 持续性网络安全活动 | |
Q2.1 Is a process established, implemented, and maintained to monitor for cybersecurity information? | [WP-08-01] Sources for cybersecurity information |
Q2.2 Is a process established, implemented, and maintained to evaluate cybersecurity events? | [WP-08-04] Weaknesses from cybersecurity events |
Q2.3 Is a process established, implemented, and maintained to identify and analyse vulnerabilities? | [WP-08-05] Vulnerability analysis |
Q2.4 Is a process established, implemented, and maintained to manage identified vulnerabilities? | [WP-08-06] Evidence of managed vulnerabilities |
A.2.3 Risk assessment and methods 风险评估及方法 | |
Q3.1 Are methods established, implemented, and maintained to determine cybersecurity risks for an item across concept, product development and post-development phases? | [WP-15-04] Impact ratings with associated impact categories |
Q3.2 Is a process established, implemented, and maintained to perform a threat analysis and risk assessment (TARA) for an item across concept, product development and post-development phases? | [WP-15-01] Damage scenarios |
Q3.3 Is a process established, implemented, and maintained to treat cybersecurity risks for the item across concept, product development and post-development phases? | [WP-09-04] Cybersecurity claims |
A.2.4 Concept and product development phase 概念及产品开发阶段 | |
Q4.1 Is a process established, implemented, and maintained to define the item and specify cybersecurity requirements? | [WP-09-01] Item definition |
Q4.2 Is a process established, implemented, and maintained for verification of cybersecurity requirements on components during the development phase? | [WP-10-04] Verification report for the cybersecurity specifications |
Q4.3 Is a process established, implemented, and maintained for validation of cybersecurity goals and claims at an item level? | [WP-11-01] Validation report |
A.2.5 Post-development phase 后开发阶段 | |
Q5.1 Is there a process established, implemented, and maintained for release of an item or component for post development phases? | [WP-06-04] Release for post-development report |
Q5.2 Is a process established, implemented, and maintained to apply the cybersecurity requirements for post-development during production? | [WP-12-01] Production control plan |
Q5.3 Is a process established, implemented, and maintained to respond to cybersecurity incidents? | [WP-13-01] Cybersecurity incident response plan |
Q5.4 Is a process established, implemented, and maintained for updates to items or components after production? | Software update management related to cybersecurity Related work products which are required according to ISO/SAE 21434: 2021 from concept and product development phases |
Q5.5 Is a procedure established, implemented, and maintained for communicating end of cybersecurity support? | [WP-14-01] Procedures to communicate the end of cybersecurity support |
Q5.6 Is a procedure established, implemented, and maintained for making available cybersecurity requirements for decommissioning? | Appropriate documentation (e.g. instructions, user manuals) relating to such requirements can enable decommissioning with regard to cybersecurity. |
A.2.6 Distributed cybersecurity activities 分布式网络安全活动 | |
Q6.1 Is a process established, implemented, and maintained to manage dependencies that may exist within the entire, relevant supply chain regarding the cybersecurity management system? | [WP-07-01] Cybersecurity interface agreement Evidence of supplier capabilities |