cyris360-framework

Instructions

This gap analysis document provides a simple framework for evaluation the current status of a CSMS according to ISO/SAE21434:2021 standard. The status column is marked by one of the following identifiers:

The evidence shall be provided by the target user, while optional comment maybe added by the target user or the assessor.

Note: Due to the copyright restriction of ISO documents, the following gap assessment shall be used in combination with the ISO/SAE21434:2021 standard.

Part 1: Requirements |

Clause 5: Organizational Cybersecurity Management

Requirement Status (V, P, M, N/A) Evidence Comments
5.4.1 Cybersecurity Governance (RQ-05-01..RQ-05-05)      
5.4.2 Cybersecurity Culture (RQ-05-06..RQ-05-08)      
5.4.3 Information sharing (RQ-05-09..RQ-05-10)      
5.4.4 Management systems (RQ-05-11..RQ-05-13)      
5.4.5 Tool Management (RQ-05-14..RQ-05-15)      
5.4.6 Information security Management (RQ-05-16)      
5.4.7 Organizational Cybersecurity Audit (RQ-05-17)      

Clause 6: Project Dependant Cybersecurity Management

Requirement Status (V, P, M, N/A) Evidence Comments
6.4.1 Cybersecurity responsabilities (RQ-06-01)      
6.4.2 Cybersecurity planning (RQ-06-02..RQ-06-12)      
6.4.3 Tailoring (RQ-06-13..RQ-06-14)      
6.4.4 Reuse (RQ-06-15..RQ-06-17)      
6.4.5 Component out-of-context (RQ-06-18..RQ-06-20)      
6.4.6 Off-the-shelf component (RQ-06-21..RQ-06-22)      
6.4.7 Cybersecurity case (RQ-06-23)      
6.4.8 Cybersecurity assessement (RQ-06-24..RQ-06-32)      
6.4.9 Release for post developement (RQ-06-33..RQ-06-34)      

Clause 7: Distributed Cybersecurity Activities

Requirement Status (V, P, M, N/A) Evidence Comments
7.4.1 Supplier capability (RQ-07-01..RQ-07-02)      
7.4.2 Request for quotation (RQ-07-03)      
7.4.3 Alignement of responsabilities (RQ-07-04..RQ-07-08)      

Clause 8: Continual Cybersecurity Activities

Requirement Status (V, P, M, N/A) Evidence Comments
8.3 Cybersecurity Monitoring (RQ-08-01..RQ-08-03)      
8.4 Cybersecurity event evaluation (RQ-08-04)      
8.5 Vulnerability analysis (RQ-08-05..RQ-08-06)      
8.6 Vulnerability management (RQ-08-07..RQ-08-08)      

Clause 9: Concept

Requirement Status (V, P, M, N/A) Evidence Comments
9.3 Item definition (RQ-09-01..RQ-09-02)      
9.4 Cybersecurity goals (RQ-09-03..RQ-09-07)      
9.5 Cybersecurity concepts (RQ-09-08..RQ-09-11)      

Clause 10: Product Development

Requirement Status (V, P, M, N/A) Evidence Comments
10.4.1 Design (RQ-10-01..RQ-10-08)      
10.4.2 Integration and verification (RQ-10-09..RQ-10-13)      

Clause 11: Cybersecurity Validation

Requirement Status (V, P, M, N/A) Evidence Comments
11 Cybersecurity Validation (RQ-11-01..RQ-11-02)      

Clause 12: Production

Requirement Status (V, P, M, N/A) Evidence Comments
12 Production (RQ-12-01..RQ-12-03)      

Clause 13: Operations and Maintenance

Requirement Status (V, P, M, N/A) Evidence Comments
13.3 Cybersecurity incident response (RQ-13-01..RQ-13-02)      
13.4 Updates (RQ-13-03)      

Clause 14: End of Cybersecurity and Decomissioning

Requirement Status (V, P, M, N/A) Evidence Comments
14.3 End of Cybersecurity support (RQ-14-01)      
14.4 Decomissioning (RQ-14-02)      

Clause 15: Threat Analysis and Risk Assessement Methods

Requirement Status (V, P, M, N/A) Evidence Comments
15.3 Asset identification (RQ-15-01..RQ-15-02)      
15.4 Threat scenarion Identification (RQ-15-03)      
15.5 Impact rating (RQ-15-04..RQ-15-07)      
15.6 Attack path analysis (RQ-15-08..RQ-15-09)      
15.7 Attack feasibility rating (RQ-15-10..RQ-15-14)      
15.8 Risk value determination (RQ-15-15..RQ-15-16)      
15.9 Risk treatment decision (RQ-15-17)      

Part 2: Deliverables

Clause 5: Organizational Cybersecurity Management

Clause 6: Project Dependant Cybersecurity Management

Clause 7: Distributed Cybersecurity Activities

Clause 8: Continual Cybersecurity Activities

Clause 9: Concept

Clause 10: Product Development

Clause 11: Cybersecurity Validation

Clause 12: Production

Clause 13: Operations and Maintenance

Clause 14: End of Cybersecurity and Decomissioning

Clause 15: Threat Analysis and Risk Assessement Methods