[SystemSafety] IEC 61508 and cybersecurity

Olwen Morgan olwen at phaedsys.com
Thu Sep 19 21:42:48 CEST 2019


On 19/09/2019 15:52, Andrew Banks wrote:
> -<snip>-
> Anyone (Note 1) can join their National Body mirror panel.  The National Body members get to comment and vote at DIS and FDIS.
On the other hand, some of us have come to the conclusion that 
standardisation has become so dysfunctional that it entails fewer risks 
to one's mental health if one simply avoids standards committees. This 
was one of the major reasons why I dropped out of MISRA C participation 
in 2002. And, believe me, this list is no place for me to articulate my 
underwhelmed view of the current state of that standard, which IMO has 
progressed depressingly little from what I effectively handed to MISRA 
on a plate in 1997/8 and subsequently recommended in 2002.
>
>
> But to the nub of the article... I can understand IEC 61508 not wishing to become yet another security standard... there are plenty to choose from already.  In this, I think ISO 26262 got it right (Note 2), by addressing the interaction between safety and security, and emphasising that (cyber)security must be considered, but going no deeper.
>
> Notes:
> 1: subject to a little vetting - but I have never heard of a viable person being refused...
> 2: declaration - I was involved with 26262 but that was someone else's work; I just happen to agree with it
>
>
> -<snip>-

The schism between the safety and security cultures drives me round the 
bend. If safety is (usually) concerned with hazardous events happening 
by accident, then at least part of security is concerned with such 
events happening by malicious intention. They are different sides of the 
same coin. Why we have the schism is therefore beyond me. A two-axis 
classification of accidental/deliberate vs. hazardous/compromising would 
make much more sense IMO.

And it's not as if it actually makes much difference at the programming 
level, because, for both safety and security, it is necessary (though 
not sufficient) that all undefined usage be avoided. Indeed, much of the 
material in the vulnerability classifications that one can find floating 
around in cyberspace reduces to no more than that.

As some on this list know, I dropped out of vulnerabilities standards 
work because I felt it was taking a fundamentally misconceived approach 
- especially in the surreal circumstances in which CSA asked if they 
could submit one of my documents as a Canadian national contribution 
when a (IMO less than entirely stellar) BSI panel were apparently 
non-plussed at the idea of its being a UK contribution - and AFAI am 
aware, though produced in 2008, it's still technically well ahead of 
anything else that WG23 has produced.

Some recidivist cynics have said that one way of judging the BSI 
Vulnerabilities Panel is by looking at who decided NOT to participate in 
it   ...   no names, no pack drill   ...   ;-)


Honestly, it isn't sour grapes. I've just reached the stage where it 
amuses me to extract the micturition of the myopic ...

Olwen




More information about the systemsafety mailing list