Domain A to Z Z to A Select All Aerodrome Aircraft ATM/ANS Other available standards Requirements security management systems — Transversal |
Standardisation Activity A to Z Z to A Select All Aeronautical Information System Security (AISS) Framework Guidance Air Traffic Management - Information security for organisations supporting civil aviation operations Air Traffic Management - Specification for software assurance levels Aircraft Data Interface Function (ADIF) Aircraft Ground System Software Reception Airworthiness Security Methods And Considerations Airworthiness Security Methods and Considerations Airworthiness Security Process Specification ATM Security Policy - Guidelines for Implementation ATM Security Risk Management Toolkit - Guidance Material ATM Security Risk Management Toolkit - Guidance Material - Appendices Aviation Industry Standards for Digital Information Security Cabin autonomous system secure interconnection Commercial Aircraft Information Security Concepts of Operation and Process Framework Considerations for Digital Twin Technology and Emerging Standards Counterfeit Electrical, Electronic, and Electromechanical (EEE) Parts; Avoidance, Detection, Mitigation, and Disposition Critical Infrastructure; ICT Metrics for Identification of CI Critical Security Controls for Effective Cyber Defence; Cryptography: Guide to Identity Based Encryption Cyber Physical Systems Security Engineering Plan Cyber Physical Systems Security Hardware Assurance Cyber Physical Systems Software Assurance. Cyber Security for Consumer Internet of Things Cybersecurity for Propulsion Systems Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations Datalink Security Part 1 - ACARS Message Security Design requirements ecosystem Digital signatures: creation and validation (formats, procedures, sign policies) Digital signatures: Cryptographic suites Digital signatures: formats conformance checkers (free access) Digital Signatures: ongoing work (formats, preservation…) Digital Signatures: registered eDelivery services Digital Signatures: registered electronic mail services Digital signatures; Trust Service Providers Supporting Digital Signatures (audit req, conformity assessment, protocols for remote signature creation and validation) Electronic Distribution of Software by Crate (EDS Crate) FAQ Companion Report to ED-203A Fraudulent/Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition - Authorized/Franchised Distribution Fraudulent/Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition - Distributors Gatelink Wireless Security Updates Global Cyber Security Ecosystem Guidance for Aviation Information Security Management Systems Guidance for securing aviation data Guidance for Security Event Logging in an IP Environment Guidance for Security of Loadable Software Parts Using Digital Signatures Guidance for Usage of Digital Certificates Guidance On Security Event Management Guidance on security event management Guidelines for Civil-Military Coordination Information Exchanges Guidelines for the Oversight of Air Traffic Management Security ICT Security Guidance Implementation of the Network and Information Security (NIS) Directive Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 1: Terminology and basic concepts Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 2: Assessment methodology Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 3: Assessment of system functionality Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 4: Assessment of system performance Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 6: Assessment of system operability Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 7: Assessment of system safety Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 8: Assessment of other system properties Information Security Guidance For Continuing Airworthiness Information Security Guidance for Continuing Airworthiness Information security guidance for VTOL and collaborative systems Information Security Indicators Information security, cybersecurity and privacy protection — Information security controls Information security, cybersecurity and privacy protection — Information security management systems — Requirements Information security, cybersecurityand privacy protection — Informationsecurity management systems —Requirements Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018) Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014) Information technology – Security techniques – Information security management systems – Overview and vocabulary Information technology — Security techniques —Vulnerability disclosure Information technology — Securitytechniques — Information security for supplier relationships — Part 3:Guidelines for information andcommunication technology supplychain security Internet Protocol Suite (IPS) for Aeronautical Safety Services Interoperability of Flight Data Processing (Air Traffic Control - Air Traffic Control) for application under the Single European Sky - Interoperability Regulation EC 552/2004 Intersystem Network Integration Manual for National ATM Security Oversight MASPS for AMS(R)S Data and Voice Communications Supporting Required Communications Performance (RCP) and Required Surveillance Performance (RSP) Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures Methods and protocols; Threat, Vulnerability, Risk Analysis Middlebox Security Protocol Minimum Operational Performance Standard (MOPS) for Electronic Flight Bag (EFB) Application mobile networks security; 3G, 4G, 5G MOPS for a Wireless Avionics Intra-Communication System Network Gateway Cyber Defence New Guide for Best Practices, Minimum Requirements, and General Recommendations for Reliable, Cyber Secure, and Upgradable Security Control Systems New Practice for Aircraft Systems Information Security Protection Non-deliverable software requirements Onboard Secure WiFi Network Profile Standard Open Trusted Technology Provider Standard – Mitigating maliciously tainted and counterfeit products – Part 1: Requirements and recommendations Open Trusted Technology Provider Standard – Mitigating maliciously tainted and counterfeit products – Part 2: Assessment procedures for the O-TTPS and ISO/IEC 20243-1:2018 PKI SecurityPolicy Privacy; Attribute-based encryption for Attribute Based Access Control Privacy; Attribute-based encryption for data protection on smart devices, cloud and mobile services Privacy; Identity management and naming schema protection mechanisms Privacy; introductory guide Privacy; Mechanisms for privacy assurance and verification Process management for avionics – Counterfeit prevention – Part 1: Avoiding the use of counterfeit, fraudulent and recycled electronic components Process management for avionics – Counterfeit prevention – Part 2: Managing electronic components from non-franchised sources Process management for avionics – Management plan – Part 1: Preparation and maintenance of an electronic components management plan Process management for avionics – Management plan – Part 2: Preparation and maintenance of an electronic COTS assemblymanagement plan Process Specification for Wireless On-Board Avionics Networks Protection measures for ICT in the context of Critical Infrastructure Protection profile for trustworthy systems supporting time stamping Protection profiles for secure signature creation device - Part 1: Overview Protection profiles for secure signature creation device - Part 2: Device with key generation Protection profiles for secure signature creation device - Part 3: Device with key import Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application Quality Management Systems - Requirements for Aviation, Space, and Defense Organizations - Deliverable Software (Supplement to 9100:2016) Quality Management Systems - Requirements for Aviation, Space, andDefense Organizations - Deliverable Software (Supplement to 9100:2016) Quantum Computing Impact on security of ICT Systems; Quantum-Safe Cryptography Reg ATM/ANS conformity for approval of organisations Reg ATM/ANS conformity for product Reg Cyber Resilience Act Reg NIS 2 Directive Reg PART-IS (AR OR) Reg PART-IS (DOA POA Airports) Reg Resilience of critical entities Requirements for a COTS Assembly Management Plan Requirements for an Electronic Components Management Plan Secure by Default - platform security technology Secure Dialog Service Tech Manual / ConOps / Guidance Securing Non-Safety SATCOM Communications Security and Privacy Controls for Federal Information Systems and Organizations Security Certification and Declaration of ATM ANS Ground Systems Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers Security for industrial automation and control systems - Part 3-2: Security risk assessment and system design Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components Security Management Handbook - A Framework Security requirements for device for authentication - Part 1: Protection profile for core functionality Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application Security requirements for device for authentication - Part 3: Additional functionality for security targets Security Risk Assessment for Aeronautical Comm Security Risk Assessment Methodology for SESAR 2020 (SecRAM 2.0 + corresponding catalogue) Security Services for Aeronautical Communications Security techniques for protecting software in a white box model Specifying a common interface to transfer sensitive functions to a trusted domain. Standard Guide for Credentialing for Access to an Incident or Event Site Standard Guide for Cybersecurity and Cyberattack Mitigation Standards for Processing Aeronautical Data Structured threat information sharing Supplement 1 to ARINC Report 645: Common Terminology and Functions for Software Distribution and Loading Supplement 2 to ARINC Report 645: Common Terminology and Functions forSoftware Distribution and Loading Supplement 2 to ARINC Report 827: Electronic Distribution of Software by Crate (EDS Crate) Supplement 2 to ARINC Report 835: Guidance for Security of Loadable Software Parts Using Digital Signatures Supplement 3 to ARINC REPORT 667: GUIDANCE FOR THE MANAGEMENT OF FIELD LOADABLE SOFTWARE Supply Chain Management Handbook Technical Standard of Aviation Profiles for ATN/IPS Technical Standard of Aviation Profiles for Internet Protocol Suite Techniques for assurance of digital material used in legal proceedings. Zero Trust Architecture |
Reference A to Z Z to A Select All All published work all security work 3G and beyond ARINC 645 Supplement 1 ARINC 645 Supplement 2 ARINC 667 Supplement 3 ARINC 687 ARINC 688 ARINC 811 ARINC 811A ARINC 822B ARINC 823P1 ARINC 827 ARINC 827-2 ARINC 834-8 ARINC 835-1 ARINC 835-2 ARINC 842-1 ARINC 851 ARINC 852 ARINC 858 ARINC 8XX ARINC XXX AS 9115B AS 9125 ASTM E2842-14 ASTM F3286-17 ASTM F3532 - 22 ASTM WK44589 ATA 42 rev 2020.1 CEN/TS 16071 CEN/TS 16501 Doc. 10090 Doc. 10094 Doc. 10095 Doc. Nb. EG 203 310 Ver. 1.1.1 Doc. Nb. TR 103 303 Ver. 1.1.1 Doc. Nb. TR 103 305-1 Ver. 3.1.1 Doc. Nb. TR 103 305-2 Ver. 4.1.2 Doc. Nb. TR 103 305-3 Ver. 2.1.1 Doc. Nb. TR 103 305-4 Ver. 2.1.1 Doc. Nb. TR 103 306 Ver. 1.3.1 Doc. Nb. TR 103 309 Ver. 1.1.1 Doc. Nb. TR 103 331 Ver. 1.1.1 Doc. Nb. TR 103 369 Ver. 1.1.1 Doc. Nb. TR 103 421 Ver. 1.1.1 Doc. Nb. TR 103 456 Ver. 1.1.1 Doc. Nb. TS 102 165-1 Ver. 5.2.3 Doc. Nb. TS 102 165-2 Doc. Nb. TS 103 457 Doc. Nb. TS 103 485 Doc. Nb. TS 103 486 Doc. Nb. TS 103 523-2 Doc.10145 DTR/CYBER-0045 ED-201A ED-202A ED-202B ED-203A ED-203A Change 1 ED-204A ED-204B ED-205A ED-206 ED-206A ED-242C ED-242D ED-246 ED-262 ED-262A ED-273 ED-305 ED-319 ED-76B ED-DSEC-XXX ED-ISMS Edition 1.0, May 2008 Edition 1.0, September 2010 Edition 3.0, December 2016 EN 16495 EN 419211-1 EN 419211-2 EN 419211-3 EN 419211-4 EN 419211-5 EN 419211-6 EN 419251-1 EN 419251-2 EN 419251-3 EN 61069-1 EN 61069-2 EN 61069-3 EN 61069-4 EN 61069-5 EN 61069-6 EN 61069-7 EN 61069-8 EN IEC 62443-4-1:2018 EN ISO/IEC 27000 EN ISO/IEC 27001 EN ISO/IEC 27002 EN ISO/IEC 27037 EN ISO/IEC 27038 EN ISO/IEC 27041 EN ISO/IEC 27042 EN ISO/IEC 27043 ER-XXX EUROCONTROL-GUID-183 FprEN 419231 FprEN IEC 62443-4-2 IEC 62239-1 IEC 62668-1 IEC 62668-2 IEC TS 62239-2 ISO 27000 ISO 27001 ISO 27002 ISO/IEC 20243-1 ISO/IEC 20243-2 ISO/IEC 27036-3 ISO/IEC 29147 ISO/IEC 62443-3-3 JA6678 JA6801 JA7496 NIST IR 8356 NIST SP 800-1207 NIST SP 800-161r1 ongoing work Oversight of ATM prEN 62443-2-4 prEN 62443-3-2 prEN IEC 62443-3-3 prEN ISO/IEC 27000 rev Ref. DTR/CYBER-0024 SAE AIR7368 SAE AS 5553D SAE AS 6081 SAE AS 6496 SAE AS 9115A SAE EIA 993C SAE EIA STD 4899C SCMH 7.19 Cybersecurity Sign format conformance checkers TR 103 305-5 TR 103 370 TR 103 642 TS 103 458 TS 103 523-1 TS 103 523-3 TS 103 532 TS 103 643 TS 103 645 TS 119 312 US NIST 800-53 rev.4 US NIST 800-53 rev.5 |
Standardisation organisation A to Z Z to A Select All .3GPP SA3 ARINC ASTM ASTM F44.50 ATA (now A4E) CEN CEN and CENELEC CENELEC ETSI /TC CYBER ETSI/ISG ISI ETSI/TC ESI EUROCAE EUROCONTROL EUROCONTROL/NATO IAQG ICAO IEC ISO ISO/IEC NIST SAE SAE G-32 Cyber Physical Systems Security SESAR 2020 |
WG/Panel A to Z Z to A Select All WG-106 WG-108 WG-112 SG-3 WG-44 WG-72 WG-72 SG-2 WG-72 SG-3 WG-72 SG-5 WG-72 SG-6 WG-82 WG-96 |
Target date for standard publication A to Z Z to A Select All 2005 2007 2008 2010 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2024 2026 ? April 2014 August 2021 December 2024 February 2022 July 2017 July 2024 June 2023 June 2024 June 2025 March 2025 March 2027 May 2024 May 2025 NA October 2019 October 2022 October 2024 October 2025 October 2026 September 2019 September 2023 September 2025 TBC TBD |
Status standardisation A to Z Z to A Select All Draft Ongoing Published |
Joint activity A to Z Z to A Select All IEC ISO/IEC NATO RTCA / DO-393 RTCA DO-200C RTCA DO-326A RTCA DO-343D RTCA DO-343E RTCA DO-355A RTCA DO-356A RTCA DO-391 RTCA DO-392 RTCA DO-ISMS RTCA SC-216 RTCA SC-216 DO-326B RTCA SC-216 DO-392A RTCA SC-216 DO-xxx RTCA SC-223 RTCA SC-223 DO-379 RTCS SC-236 SC-216 SC-216 DO-355B |
Regulatory activity A to Z Z to A Select All ATM/ANS conformity for approval of organisations ATM/ANS conformity for product Cyber Resilience Act ESCP - Regulatory Processes Work Stream NIS 2 Directive PART-IS (AR OR) PART-IS (DOA POA Airports) Resilience of critical entities Rule Making Task.0648 Special Conditions and AMC/GM for VTOL |
Regulatory organisation A to Z Z to A Select All EASA European Union |
Target date for regulatory material publication A to Z Z to A Select All 2020 2021 2021/4Q 2022 2023 2024 |
Status Regulation A to Z Z to A Select All Ongoing Published |
Cybersecurity Terminology A to Z Z to A Select All x |
Trustworthiness A to Z Z to A Select All x |
Privacy A to Z Z to A Select All x |
Oversight A to Z Z to A Select All x |
Risk Assessment A to Z Z to A Select All x |
Cyber Resilience requirements A to Z Z to A Select All x |
Transorganisational security requirements A to Z Z to A Select All x |
Civil-military interoperability A to Z Z to A Select All x |
Supply chain cyber security A to Z Z to A Select All x |
Maintenance (MRO) security A to Z Z to A Select All x |
Cloud Security A to Z Z to A Select All x |
Development & Production Process Security A to Z Z to A Select All x |
Product Security A to Z Z to A Select All x |
Cybersecurity verification A to Z Z to A Select All x |
Risk and vulnerability management A to Z Z to A Select All x |
Operation security A to Z Z to A Select All x |
Security Incident A to Z Z to A Select All x |
Information sharing A to Z Z to A Select All x |
Referencing A to Z Z to A Select All X Yes |
Comment A to Z Z to A Select All A cross sector Standard for assessing and addressing vulnerabilities of a cyber physical system to ensure security and reslience throghout the lifecyle of the system. A667-3 will include requirements for securely managing operation of dataloaders and handling software Applies to manufacturers and operators. A645-1 includes definition and technical requirements for secure dataloaders. ATM Security Coordination Group, (NEASCOG) Coordinating the discussion about Rule Making Task.0720 (aka "horizontal rule") - AMC Coordinating the discussion about Rule Making Task.0720 (aka "horizontal rule") - Implementing Rule NPA June 2019, Opinion 2Q2020 Details are captured in EASCG RDP (www.eascg.eu). ED-206 ISEM is intended to include vulnerability disclosure programme guidance. ED-206 ISEM is intended to provide aviation-specific VDP guidance and this ISO standards provides good interum guidance. ED-206 on ISEM provides more detailed guidance than F3286-17 and tailloring toward proposed regulation. F3286-17 "Standard Guide for Cybersecurity and Cyberattack Mitigation" by ASTM was published 09-Jul-05. European Standard European Standard - 2017 title: Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015 European Standard - 2017 title: Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) Focus on detention facility cyber security requirements - may have relevance to aerodrome security Information to be completed. Internal S2020 standard MTG16 MTG18 MTG18 Date MTG18: APIM 22-004 has established this activity MTG18: APIM 23-003 states target date of April/October 2026. Item title needs to be amended to Supplement 2 as the updated version of A645-1 MTG18: APIM 23-004 has established this activity MTG18: APIM 23-009 has initiated update to A827 MTG18: Publication MTG19 MTG19 Referencing to the EASA Basic regulation and amending previous regulation (EU) 2018/1139. MTG: APIM 22-003 has established this activity Not directly cyber standard but support ED-203A on establishing an ECMP to avoid counterfeit and other suspect components. Old and more of a process framework, so added for the sake of completeness than for relevance. Special Conditions for VTOL includes requirements for cybersecurity for Enhanced Category VTOL Technical Specification Update of Certification Specifications and AMC to include Cybersecurity objectives and considerations for products. Certification specification CS-25, CS-23, CS-29, CS-27, CS-P, CS-E, CS-ETSO and AMC 2042 NPA 1Q2019 ED 2020/006/R released updating CS-23, CS-25, CS-27, CS-29, CS-E, CS-P, CS-APU, CS-ETSO and Part 21. Issue of AMC 20-42 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Aerodrome | New Guide for Best Practices, Minimum Requirements, and General Recommendations for Reliable, Cyber Secure, and Upgradable Security Control Systems | ASTM WK44589 | ASTM | TBD | Draft | x | x | x | Focus on detention facility cyber security requirements - may have relevance to aerodrome security | ||||||||||||||||||||||
Aircraft | Onboard Secure WiFi Network Profile Standard | ARINC 687 | ARINC | 2021 | Published | x | x | x | |||||||||||||||||||||||
Aircraft | Supply Chain Management Handbook | SCMH 7.19 Cybersecurity | IAQG | June 2023 | Published | x | x | x | x | ||||||||||||||||||||||
Aircraft | Guidance for Security Event Logging in an IP Environment | ARINC 852 | ARINC | 2017 | Published | x | x | x | x | ||||||||||||||||||||||
Aircraft | Information Security Guidance For Continuing Airworthiness | ED-204A | EUROCAE | WG-72 | 2020 | Published | RTCA DO-355A | x | x | x | x | x | x | x | x | ||||||||||||||||
Aircraft | Internet Protocol Suite (IPS) for Aeronautical Safety Services | ARINC 858 | ARINC | 2021 | Published | x | x | x | |||||||||||||||||||||||
Aircraft | Intersystem Network Integration | ARINC 688 | ARINC | 2021 | Published | x | x | x | |||||||||||||||||||||||
Aircraft | Airworthiness Security Methods And Considerations | ED-203A | EUROCAE | WG-72 | 2018 | Published | RTCA DO-356A | x | x | x | x | x | x | x | x | ||||||||||||||||
Aircraft | Rule Making Task.0648 | EASA | 2020 | Published | x | x | x | x | x | x | Update of Certification Specifications and AMC to include Cybersecurity objectives and considerations for products. Certification specification CS-25, CS-23, CS-29, CS-27, CS-P, CS-E, CS-ETSO and AMC 2042 NPA 1Q2019 ED 2020/006/R released updating CS-23, CS-25, CS-27, CS-29, CS-E, CS-P, CS-APU, CS-ETSO and Part 21. Issue of AMC 20-42 | ||||||||||||||||||||
Aircraft | Guidance for Security of Loadable Software Parts Using Digital Signatures | ARINC 835-1 | ARINC | 2014 | Published | x | x | ||||||||||||||||||||||||
Aircraft | MASPS for AMS(R)S Data and Voice Communications Supporting Required Communications Performance (RCP) and Required Surveillance Performance (RSP) | ED-242D | EUROCAE | WG-82 | June 2024 | Draft | RTCA DO-343E | x | x | Details are captured in EASCG RDP (www.eascg.eu). | |||||||||||||||||||||
Aircraft | Aviation Industry Standards for Digital Information Security | ATA 42 rev 2020.1 | ATA (now A4E) | 2020 | Published | x | x | x | |||||||||||||||||||||||
Aircraft | Process management for avionics – Management plan – Part 2: Preparation and maintenance of an electronic COTS assemblymanagement plan | IEC TS 62239-2 | IEC | 2017 | Published | x | Not directly cyber standard but support ED-203A on establishing an ECMP to avoid counterfeit and other suspect components. | ||||||||||||||||||||||||
Aircraft | Process management for avionics – Counterfeit prevention – Part 2: Managing electronic components from non-franchised sources | IEC 62668-2 | IEC | 2019 | Published | x | |||||||||||||||||||||||||
Aircraft | MASPS for AMS(R)S Data and Voice Communications Supporting Required Communications Performance (RCP) and Required Surveillance Performance (RSP) | ED-242C | EUROCAE | WG-82 | 2021 | Published | RTCA DO-343D | x | x | Details are captured in EASCG RDP (www.eascg.eu). | |||||||||||||||||||||
Aircraft | Requirements for a COTS Assembly Management Plan | SAE EIA 993C | SAE | 2020 | Published | x | |||||||||||||||||||||||||
Aircraft | Fraudulent/Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition - Authorized/Franchised Distribution | SAE AS 6496 | SAE | 2014 | Published | x | |||||||||||||||||||||||||
Aircraft | Airworthiness Security Process Specification | ED-202A | EUROCAE | WG-72 | 2014 | Published | RTCA DO-326A | x | x | x | x | ||||||||||||||||||||
Aircraft | Quality Management Systems - Requirements for Aviation, Space, andDefense Organizations - Deliverable Software (Supplement to 9100:2016) | SAE AS 9115A | SAE | 2017 | Published | x | x | ||||||||||||||||||||||||
Aircraft | Non-deliverable software requirements | AS 9125 | SAE | TBD | Draft | x | x | x | |||||||||||||||||||||||
ATM/ANS | Air Traffic Management - Information security for organisations supporting civil aviation operations | EN 16495 | CEN | 2019 | Published | ISO/IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Aircraft | Requirements for an Electronic Components Management Plan | SAE EIA STD 4899C | SAE | 2017 | Published | x | |||||||||||||||||||||||||
Aircraft | Fraudulent/Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition - Distributors | SAE AS 6081 | SAE | 2012 | Published | x | |||||||||||||||||||||||||
ATM/ANS | ICT Security Guidance | Edition 1.0, May 2008 | EUROCONTROL | 2008 | Published | x | x | x | x | x | x | x | |||||||||||||||||||
ATM/ANS | Air Traffic Management - Specification for software assurance levels | CEN/TS 16501 | CEN | 2013 | Published | ISO/IEC | Technical Specification | ||||||||||||||||||||||||
ATM/ANS | Manual for National ATM Security Oversight | Edition 3.0, December 2016 | EUROCONTROL | 2016 | Published | x | x | ||||||||||||||||||||||||
ATM/ANS | Security Risk Assessment Methodology for SESAR 2020 (SecRAM 2.0 + corresponding catalogue) | SESAR 2020 | 2017 | Published | x | x | x | x | x | x | Internal S2020 standard | ||||||||||||||||||||
Transversal | PKI SecurityPolicy | Doc. 10095 | ICAO | 2022 | Draft | Information to be completed. | |||||||||||||||||||||||||
Transversal | Secure Dialog Service Tech Manual / ConOps / Guidance | Doc. 10094 | ICAO | 2022 | Draft | Information to be completed. | |||||||||||||||||||||||||
Transversal | Security and Privacy Controls for Federal Information Systems and Organizations | US NIST 800-53 rev.4 | NIST | 2013 | Published | x | x | x | x | x | x | x | x | x | x | x | x | x | x | x | |||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application | EN 419211-6 | CEN | 2014 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 1: Overview | EN 419211-1 | CEN | 2014 | Published | x | European Standard | ||||||||||||||||||||||||
Other available standards | Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence (ISO/IEC 27042:2015) | EN ISO/IEC 27042 | CEN and CENELEC | 2016 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard | ||||||||||||||||
Transversal | Cyber Physical Systems Software Assurance. | JA6678 | SAE G-32 Cyber Physical Systems Security | 2022 | Draft | x | x | x | x | x | x | x | x | ||||||||||||||||||
Other available standards | Security requirements for device for authentication - Part 1: Protection profile for core functionality | EN 419251-1 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2016) | EN ISO/IEC 27000 | CEN and CENELEC | 2017 | Published | ISO/IEC | x | European Standard | |||||||||||||||||||||||
security management systems — | Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) | EN ISO/IEC 27037 | CEN and CENELEC | 2016 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard | ||||||||||||||||
Other available standards | Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) | EN ISO/IEC 27002 | CEN and CENELEC | 2022 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard - 2017 title: Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015 | ||||||||||||||||
Other available standards | Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels | prEN IEC 62443-3-3 | CENELEC | 2014 | Published | IEC | x | x | x | x | x | European Standard | |||||||||||||||||||
Transversal | ESCP - Regulatory Processes Work Stream | EASA | 2021/4Q | Ongoing | x | x | x | x | x | x | x | x | x | x | x | x | x | Coordinating the discussion about Rule Making Task.0720 (aka "horizontal rule") - Implementing Rule NPA June 2019, Opinion 2Q2020 | |||||||||||||
Transversal | Security Services for Aeronautical Communications | Doc. 10090 | ICAO | 2022 | Draft | Information to be completed. | |||||||||||||||||||||||||
Other available standards | Security for industrial automation and control systems - Part 3-2: Security risk assessment and system design | prEN 62443-3-2 | CENELEC | 2020 | Published | IEC | x | x | x | x | x | European Standard | |||||||||||||||||||
Transversal | Security and Privacy Controls for Federal Information Systems and Organizations | US NIST 800-53 rev.5 | NIST | 2020 | Published | x | x | x | x | x | x | x | x | x | x | x | x | x | x | x | |||||||||||
Other available standards | Protection profile for trustworthy systems supporting time stamping | FprEN 419231 | CEN | 2019 | Ongoing | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 2: Assessment methodology | EN 61069-2 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Requirements | Information technology - Security techniques - Specification for digital redaction (ISO/IEC 27038:2014) | EN ISO/IEC 27038 | CEN and CENELEC | 2016 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard | ||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 1: Terminology and basic concepts | EN 61069-1 | CENELEC | 2016 | Published | IEC | x | European Standard | |||||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 3: Assessment of system functionality | EN 61069-3 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Privacy; Attribute-based encryption for data protection on smart devices, cloud and mobile services | TS 103 458 | ETSI /TC CYBER | 2018 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Privacy; introductory guide | TR 103 370 | ETSI /TC CYBER | 2019 | Published | x | |||||||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 5: Assessment of system dependability | EN 61069-5 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Privacy; Mechanisms for privacy assurance and verification | Doc. Nb. TS 103 485 | ETSI /TC CYBER | 2019 | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Global Cyber Security Ecosystem | Doc. Nb. TR 103 306 Ver. 1.3.1 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Middlebox Security Protocol | Doc. Nb. TS 103 523-2 | ETSI /TC CYBER | 2019 | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Network Gateway Cyber Defence | Doc. Nb. TR 103 421 Ver. 1.1.1 | ETSI /TC CYBER | 2017 | Published | ||||||||||||||||||||||||||
Other available standards | Critical Security Controls for Effective Cyber Defence; | Doc. Nb. TR 103 305-4 Ver. 2.1.1 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Middlebox Security Protocol | TS 103 523-3 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Cryptography: Guide to Identity Based Encryption | DTR/CYBER-0045 | ETSI /TC CYBER | 2020 | Ongoing | x | x | ||||||||||||||||||||||||
Other available standards | Quantum-Safe Cryptography | All published work | ETSI /TC CYBER | 2018 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures | Doc. Nb. TS 102 165-2 | ETSI /TC CYBER | 2019 | Ongoing | x | x | ||||||||||||||||||||||||
Other available standards | Quantum-Safe Cryptography | ongoing work | ETSI /TC CYBER | 2019 | Ongoing | x | x | ||||||||||||||||||||||||
Other available standards | Digital signatures: creation and validation (formats, procedures, sign policies) | All published work | ETSI/TC ESI | 2019 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Cyber Security for Consumer Internet of Things | TS 103 645 | ETSI /TC CYBER | 2019 | Published | x | |||||||||||||||||||||||||
Other available standards | Critical Infrastructure; ICT Metrics for Identification of CI | Ref. DTR/CYBER-0024 | ETSI /TC CYBER | 2020 | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Open Trusted Technology Provider Standard – Mitigating maliciously tainted and counterfeit products – Part 2: Assessment procedures for the O-TTPS and ISO/IEC 20243-1:2018 | ISO/IEC 20243-2 | ISO/IEC | 2018 | Published | IEC | x | x | |||||||||||||||||||||||
Other available standards | Digital Signatures: registered electronic mail services | All published work | ETSI/TC ESI | 2019 | Published | x | |||||||||||||||||||||||||
Other available standards | Digital signatures; Trust Service Providers Supporting Digital Signatures (audit req, conformity assessment, protocols for remote signature creation and validation) | All published work | ETSI/TC ESI | 2019 | Published | x | |||||||||||||||||||||||||
Other available standards | Information technology — Security techniques —Vulnerability disclosure | ISO/IEC 29147 | ISO/IEC | 2020 | Published | IEC | x | ED-206 ISEM is intended to include vulnerability disclosure programme guidance. ED-206 ISEM is intended to provide aviation-specific VDP guidance and this ISO standards provides good interum guidance. | |||||||||||||||||||||||
Other available standards | Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations | NIST SP 800-161r1 | NIST | 2022 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Zero Trust Architecture | NIST SP 800-1207 | NIST | ? | Published | x | x | ||||||||||||||||||||||||
Aircraft | Information security guidance for VTOL and collaborative systems | ED-305 | EUROCAE | WG-112 SG-3 | December 2024 | Draft | x | x | x | x | |||||||||||||||||||||
Aircraft | Commercial Aircraft Information Security Concepts of Operation and Process Framework | ARINC 811 | ARINC | 2005 | Published | x | Old and more of a process framework, so added for the sake of completeness than for relevance. | ||||||||||||||||||||||||
Aircraft | Supplement 2 to ARINC Report 645: Common Terminology and Functions forSoftware Distribution and Loading | ARINC 645 Supplement 2 | ARINC | 2026 | Draft | x | x | x | x | MTG18: APIM 23-003 states target date of April/October 2026. Item title needs to be amended to Supplement 2 as the updated version of A645-1 | |||||||||||||||||||||
Aircraft | Process management for avionics – Counterfeit prevention – Part 1: Avoiding the use of counterfeit, fraudulent and recycled electronic components | IEC 62668-1 | IEC | 2019 | Published | x | |||||||||||||||||||||||||
Aircraft | Datalink Security Part 1 - ACARS Message Security | ARINC 823P1 | ARINC | 2007 | Published | x | |||||||||||||||||||||||||
Aircraft | Aircraft Data Interface Function (ADIF) | ARINC 834-8 | ARINC | 2021 | Published | x | x | x | |||||||||||||||||||||||
Aircraft | Special Conditions and AMC/GM for VTOL | EASA | 2021 | Published | x | x | x | x | x | x | Special Conditions for VTOL includes requirements for cybersecurity for Enhanced Category VTOL | ||||||||||||||||||||
Aircraft | Process management for avionics – Management plan – Part 1: Preparation and maintenance of an electronic components management plan | IEC 62239-1 | IEC | 2018 | Published | x | Not directly cyber standard but support ED-203A on establishing an ECMP to avoid counterfeit and other suspect components. | ||||||||||||||||||||||||
Aircraft | Guidance for Usage of Digital Certificates | ARINC 842-1 | ARINC | 2013 | Published | x | x | x | x | ||||||||||||||||||||||
Aircraft | New Practice for Aircraft Systems Information Security Protection | ASTM F3532 - 22 | ASTM F44.50 | 2022 | Published | x | x | x | x | ||||||||||||||||||||||
ATM/ANS | Security Certification and Declaration of ATM ANS Ground Systems | ED-205A | EUROCAE | WG-72 SG-2 | 2022 | Published | RTCA / DO-393 | x | x | x | x | x | x | x | x | x | |||||||||||||||
ATM/ANS | Interoperability of Flight Data Processing (Air Traffic Control - Air Traffic Control) for application under the Single European Sky - Interoperability Regulation EC 552/2004 | CEN/TS 16071 | CEN | 2010 | Published | ISO/IEC | x | Technical Specification | |||||||||||||||||||||||
Aircraft | Cybersecurity for Propulsion Systems | SAE AIR7368 | SAE | September 2023 | Published | x | x | MTG18: Publication | |||||||||||||||||||||||
Aircraft | Counterfeit Electrical, Electronic, and Electromechanical (EEE) Parts; Avoidance, Detection, Mitigation, and Disposition | SAE AS 5553D | SAE | 2022 | Published | x | |||||||||||||||||||||||||
Transversal | Supplement 3 to ARINC REPORT 667: GUIDANCE FOR THE MANAGEMENT OF FIELD LOADABLE SOFTWARE | ARINC 667 Supplement 3 | ARINC | 2022 | Draft | x | x | x | A667-3 will include requirements for securely managing operation of dataloaders and handling software | ||||||||||||||||||||||
ATM/ANS | ATM Security Policy - Guidelines for Implementation | EUROCONTROL/NATO | 2015 | Published | NATO | x | x | x | ATM Security Coordination Group, (NEASCOG) | ||||||||||||||||||||||
ATM/ANS | ATM Security Risk Management Toolkit - Guidance Material - Appendices | Edition 1.0, September 2010 | EUROCONTROL | 2010 | Published | x | x | x | |||||||||||||||||||||||
ATM/ANS | Security Management Handbook - A Framework | Edition 1.0, May 2008 | EUROCONTROL | 2008 | Published | x | x | x | |||||||||||||||||||||||
ATM/ANS | ATM Security Risk Management Toolkit - Guidance Material | Edition 1.0, September 2010 | EUROCONTROL | 2010 | Published | x | x | x | |||||||||||||||||||||||
Transversal | Supplement 1 to ARINC Report 645: Common Terminology and Functions for Software Distribution and Loading | ARINC 645 Supplement 1 | ARINC | 2021 | Published | x | x | x | x | Applies to manufacturers and operators. A645-1 includes definition and technical requirements for secure dataloaders. | |||||||||||||||||||||
Transversal | Considerations for Digital Twin Technology and Emerging Standards | NIST IR 8356 | NIST | 2021 | Draft | x | x | ||||||||||||||||||||||||
Transversal | Guidance On Security Event Management | ED-206 | EUROCAE | WG-72 | 2022 | Published | RTCA DO-392 | x | x | x | x | x | x | ED-206 on ISEM provides more detailed guidance than F3286-17 and tailloring toward proposed regulation. F3286-17 "Standard Guide for Cybersecurity and Cyberattack Mitigation" by ASTM was published 09-Jul-05. | |||||||||||||||||
Transversal | Electronic Distribution of Software by Crate (EDS Crate) | ARINC 827 | ARINC | 2010 | Published | x | x | x | x | ||||||||||||||||||||||
Transversal | Security Risk Assessment for Aeronautical Comm | Doc.10145 | ICAO | 2022 | Draft | Information to be completed. | |||||||||||||||||||||||||
Transversal | Guidance for Aviation Information Security Management Systems | ED-ISMS | EUROCAE | WG-72 | March 2025 | Draft | RTCA DO-ISMS | x | x | x | x | x | x | x | x | x | x | MTG18 Date | |||||||||||||
Transversal | Cyber Physical Systems Security Hardware Assurance | JA6801 | SAE G-32 Cyber Physical Systems Security | 2022 | Draft | x | x | x | x | x | x | x | x | ||||||||||||||||||
Transversal | Cyber Physical Systems Security Engineering Plan | JA7496 | SAE G-32 Cyber Physical Systems Security | 2022 | Published | x | x | x | x | x | x | x | x | A cross sector Standard for assessing and addressing vulnerabilities of a cyber physical system to ensure security and reslience throghout the lifecyle of the system. | |||||||||||||||||
Other available standards | Standard Guide for Credentialing for Access to an Incident or Event Site | ASTM E2842-14 | ASTM | 2014 | Published | x | x | x | |||||||||||||||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 2: Device with key generation | EN 419211-2 | CEN | 2013 | Published | x | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | mobile networks security; 3G, 4G, 5G | all security work 3G and beyond | .3GPP SA3 | Published | x | x | |||||||||||||||||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 3: Device with key import | EN 419211-3 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Security requirements for device for authentication - Part 3: Additional functionality for security targets | EN 419251-3 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application | EN 419211-4 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements | EN IEC 62443-4-1:2018 | CENELEC | 2018 | Published | IEC | x | x | x | x | x | x | European Standard | ||||||||||||||||||
Other available standards | Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components | FprEN IEC 62443-4-2 | CENELEC | 2019 | Published | IEC | x | x | x | x | x | European Standard | |||||||||||||||||||
Other available standards | Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application | EN 419211-5 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers | prEN 62443-2-4 | CENELEC | 2017 | Published | IEC | x | x | x | x | x | x | European Standard | ||||||||||||||||||
Other available standards | Information security, cybersecurityand privacy protection — Informationsecurity management systems —Requirements | EN ISO/IEC 27001 | CEN and CENELEC | 2022 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard - 2017 title: Information technology - Security techniques - Information security management systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015) | ||||||||||||||||
Other available standards | Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application | EN 419251-2 | CEN | 2013 | Published | x | x | x | x | European Standard | |||||||||||||||||||||
Other available standards | Information technology - Security techniques - Guidance on assuring suitability and adequacy of incident investigative method (ISO/IEC 27041:2015) | EN ISO/IEC 27041 | CEN and CENELEC | 2016 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard | ||||||||||||||||
Other available standards | Information technology - Security techniques - Incident investigation principles and processes (ISO/IEC 27043:2015) | EN ISO/IEC 27043 | CEN and CENELEC | 2016 | Published | ISO/IEC | x | x | x | x | x | x | x | x | European Standard | ||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 8: Assessment of other system properties | EN 61069-8 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Protection measures for ICT in the context of Critical Infrastructure | Doc. Nb. TR 103 303 Ver. 1.1.1 | ETSI /TC CYBER | 2016 | Published | x | |||||||||||||||||||||||||
Other available standards | Privacy; Attribute-based encryption for Attribute Based Access Control | TS 103 532 | ETSI /TC CYBER | 2018 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 6: Assessment of system operability | EN 61069-6 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Critical Security Controls for Effective Cyber Defence; | Doc. Nb. TR 103 305-1 Ver. 3.1.1 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Structured threat information sharing | Doc. Nb. TR 103 331 Ver. 1.1.1 | ETSI /TC CYBER | 2016 | Published | x | |||||||||||||||||||||||||
Other available standards | Security techniques for protecting software in a white box model | TR 103 642 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 7: Assessment of system safety | EN 61069-7 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Quantum Computing Impact on security of ICT Systems; | Doc. Nb. EG 203 310 Ver. 1.1.1 | ETSI /TC CYBER | 2016 | Published | x | |||||||||||||||||||||||||
Other available standards | Implementation of the Network and Information Security (NIS) Directive | Doc. Nb. TR 103 456 Ver. 1.1.1 | ETSI /TC CYBER | 2017 | Published | x | x | x | x | ||||||||||||||||||||||
Other available standards | Specifying a common interface to transfer sensitive functions to a trusted domain. | Doc. Nb. TS 103 457 | ETSI /TC CYBER | 2018 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Secure by Default - platform security technology | Doc. Nb. TR 103 309 Ver. 1.1.1 | ETSI /TC CYBER | 2015 | Published | x | |||||||||||||||||||||||||
Other available standards | Middlebox Security Protocol | TS 103 523-1 | ETSI /TC CYBER | 2019 | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Digital signatures: Cryptographic suites | TS 119 312 | ETSI/TC ESI | 2019 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Privacy; Identity management and naming schema protection mechanisms | Doc. Nb. TS 103 486 | ETSI /TC CYBER | 2019 | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Information Security Indicators | All published work | ETSI/ISG ISI | 2019 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Digital Signatures: ongoing work (formats, preservation…) | ongoing work | ETSI/TC ESI | TBC | Ongoing | x | |||||||||||||||||||||||||
Other available standards | Open Trusted Technology Provider Standard – Mitigating maliciously tainted and counterfeit products – Part 1: Requirements and recommendations | ISO/IEC 20243-1 | ISO/IEC | 2018 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Critical Security Controls for Effective Cyber Defence; | Doc. Nb. TR 103 305-3 Ver. 2.1.1 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Techniques for assurance of digital material used in legal proceedings. | TS 103 643 | ETSI /TC CYBER | 2019 | Ongoing | x | x | ||||||||||||||||||||||||
Transversal | ESCP - Regulatory Processes Work Stream | EASA | 2021/4Q | Ongoing | x | x | x | x | x | x | x | x | x | x | x | x | x | Coordinating the discussion about Rule Making Task.0720 (aka "horizontal rule") - AMC | |||||||||||||
Transversal | Aeronautical Information System Security (AISS) Framework Guidance | ED-201A | EUROCAE | WG-72 | 2021 | Published | RTCA DO-391 | x | x | x | x | x | x | x | x | x | x | x | x | x | |||||||||||
Other available standards | Information technology - Security techniques - Information security management systems - Overview and vocabulary (ISO/IEC 27000:2018) | prEN ISO/IEC 27000 rev | CEN and CENELEC | 2019 | Published | ISO/IEC | x | European Standard | |||||||||||||||||||||||
Transversal | Standard Guide for Cybersecurity and Cyberattack Mitigation | ASTM F3286-17 | ASTM | 2017 | Published | x | |||||||||||||||||||||||||
Other available standards | Industrial-process measurement, control and automation - Evaluation of system properties for the purpose of system assessment - Part 4: Assessment of system performance | EN 61069-4 | CENELEC | 2016 | Published | IEC | x | x | x | x | European Standard | ||||||||||||||||||||
Other available standards | Critical Security Controls for Effective Cyber Defence; | Doc. Nb. TR 103 305-2 Ver. 4.1.2 | ETSI /TC CYBER | 2022 | Published | x | |||||||||||||||||||||||||
Other available standards | Critical Security Controls for Effective Cyber Defence; | TR 103 305-5 | ETSI /TC CYBER | 2018 | Published | x | |||||||||||||||||||||||||
Other available standards | Design requirements ecosystem | Doc. Nb. TR 103 369 Ver. 1.1.1 | ETSI /TC CYBER | 2016 | Published | x | |||||||||||||||||||||||||
Other available standards | Digital Signatures: registered eDelivery services | All published work | ETSI/TC ESI | 2019 | Published | x | |||||||||||||||||||||||||
Other available standards | Methods and protocols; Threat, Vulnerability, Risk Analysis | Doc. Nb. TS 102 165-1 Ver. 5.2.3 | ETSI /TC CYBER | 2017 | Published | x | x | ||||||||||||||||||||||||
Other available standards | Digital signatures: formats conformance checkers (free access) | Sign format conformance checkers | ETSI/TC ESI | NA | Published | ||||||||||||||||||||||||||
Other available standards | Information technology — Securitytechniques — Information security for supplier relationships — Part 3:Guidelines for information andcommunication technology supplychain security | ISO/IEC 27036-3 | ISO/IEC | 2013 | Published | IEC | x | ||||||||||||||||||||||||
Aircraft | Commercial Aircraft Information Security Concepts of Operation and Process Framework | ARINC 811A | ARINC | October 2024 | Draft | x | x | x | MTG18 | ||||||||||||||||||||||
Other available standards | Supplement 2 to ARINC Report 827: Electronic Distribution of Software by Crate (EDS Crate) | ARINC 827-2 | ARINC | October 2025 | Draft | x | x | x | x | MTG18: APIM 23-009 has initiated update to A827 | |||||||||||||||||||||
Aircraft | Supplement 2 to ARINC Report 835: Guidance for Security of Loadable Software Parts Using Digital Signatures | ARINC 835-2 | ARINC | October 2025 | Draft | x | x | ||||||||||||||||||||||||
Aircraft | Securing Non-Safety SATCOM Communications | ARINC XXX | ARINC | October 2026 | Draft | x | x | x | x | x | x | x | x | MTG18: APIM 23-004 has established this activity | |||||||||||||||||
Aircraft | Cabin autonomous system secure interconnection | ARINC 8XX | ARINC | May 2025 | Draft | x | x | x | x | MTG18 | |||||||||||||||||||||
Aircraft | Aircraft Ground System Software Reception | ARINC 851 | ARINC | 2024 | Draft | x | MTG18: APIM 22-004 has established this activity | ||||||||||||||||||||||||
Transversal | Gatelink Wireless Security Updates | ARINC 822B | ARINC | May 2024 | Draft | x | MTG: APIM 22-003 has established this activity | ||||||||||||||||||||||||
Aircraft | Minimum Operational Performance Standard (MOPS) for Electronic Flight Bag (EFB) Application | ED-273 | EUROCAE | WG-106 | August 2021 | Published | x | x | x | MTG18 | |||||||||||||||||||||
Aircraft | Quality Management Systems - Requirements for Aviation, Space, and Defense Organizations - Deliverable Software (Supplement to 9100:2016) | AS 9115B | SAE | Draft | x | x | MTG18 | ||||||||||||||||||||||||
Transversal | Guidance for securing aviation data | ED-DSEC-XXX | EUROCAE | WG-72 SG-5 | June 2025 | Draft | RTCA SC-216 DO-xxx | x | x | x | x | x | x | MTG18 | |||||||||||||||||
Transversal | Guidance on security event management | ED-206A | EUROCAE | WG-72 SG-3 | March 2025 | Draft | RTCA SC-216 DO-392A | x | x | x | x | x | x | MTG18 | |||||||||||||||||
Aircraft | Standards for Processing Aeronautical Data | ED-76B | EUROCAE | WG-44 | July 2024 | Published | RTCA DO-200C | x | x | x | MTG18 | ||||||||||||||||||||
Aircraft | Process Specification for Wireless On-Board Avionics Networks | ED-246 | EUROCAE | WG-96 | July 2017 | Published | x | x | x | x | MTG18 | ||||||||||||||||||||
Transversal | Technical Standard of Aviation Profiles for Internet Protocol Suite | ED-262A | EUROCAE | WG-108 | December 2024 | Draft | RTCA SC-223 | MTG18 | |||||||||||||||||||||||
Transversal | Technical Standard of Aviation Profiles for ATN/IPS | ED-262 | EUROCAE | WG-108 | September 2019 | Published | RTCA SC-223 DO-379 | MTG18 | |||||||||||||||||||||||
Transversal | MOPS for a Wireless Avionics Intra-Communication System | ED-319 | EUROCAE | September 2023 | Draft | RTCS SC-236 | MTG18 | ||||||||||||||||||||||||
Aircraft | FAQ Companion Report to ED-203A | ER-XXX | EUROCAE | WG-72 SG-6 | June 2025 | Draft | SC-216 | x | x | x | x | x | x | x | x | MTG18 | |||||||||||||||
Aircraft | Airworthiness Security Methods and Considerations | ED-203A Change 1 | EUROCAE | WG-72 SG-6 | September 2025 | Draft | RTCA SC-216 | x | x | x | x | x | x | x | x | MTG18 | |||||||||||||||
Aircraft | Information Security Guidance for Continuing Airworthiness | ED-204B | EUROCAE | WG-72 SG-3 | March 2027 | Draft | SC-216 DO-355B | x | x | x | x | x | x | x | x | MTG18 | |||||||||||||||
Aircraft | Airworthiness Security Process Specification | ED-202B | EUROCAE | WG-72 SG-6 | October 2024 | Published | RTCA SC-216 DO-326B | x | x | x | x | MTG18 | |||||||||||||||||||
Other available standards | Information security, cybersecurity and privacy protection — Information security management systems — Requirements | ISO 27001 | ISO | October 2022 | Published | x | |||||||||||||||||||||||||
Other available standards | Information security, cybersecurity and privacy protection — Information security controls | ISO 27002 | ISO | February 2022 | Published | x | |||||||||||||||||||||||||
Other available standards | Information technology – Security techniques – Information security management systems – Overview and vocabulary | ISO 27000 | ISO | October 2019 | Published | x | MTG16 | ||||||||||||||||||||||||
Other available standards | Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels | ISO/IEC 62443-3-3 | ISO | April 2014 | Published | IEC | x | MTG16 | |||||||||||||||||||||||
ATM/ANS | Guidelines for the Oversight of Air Traffic Management Security | Oversight of ATM | EUROCONTROL | 2022 | Published | x | x | x | x | x | Yes | MTG19 | |||||||||||||||||||
ATM/ANS | Guidelines for Civil-Military Coordination Information Exchanges | EUROCONTROL-GUID-183 | EUROCONTROL | 2020 | Published | x | x | x | x | X | MTG19 | ||||||||||||||||||||
Transversal | Reg Cyber Resilience Act | Cyber Resilience Act | European Union | 2024 | Published | x | x | x | |||||||||||||||||||||||
Transversal | Reg NIS 2 Directive | NIS 2 Directive | European Union | 2022 | Published | x | x | x | MTG19 | ||||||||||||||||||||||
Transversal | Reg Resilience of critical entities | Resilience of critical entities | European Union | 2022 | Published | x | x | x | MTG19 | ||||||||||||||||||||||
Transversal | Reg PART-IS (DOA POA Airports) | PART-IS (DOA POA Airports) | European Union | 2022 | Published | x | x | x | x | x | x | x | x | x | x | x | X | MTG19 Referencing to the EASA Basic regulation and amending previous regulation (EU) 2018/1139. | |||||||||||||
Transversal | Reg PART-IS (AR OR) | PART-IS (AR OR) | European Union | 2022 | Published | x | x | x | x | x | x | x | x | x | x | x | X | MTG19 Referencing to the EASA Basic regulation and amending previous regulation (EU) 2018/1139. | |||||||||||||
ATM/ANS | Reg ATM/ANS conformity for product | ATM/ANS conformity for product | European Union | 2023 | Published | x | x | x | x | MTG19 | |||||||||||||||||||||
ATM/ANS | Reg ATM/ANS conformity for approval of organisations | ATM/ANS conformity for approval of organisations | European Union | 2023 | Published | x | x | x | x | x | x | x | MTG19 |