Cybersecurity in the UTM context has an expansive scope since it touches cyber-physical systems and covers different domains. The threat modelling template conceptualised by the Secure and Resilient UTM Task Force introduces a way of thinking to address the issues of cyber-security of UTM systems to build a secure-by-default UTM system. In the context of the drone ecosystem, UTM is just one component of the stack, and there are others, e.g. the vehicle itself, the command and control link, the identity and authorization of the flights, etc.

During the work of the Secure and Resilient UTM Task Force, a number of task force GUTMA members presented a short summary showcasing their work and technology that covers the broader offering in the context of cyber-secure systems. In this article, we share this “survey of practices” that will familiarize the reader with the broader work and efforts done by task force members.

This fourth and last article will focus on the contribution of ResilienX.

Scaling Safety-Critical Systems and Software processes to autonomy

While UTM is considered an emerging technology domain, the longstanding processes of risk identification and hazard mitigation are considered ubiquitous in safety driven industries including air traffic management (ATM). While these processes may not adapt and scale directly to autonomy, much can be tailored from structured safety critical system and software engineering approaches.

One key difference for UTM, is that the iterative off-line approach of safety assessment-based processes is insufficient, due to the speed and scale of complexity with autonomous operations, and the myriad systems that support them. 

Introducing the IASMS concept and Associated Elements

Continued progress in the UTM industry has underlined the need for an In-Time Safety Management System (IASMS). IASMS provides a near real-time capability to monitor, assess, and mitigate off-nominal conditions and hazards within the UTM ecosystem. Traditional “human in the loop” methods taken from manned air traffic control systems are not applicable, given the scale and timelines for autonomy.

Figure 1: NASA IASMS Conops

This system concept flows out of emerging technologies such as innovations within UAS themselves, as well as the digital infrastructure that enables autonomy. Robust communications technologies including 5G, navigations infrastructure such as Global Navigation Satellite Systems, surveillance infrastructure such as ground radar, cameras, Automatic Dependent Surveillance – Broadcast, and Remote ID are all considered enabling systems within UTM and referred to as Associated Elements. Additionally, enabling systems within the UTM ecosystem including Supplementary Data Service Providers (SDSPs), Discovery and Synchronization Services (DSSs), and Unmanned Aerial System Service Suppliers (USSs) are also considered Associated Elements. These enabling systems are named as Associated Elements in a memorandum from the FAA[1], requiring these systems to be included in the scope of a safety case for operational approvals, including appropriate error detection, evaluation and mitigation.

Figure 2: Associated Elements

Associated Elements, the enabling systems that support UTM operations, and the unmanned aircraft all constitute the cybersecurity attack surface, and therefore the IASMS concept is in the critical path for UTM cybersecurity risk management.

The difficulty of managing the and mitigating hazards associated with Associated Elements underscores the need for an additional enabling system (e.g an IASMS), that is capable of supporting the configuration of the ecosystem, including the associated elements, along with the UAS and its supporting infrastructure. Management of risk within the ecosystem by an IASMS follows the three pillar approach to risk management, prevalent across international risk management standards; monitoring, assessment, and mitigation.

In-Time Cybersecurity Hazard Management

Figure 3: The ResilienX IASMS – FRAIHMWORK

Based on experience with the FAA, this approach does not come as a surprise to ResilienX. In fact, since 2019, ResilienX has been developing and maturing a product containing the tools and services to meet these requirements. The ResilienX FRAIHMWORK® (Fault Recovery and Isolation, Health Monitoring frameWORK) provides IASMS capability, including the following:

Liveliness Monitoring
– Maintenance Calendar and Tooling
– Data Integrity Monitoring
– Event & Data Recording
– Component & Service Health Monitoring
 
– Alerts via APIs, Visuals, Email, and SMS
– Ecosystem Configuration Management
– Online Maintenance Log & Journal
– System Situational AwarenessMitigation Injections

Assured Information Security (AIS) provides a product, Artemis, which performs bottom-up cybersecurity mitigation. Artemis is capable of automatically scanning digital infrastructure components, running on a variety of operating systems, hardware and software. It monitors these components for appropriate cyber security postures as well as for indicators of compromise. Artemis can validate file, file system, data, and memory integrity in the UTM ecosystem, as well as apply a diverse and effective set of remediation actions.

Figure 4: AIS Artemis Cybersecurity Technology

ResilienX has teamed up with Assured Information Security, a world leader in cybersecurity and information security. With the ResilienX IASMS, FRAIHMWORK integrated with AIS Artemis, the resulting cybersecurity risk management is appropriate as a flexible, dynamic, and effective UTM Cybersecurity and Health and Integrity In-Time Aviation Safety Management System. Because of the flexibility of ResilienX FRAIHMWORK as a top-down IASMS for UTM, the AIS Artemis and ResilienX FRAIHMWORK solution provides combined top-down and bottom-up cyber risk mitigation.

If you want to read the full Secure and Resilient Task Force report, click here and download the document.
GUTMA Task Forces are a Members-only initiative. If you wish to become a GUTMA Member contact us at secretariat@gutma.org or fill in this form.


[1] https://drs.faa.gov/browse/excelExternalWindow/6E844F8BBC0B529286258711005E3865.0001