10.6.4.3: Support ITS Object Security

This process shall support communications and system security functions for the ITS Object, including privacy protection functions. This process shall periodically receive a list of known misbehaving devices, applications, or system users; typically in the form of certificate revocation list (CRL). This process shall receive reports of suspicious behavior from other processes internal to the same ITS object in which this process is running. This process shall compare the credentials used on the suspicious incoming message with list of known bad credentials. If the suspicious sender is on the list this process shall inform another process in the ITS object that it should ignore or treat as suspect any incoming data from that sender. If the suspicious sender is not on the list the process shall then send the information concerning the new misbehaving application, device, or user onto the security and credential management system for further processing. It may include firewall, intrusion management, authentication, authorization, profile management, identity management, cryptographic key management. It may include a hardware security module and security management information base.

This process is associated with the ITS Object physical object.

This process Is associated with the following functional objects:

This process Is associated with the following data flows: