aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorVikas Marwaha <vikasmarwaha@google.com>2017-09-01 22:53:11 +0000
committerandroid-build-merger <android-build-merger@google.com>2017-09-01 22:53:11 +0000
commit6aa06885f0cb3d931a0fe552304f372ac3f3baf4 (patch)
tree6b5d70cc8d08400c5eceec2fa028b1e8ed2f550a
parent5a85283743a6f4677032c9099149d5619b4698fa (diff)
parent9b20c91d337933a1e6aa465ee639bc298c1f32ea (diff)
downloadplatform_compatibility_cdd-6aa06885f0cb3d931a0fe552304f372ac3f3baf4.tar.gz
platform_compatibility_cdd-6aa06885f0cb3d931a0fe552304f372ac3f3baf4.tar.bz2
platform_compatibility_cdd-6aa06885f0cb3d931a0fe552304f372ac3f3baf4.zip
Merge "Docs: Restructure section 9.14." into oc-dev am: bc1609d903
am: 9b20c91d33 Change-Id: I9cc6bcef4a5e1ea4c3fdfc11dc6d801df6dc53f0
-rw-r--r--9_security-model/9_14_automotive-system-isolation.md23
1 files changed, 12 insertions, 11 deletions
diff --git a/9_security-model/9_14_automotive-system-isolation.md b/9_security-model/9_14_automotive-system-isolation.md
index ec790745..a1d5276a 100644
--- a/9_security-model/9_14_automotive-system-isolation.md
+++ b/9_security-model/9_14_automotive-system-isolation.md
@@ -1,15 +1,16 @@
## 9.14\. Automotive Vehicle System Isolation
Android Automotive devices are expected to exchange data with critical vehicle
-subsystems, e.g., by using the [vehicle HAL](http://source.android.com/devices/automotive.html)
-to send and receive messages over vehicle networks such as CAN bus. Android
-Automotive device implementations MUST implement security features below the
-Android framework layers to prevent malicious or unintentional interaction
-between the Android framework or third-party apps and vehicle subsystems. These
-security features are as follows:
+subsystems by using the [vehicle HAL](http://source.android.com/devices/automotive.html)
+to send and receive messages over vehicle networks such as CAN bus.
-* Gatekeeping messages from Android framework vehicle subsystems, e.g.,
- whitelisting permitted message types and message sources.
-* Watchdog against denial of service attacks from the Android framework or
- third-party apps. This guards against malicious software flooding the vehicle
- network with traffic, which may lead to malfunctioning vehicle subsystems.
+The data exchange can be secured by implementing security features below the
+Android framework layers to prevent malicious or unintentional interaction with
+these subsystems. Automotive device implementations:
+
+* [A-0-1] MUST gatekeep messages from Android framework vehicle subsystems,
+e.g., whitelisting permitted message types and message sources.
+* [A-0-2] MUST watchdog against denial of service attacks from the Android
+framework or third-party apps. This guards against malicious software flooding
+the vehicle network with traffic, which may lead to malfunctioning vehicle
+subsystems. \ No newline at end of file