Equipment, Systems, and Network Information Security Protection, 67564-67572 [2024-17916]
Download as PDF
67564
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
Unfunded Mandates Act of 1995
Kings-Queens
This rulemaking will not result in the
expenditure by State, local, and tribal
governments, in the aggregate, or by the
private sector, of $100 million or more
in any year and it will not significantly
or uniquely affect small governments.
Therefore, no actions were deemed
necessary under the provisions of the
Unfunded Mandates Reform Act of
1995.
Survey Area
Paperwork Reduction Act
This rulemaking does not impose any
reporting or record-keeping
requirements subject to the Paperwork
Reduction Act.
List of Subjects in 5 CFR Part 532
Accordingly, OPM is proposing to
amend 5 CFR part 532 as follows:
PART 532—PREVAILING RATE
SYSTEMS
Authority: 5 U.S.C. 5343, 5346; § 532.707
also issued under 5 U.S.C. 552.
2. In Appendix D to subpart B, amend
the table by revising the wage area
listing for the State of New York to read
as follows:
■
Appendix D to Subpart B of Part 532—
Nonappropriated Fund Wage and
Survey Areas
*
*
*
*
New York:
Orange
Area of Application. Survey area plus:
New York:
Dutchess
Westchester
*
*
*
*
*
[FR Doc. 2024–18741 Filed 8–20–24; 8:45 am]
BILLING CODE 6325–39–P
Federal Aviation Administration
*
14 CFR Parts 25, 33, and 35
NEW YORK
lotter on DSK11XQN23PROD with PROPOSALS1
Area of Application. Survey area plus:
DEPARTMENT OF TRANSPORTATION
Definitions of Wage Areas and Wage
Area Survey Areas
*
New York:
Niagara
Survey Area
1. The authority citation for part 532
continues to read as follows:
*
Niagara
Orange
■
*
New Jersey:
Essex
Hudson
New York:
Bronx
Nassau
New York
Richmond
Suffolk
New York:
Erie
Genesee
Ohio:
Trumbull
Pennsylvania:
Erie
Office of Personnel Management.
Kayyonne Marston,
Federal Register Liaison.
*
Area of Application. Survey area plus:
Survey Area
Administrative practice and
procedure, Freedom of information,
Government employees, Reporting and
recordkeeping requirements, Wages.
*
New York:
Kings
Queens
Jefferson
[Docket No.: FAA–2024–1398; Notice No.
24–23]
Survey Area
RIN 2120–AL94
New York:
Jefferson
Equipment, Systems, and Network
Information Security Protection
Area of Application. Survey area plus:
AGENCY:
New York:
Albany
Oneida
Onondaga
Ontario
Saratoga
Schenectady
Steuben
VerDate Sep<11>2014
17:00 Aug 20, 2024
Federal Aviation
Administration (FAA), Department of
Transportation (DOT).
ACTION: Notice of proposed rulemaking.
This proposed rulemaking
would impose new design standards to
address cybersecurity threats for
transport category airplanes, engines,
and propellers. The intended effect of
SUMMARY:
Jkt 262001
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
this proposed action is to standardize
the FAA’s criteria for addressing
cybersecurity threats, reducing
certification costs and time while
maintaining the same level of safety
provided by current special conditions.
DATES: Send comments on or before
October 21, 2024.
ADDRESSES: Send comments identified
by docket number FAA–2024–1398
using any of the following methods:
• Federal eRulemaking Portal: Go to
www.regulations.gov and follow the
online instructions for sending your
comments electronically.
• Mail: Send comments to Docket
Operations, M–30; U.S. Department of
Transportation, 1200 New Jersey
Avenue SE, Room W12–140, West
Building Ground Floor, Washington, DC
20590–0001.
• Hand Delivery or Courier: Take
comments to Docket Operations in
Room W12–140 of the West Building
Ground Floor at 1200 New Jersey
Avenue SE, Washington, DC, between 9
a.m. and 5 p.m., Monday through
Friday, except Federal holidays.
• Fax: Fax comments to Docket
Operations at (202) 493–2251.
Privacy: In accordance with 5 U.S.C.
553(c), DOT solicits comments from the
public to better inform its rulemaking
process. DOT posts these comments,
without edit, including any personal
information the commenter provides, to
www.regulations.gov, as described in
the system of records notice (DOT/ALL–
14 FDMS), which can be reviewed at
www.dot.gov/privacy.
Docket: Background documents or
comments received may be read at
www.regulations.gov at any time.
Follow the online instructions for
accessing the docket or go to the Docket
Operations in Room W12–140 of the
West Building Ground Floor at 1200
New Jersey Avenue SE, Washington,
DC, between 9 a.m. and 5 p.m., Monday
through Friday, except Federal holidays.
FOR FURTHER INFORMATION CONTACT: For
technical questions concerning this
action, contact Varun Khanna, AIR–
626D, Policy and Standards Division,
Aircraft Certification Service, Federal
Aviation Administration, 2200 South
216th Street, Des Moines, WA 98198;
telephone (206) 231 3159; email
varun.khanna@faa.gov.
SUPPLEMENTARY INFORMATION:
I. Executive Summary
A. Overview of Proposed Rule
The FAA proposes to add new
regulations to and revise certain existing
regulations in title 14, Code of Federal
Regulations (14 CFR) part 25
E:\FR\FM\21AUP1.SGM
21AUP1
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
(Airworthiness Standards: Transport
Category Airplanes), part 33
(Airworthiness Standards: Aircraft
Engines), and part 35 (Airworthiness
Standards: Propellers). These changes
would introduce type certification and
continued airworthiness requirements
to protect the equipment, systems, and
networks of transport category
airplanes, engines, and propellers
against intentional unauthorized
electronic interactions (IUEI) 1 that
could create safety hazards. Design
approval applicants would be required
to identify, assess, and mitigate such
hazards, and develop Instructions for
Continued Airworthiness (ICA) that
would ensure such protections continue
in service. Proposed changes to parts 25,
33, and 35 would mandate such
protection and apply to applicants for
design approval of transport category
airplanes, engines, and propellers. The
changes would also affect future
operators of these products through the
application of the ICA.
The substance of the proposed rules
would generally reflect current practice
(e.g., special conditions) that the FAA
has used to address product
cybersecurity since 2009. Under the
proposed regulations, the FAA would
continue to apply the same substantive
requirements established by current
special conditions via the same methods
of compliance to new applicable
certification projects; thus, the impact
on applicants and operators would not
be significant. The intended effect of
this action is to reduce the costs and
time necessary to certify new and
changed products and harmonize FAA
regulatory requirements with the
regulations that other civil aviation
authorities are using to address
cybersecurity vulnerability, while
maintaining the level of safety provided
by current Aircraft System Information
Security/Protection (ASISP) special
conditions.
lotter on DSK11XQN23PROD with PROPOSALS1
B. Background
The current trend in airplane design
includes an increasing level of
integration of airplane, engine, and
propeller systems with increased
connectivity to internal or external data
networks and services. Regulators and
industry must constantly monitor the
1 RTCA Glossary page 24: Intentional
Unauthorized Electronic Interaction (IUEI) is
defined, for purposes of this rulemaking, as ‘‘[a]
circumstance or event with the potential to affect
the aircraft due to human action resulting from
unauthorized access, use, disclosure, denial,
disruption, modification, or destruction of
information and/or aircraft system interfaces. Note
that this includes malware and the effects of
external systems, but does not include physical
attacks such as electromagnetic jamming.’’
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
cybersecurity threat environment in
order to identify and mitigate new threat
sources. These designs can introduce or
allow cybersecurity vulnerabilities from
sources such as:
• Field Loadable Software;
• Maintenance laptops;
• Airport or airline gate link
networks;
• Public networks, e.g., internet;
• Wireless aircraft sensors and sensor
networks;
• Cellular networks;
• Universal Serial Bus (USB) devices;
• Satellite communications;
• Portable electronic devices and
portable electronic flight bags (EFBs);
and
• GPS and satellite-based
augmentation system digital data.
The FAA has found its airworthiness
regulations, including §§ 25.1301,
25.1309, 25.1319, 25.1529, 33.28, and
35.23, inadequate and inappropriate to
address the cybersecurity vulnerabilities
caused by increased interconnectivity.
Beginning with the Boeing 787 program,
the FAA has been addressing the need
to protect aircraft systems from the
threat of IUEI. Since then, the FAA has
issued special conditions to address
IUEI in every new transport category
airplane certification project and
relevant design change. A special
condition is a rule that applies to a
particular aircraft, aircraft engine, or
propeller design. The FAA issues
special conditions when the agency’s
airworthiness regulations do not contain
adequate or appropriate safety standards
to address a proposed novel or unusual
design feature. The FAA provides the
public with an opportunity to comment
on proposed special conditions.2
Each set of special conditions
addresses a project-specific novel or
unusual feature of the applicant’s
proposed design. The FAA’s special
conditions addressing cybersecurity on
transport category airplanes have
generally required applicants’ proposed
designs to accomplish three things.
Applicants have been required to:
1. Show that their proposed airplane
designs either provide isolation from or
protection against internal or external
unauthorized access.
2. Show that their designs prevent
inadvertent changes, malicious changes,
and all adverse impacts to the airplane
equipment, systems, and networks
necessary for safe operation.
3. Establish procedures to ensure that
they maintain such cybersecurity
protections.3
2 14
CFR 21.16.
e.g., 88 FR 46953 (July 21, 2023) and 89 FR
3333 (January 18, 2024).
3 See,
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
67565
Applicants have met the first two
criteria using the method of compliance
(MoC) part of the cybersecurity special
condition issue papers. Special
conditions are issued if the existing
applicable airworthiness standards do
not contain adequate or appropriate
safety standards for an aircraft, aircraft
engine, or propeller because of novel or
unusual design features of the product
to be type certificated. Issue papers
provide a structured means for
describing and tracking the resolution of
significant technical, regulatory, and
administrative issues that occur during
a project. The early cybersecurity MoC
followed the positions listed in those
issue papers: the applicants created a
certification plan meeting those
positions, then the FAA approved that
certification plan. After RTCA, Inc.
published its guidance (Document
(DO)–326, DO–355, and DO–356),
industry wanted to use them as a MoC.
After it became evident to the FAA
that this new level of system
interconnectivity would most
appropriately be addressed through a
single set of objective airworthiness
standards, on December 18, 2014, the
Aviation Rulemaking Advisory
Committee (ARAC) accepted a task from
the FAA to provide recommendations
regarding ASISP 4 rulemaking, policy,
and guidance on best practices for
aircraft systems and parts, including
both certification and continued
airworthiness. ASISP refers to the
protection of aircraft from electronic
threats from IUEI. The ARAC created
the ASISP Working Group comprised of
a wide range of domestic and
international industry and government
experts tasked to ensure that the
resulting recommendations considered
relevant design, airworthiness, and
international harmonization. On August
22, 2016, the working group submitted
their report, including unanimous
recommendations, to the ARAC. The
ARAC approved and publicly released
the report during its September 15, 2016
meeting.5
The report contained several
recommendations on the necessity for
ASISP-related rulemaking and guidance,
4 The term ASISP is used to exclude physical
security issues related to individuals who could
gain physical access to aircraft to cause malicious
damage to the aircraft systems (e.g., improper
maintenance procedures, fuel contamination,
cutting wire bundles), which is addressed by other
Federal agencies.
5 See Aviation Rulemaking Advisory Committee
(ARAC) Aircraft System Information Security/
Protection (ASISP) working group to the Federal
Aviation Administration, dated October 22, 2016,
www.faa.gov/regulations_policies/rulemaking/
committees/documents/media/ARACasisp-T120150203R.pdf.
E:\FR\FM\21AUP1.SGM
21AUP1
lotter on DSK11XQN23PROD with PROPOSALS1
67566
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
including specific proposals for rule
language and destination within the
current regulatory framework for both
type certification and continued
airworthiness. This NPRM addresses the
report’s recommendations for the FAA
to conduct rulemaking to add ASISP
requirements to parts 25, 33, and 35 of
title 14.6
In the report, the ASISP Working
Group proposed a regulatory framework
that established a single set of objective
airworthiness standards for all transport
category airplanes. Its structure
provided a clear set of discrete
requirements for applicants to show
compliance. Specific to this proposed
rule, the ASISP Working Group
recommended the following regulatory
text for transport category airplanes:
§ 25.13XX Equipment, Systems, and
Network Security Protection
(a) Airplane equipment, systems, and
networks, considered separately and in
relation to other systems, must be
protected from intentional unauthorized
electronic interactions that may result in
an adverse effect on the safety of the
airplane by showing that the security
risks have been identified, assessed, and
mitigated as necessary.
(b) When required by paragraph (a),
applicants must make available
procedures and instructions for
continued airworthiness to ensure
security protections are maintained.
The ASISP Working Group further
recommended the FAA adopt similar
provisions for engine control systems,
propeller control systems, and to
harmonize the regulatory requirement
between U.S. and international
regulatory authorities.7
On October 5, 2018, Congress enacted
H.R.302—FAA Reauthorization Act of
2018 (the ‘‘Act’’). Section 506 of the Act
requires the FAA to consider revising its
airworthiness certification regulations to
address cybersecurity by protecting
aircraft systems, including engines and
propellers, from unauthorized internal
and external access. The Act further
required the FAA to consider the
recommendations of the ASISP Working
Group discussed above.
Additionally, representatives of the
European Union Aviation Safety Agency
(EASA) participated in the ASISP
Working Group for regulatory
harmonization purposes and have
implemented the recommendations of
the ASISP Working Group to introduce
6 Recommendations
02, 14, and 15, respectively.
Report also contained recommendations for
addressing several other subjects, including
cybersecurity concerns related to rotorcraft and
small airplanes, which are not addressed in this
proposed rulemaking.
7 The
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
cybersecurity provisions into their
relevant certification specifications (CS).
EASA CS prescribe the airworthiness
standards for products certified by the
European Union: CS–25 large
aeroplanes corresponds to 14 CFR part
25 for transport category airplanes, CS–
E for engines corresponds to 14 CFR
part 33, and CS–P for propellers
corresponds to 14 CFR part 35. Like the
FAA, prior to implementing the
recommendations of the ASISP Working
Group, EASA had addressed the
protection of aircraft systems from IUEI
through the issuance of special
conditions.
On February 22, 2019, EASA released
NPA 2019–01, Aircraft Cybersecurity, a
set of proposed amendments to CS–23,
CS–25, CS–27, CS–29, CS–E, CS–ETSO,
CS–P and also release their related
acceptable means of compliance/
guidance material. EASA Decision
2020/006/R ‘‘Aircraft cybersecurity’’
finalized these amendments and their
guidance on July 1, 2020, issuing CS–25
Amendment 25, CS–E Amendment 6,
and CS–P Amendment 2, along with
amendments to CS for other product
types. These amendments introduced
cybersecurity provisions into the
relevant CS, incorporating the
provisions of the existing EASA special
conditions and the ARAC ASISP
recommendations. While EASA also
codified cybersecurity provisions for
other product types such as small
airplanes and rotorcraft, the FAA
proposes no such requirements, as
existing rules in parts 23 (§§ 23.2500,
23.2505, 23.2510), 27 (§§ 27.1301,
27.1309), and 29 (§§ 29.1301, 29.1309)
suffice in these cases.8
Aircraft, engines, and propellers
increasingly incorporate networked
bus 9 architectures susceptible to
cybersecurity threats. These threats have
the potential to affect the airworthiness
of the airplane. These network
architectures require cybersecurity
provisions to address vulnerabilities to
IUEI.10 The FAA currently addresses
transport category airplane security
through the issuance of special
conditions requiring proposed designs
to isolate or protect vulnerable systems
8 The Report primarily recommended that the
FAA undertake policy rather than regulatory
changes to address cybersecurity on small airplanes
and rotorcraft. See, e.g., sections 2.3 and 2.4 of the
Report.
9 A bus is a communication system that transfers
data between components inside a computer, or
between computers.
10 The FAA uses the term ‘‘security’’ in our rules
rather than cybersecurity.
Frm 00004
Fmt 4702
Sfmt 4702
II. Authority for This Rulemaking
The FAA’s authority to issue rules on
aviation safety is found in title 49 of the
United States Code. Subtitle I, section
106 describes the authority of the FAA
Administrator. Subtitle VII, Aviation
Programs, describes in more detail the
scope of the agency’s authority.
This rulemaking is issued under the
authority described in subtitle VII, part
A, subpart III, section 44701, ‘‘General
Requirements.’’ Under that section, the
FAA is charged with prescribing
regulations that promote safe flight of
civil aircraft in air commerce by
prescribing regulations and minimum
standards for the design and
performance of aircraft that the
Administrator finds necessary for safety
in air commerce. This regulation is
within the scope of that authority as it
prescribes new safety standards for the
design and performance of transport
category airplanes, engines, and
propellers.
III. Discussion of the Proposed Rule
C. Statement of the Problem
PO 00000
from unauthorized internal or external
access.
Over time, the FAA has observed that
repeated issuance of project-specific
ASISP special conditions could result in
cybersecurity-related certification
criteria that are neither standardized
between projects nor harmonized
between the FAA and other Civil
Aviation Authorities. These disconnects
increase the certification complexity,
cost, and time for both the applicant and
regulator. This proposed rulemaking
package codifies the substantive
requirements of frequently-issued
cybersecurity special conditions to
address these issues.
A. Protection of Transport Airplanes,
Engines, and Propellers From IUEI
The FAA is proposing to add new
§§ 25.1319, 33.28(n), 35.23(f), and revise
their associated appendices, to protect
against IUEI that may result in adverse
effects on the safety of transport
category airplanes, engines, and
propellers. The proposed rule would
implement ARAC recommendations,
harmonize with the corresponding
EASA CSs, and reduce if not eliminate
the need for the FAA to continue to
issue project-specific special conditions
addressing cybersecurity threats.
The proposed rule would require
applicants to ‘‘protect’’ transport
category airplanes, engines, and
propellers from IUEI that may result in
adverse effects on safety. To provide
such protection for each product,
applicants would be required by
regulation to ‘‘identify and assess’’ the
E:\FR\FM\21AUP1.SGM
21AUP1
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
security risks posed by IUEI, and to
‘‘mitigate’’ those risks as necessary for
safety, functionality, and continued
airworthiness.
• For such identification and
assessment of security risk, the
applicant would be required to perform
a security risk analysis to identify all
threat conditions associated with the
system, architecture, and external or
internal interfaces.
• The FAA would expect such risk
analysis to assess the severity of the
effect of threat conditions on associated
assets (system, architecture, etc.),
consistent with the means of
compliance the applicant has been
using to meet the FAA’s special
conditions on this topic.
• Such assessment would also need
to analyze these vulnerabilities for the
likelihood of exploitation.
• The proposed regulation would
then require each applicant to
‘‘mitigate’’ the vulnerabilities, and the
FAA expects such mitigation would
occur through the applicant’s
installation of single or multilayered
protection mechanisms or process
controls to ensure functional integrity,
i.e., protection.
• Finally, each applicant would be
required to include the procedures
within their instructions for continued
airworthiness necessary to maintain
such protections.11
• Pursuant to 14 CFR 21.21(b),
determinations regarding whether
applicants have sufficiently identified
and mitigated the security risks from
IUEI would be made by the
Administrator.
B. Transport Category Airplane
Protection (Proposed 14 CFR 25.1319)
The requirements of proposed
§ 25.1319 are substantively based on the
ASISP special conditions the FAA has
issued in past transport airplane
certification projects and the
recommendations of the ARAC ASISP
report. The FAA expects applicants
would continue meeting the same
objectives required by the ASISP special
conditions and EASA’s cybersecurity
standards.
The FAA proposes that to adequately
‘‘mitigate the security risks as necessary
for safety, functionality, and continued
airworthiness’’ the applicant would
generally need to show that the design
accomplishes the first two requirements
of the FAA’s ASISP special conditions.
First, that the design protects against
11 Instructions for Continued Airworthiness
contain the instructions and information necessary
for the continued airworthiness of the aircraft,
engine, propeller, parts, and appliances as required
by the applicable Certification Basis.
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
unauthorized access from inside or
outside of the airplane. Second, that the
design prevents malicious changes to,
and adverse impacts on, the airplane
equipment, systems, and networks
required for safe operation.
In addition, certain proposed
regulatory terms merit additional
explanation. The term ‘‘IUEI’’ means a
circumstance or event with the potential
to affect the aircraft due to human
action resulting from unauthorized
access, use, disclosure, denial,
disruption, modification, or destruction
of information and/or aircraft system
interfaces. Note that this definition
includes malware and the effects of
external systems on aircraft systems but
does not include physical attacks or
electromagnetic jamming. The new
regulations would require applicants to
consider the airplane’s equipment,
systems, and networks ‘‘separately and
in relation to other systems.’’ This
language reflects the concern discussed
in the ARAC ASISP report that
cybersecurity threats can propagate from
one system to another.12
The FAA also acknowledges that only
IUEI vulnerabilities that may result in
adverse effects on safety of the airplane
require protection. This condition
would limit the scope of the required
protection to those effects that could
impact the safety and airworthiness of
the aircraft and its operation. For
example, the ARAC ASISP report noted
that, while devices used to process
passenger credit cards may raise
security issues related to passenger
information, means other than
airworthiness regulations would address
such issues unless they also could
impact systems with the potential to
adversely affect the safety of the
airplane.13
The regulatory language used for the
proposed §§ 25.1319, 33.28(n), 35.23(f),
and their associated appendices build
upon these concepts in the same
manner. While EASA chose to adopt the
ARAC’s recommended wording directly,
the FAA formatted the language to
match existing FAA regulations.
C. Engine Control System and Propeller
Control System Protections (Proposed
14 CFR 33.28 and 35.23)
Engine and propeller systems
increasingly incorporate networked bus
architectures susceptible to
cybersecurity threats. These threats have
the potential to affect the airworthiness
of part 25 airplanes. These network
architectures require cybersecurity
provisions to address vulnerabilities
12 Report,
13 Report,
PO 00000
pp. 22, 152, and 182.
pp. 22 and 69.
Frm 00005
Fmt 4702
Sfmt 4702
67567
from IUEI. Engine and propeller
protections against IUEI threats are
important because unmitigated
cyberattacks can adversely affect the
propulsion control functions needed for
safe operation of the aircraft. Such
attacks could also cause data corruption
in crew displays and in health
monitoring parameters used in
operation and maintenance decisions.
To address this need and respond to
the recommendations in the ARAC
ASISP report, the FAA proposes to add
new §§ 33.28(n) ‘‘Engine Control
System’’ and 35.23(f) ‘‘Propeller Control
System’’ sections to parts 33 and 35 of
title 14 respectively. The proposed rule
addresses any engine and propeller
systems installed in airplanes,
equipment, and networks that are
susceptible to IUEI. These systems can
include control functions that modulate
propulsion output, propulsion controls,
monitoring functions that track the
health of the engine’s systems,
communication functions such as data
buses and networks, and auxiliary
equipment such as fuel, lube, or
pneumatic subsystems with embedded
electronics.
Like the part 25 proposed rule, the
proposed engine and propeller rules
would require the applicant to protect
against IUEI that could result in adverse
effects on the safety of the airplane. This
protection is accomplished by
identifying and assessing all security
risks caused by IUEI and then mitigating
the security risks as necessary for safety,
functionality, and continued
airworthiness. The FAA expects that
applicants would assess such risks
using a risk analysis methodology that
identifies all system and network
vulnerabilities, a common industry
practice used to address cybersecurity
threats, and determine which
vulnerabilities require mitigation for
safe operation.
D. Instructions for Continued
Airworthiness
Further, proposed revisions to
appendix H to part 25 and to appendix
A to both parts 33 and 35 would require
applicants to prepare all procedures and
ICA necessary to ensure continued
protection against IEUI. The proposed
changes to the appendices of parts 33
and 35 would require the applicant to
furnish these procedures and ICA to the
first owner of any transport airplane,
engine, or propeller and make them
available to subsequent operators per 14
CFR 21.50(b). Operators must follow
these procedures and instructions to
maintain aircraft, engine, and propellor
security protections.
E:\FR\FM\21AUP1.SGM
21AUP1
67568
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
lotter on DSK11XQN23PROD with PROPOSALS1
The FAA intends that the phrase
‘‘procedures and instructions for
continued airworthiness’’ convey that
maintenance procedures for security
protections extend beyond typical ICA
content. To accomplish these
maintenance procedures, operators
develop an Aircraft Network Security
Program 14 based on the applicant’s
security guidance to ensure
conformance to type design and
continued airworthiness.
The term ‘‘transfer’’ in the proposed
regulation addresses the following
activities. The lifecycle of airplanes,
engines, and propellers involves data
transfers between the onboard and
offboard systems that collect and
analyze data for health monitoring,
trending, and maintenance decisions.
These data transfer and software
reprogramming activities can create
operational vulnerabilities that require
the implementation of safeguards to
maintain airworthiness. The FAA
proposes that these regulations will
address such vulnerabilities.
E. Harmonization
EASA CS–25 prescribes the
airworthiness standards corresponding
to 14 CFR part 25 for products certified
by the European Union. For aircraft
certification in general, where part 25
and CS–25 differ, an applicant must
meet both airworthiness standards if it
desires to obtain both a U.S. type
certificate and the validation of the type
certificate by foreign authorities.
Otherwise, the applicant must obtain
exemptions, equivalent level of safety
findings, special conditions, or the
foreign authority’s equivalent to those as
necessary to meet one standard in lieu
of the other. This proposal harmonizes
the FAA’s parts 25, 33, and 35 ASISP
requirements with those of EASA,
which would benefit manufacturers and
modifiers by providing them a single set
of requirements with which they must
show compliance, thereby reducing the
cost and complexity of certification and
codifying a consistent level of safety.
Unlike the FAA’s proposal, EASA
developed its equivalent regulatory text
to address a broader range of products
aligned with a European Union
Horizontal cybersecurity requirement
imposed across all industries. The
proposed rule would eliminate the need
to issue special conditions during the
certification process in a manner
harmonized with EASA requirements.
This proposed regulatory framework
would establish a set of cybersecurity
airworthiness standards for the
14 See AC 119–1A, Operational Authorization of
Aircraft Network Security Program.
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
certification and continued
airworthiness of transport category
airplanes, engines, and propellers.
These standards align with the
requirements of previously-issued
ASISP special conditions, ARAC
recommendations, and the
corresponding EASA CS. As noted
above, this framework would also have
the benefit of reducing cost and time to
certify new and changed products for
both industry and the FAA.
F. Advisory Material for Proposed
§§ 25.1319, 33.28, and 35.23
Miscellaneous Amendments
The FAA has developed proposed
Advisory Circular (AC) 20–XXX,
‘‘Aircraft Systems Information Security/
Protection (ASISP).’’ This AC would
provide guidance on an acceptable
means, but not the only means, of
showing compliance with proposed
§§ 25.1319, 33.28(n), and 35.23(f). It
refers to the guidance materials that
applicants have been using to show
compliance with commonly issued
special conditions. The FAA has placed
this AC into the docket for comment.
IV. Regulatory Notices and Analyses
Federal agencies consider the impacts
of regulatory actions under a variety of
Executive orders and other
requirements. First, Executive Order
12866 and Executive Order 13563, as
amended by Executive Order 14094
(‘‘Modernizing Regulatory Review’’),
direct that each Federal agency shall
propose or adopt a regulation only upon
a reasoned determination that the
benefits of the intended regulation
justify its costs. Second, the Regulatory
Flexibility Act of 1980 (Pub. L. 96–354)
requires agencies to analyze the
economic impact of regulatory changes
on small entities. Third, the Trade
Agreements Act (Pub. L. 96–39)
prohibits agencies from setting
standards that create unnecessary
obstacles to the foreign commerce of the
United States. Fourth, the Unfunded
Mandates Reform Act of 1995 (Pub. L.
104–4) requires agencies to prepare a
written assessment of the costs, benefits,
and other effects of proposed or final
rules that include a Federal mandate
that may result in the expenditure by
State, local, or Tribal governments, in
the aggregate, or by the private sector, of
$100 million or more (adjusted annually
for inflation) in any one year. The
current threshold after adjustment for
inflation is $183 million using the most
current (2023) Implicit Price Deflator for
the Gross Domestic Product. This
portion of the preamble presents the
FAA’s analysis of the economic impacts
of this proposed rule.
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
In conducting these analyses, the FAA
has determined that this proposed rule
(1) would have benefits that justify its
costs, (2) is not a ‘‘significant regulatory
action’’ as defined in section 3(f) of
Executive Order 12866, as amended; (3)
would not have a significant economic
impact on a substantial number of small
entities; (4) would not create
unnecessary obstacles to the foreign
commerce of the United States; and (5)
would not impose an unfunded
mandate on State, local, or Tribal
governments, or on the private sector by
exceeding the threshold identified
above.
A. Regulatory Evaluation
The intended effects of this proposal
would be to (1) incorporate the
substance of the requirements contained
in commonly issued ASISP special
conditions, (2) reduce the cost and time
necessary to certify new and changed
products for both industry and the FAA;
(3) harmonize FAA regulations with
EASA cybersecurity CS; and (4) address
ARAC recommendations. Subsequently,
this proposal would create a cost
savings for the FAA and the applicant
by eliminating the need to continue
issuing similar ASISP special
conditions.
Aircraft, engines, and propellers
increasingly incorporate networked bus
architectures susceptible to
cybersecurity threats. These threats have
the potential to affect the airworthiness
of the airplane. These network
architectures require cybersecurity
provisions to address vulnerabilities to
IUEI.
The proposed rule may affect all five
U.S. entities manufacturing transport
category airplanes, four entities
manufacturing engines for transport
category airplanes, and four entities
manufacturing propellers. Additionally,
operators could have modifiers retrofit
legacy airplanes with systems that
would require cybersecurity provisions.
The proposed changes to parts 25, 33,
and 35 would apply to applicants for
design approval of transport category
airplanes, engines, and propellers.
Under the proposed rule, the FAA
would apply the requirements currently
contained in the ASISP special
conditions. This action would reduce
the costs and time to certify new and
changed products while maintaining the
level of safety provided by current
ASISP special conditions.
Type certification of engines and
propellers against cybersecurity threats
has not required the issuance of special
conditions. An issue paper provided to
applicants describes an acceptable
means of compliance for existing
E:\FR\FM\21AUP1.SGM
21AUP1
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
§§ 33.28, 33.75, 35.15, and 35.23 rules
for these systems. The MoC contains
FAA-accepted industry standards for
protection against cybersecurity
threats.15 This proposal would codify
the requirements for engine control
systems and propeller control systems
in §§ 33.28(n) and 35.23(f), respectively.
Appendix A of these parts would
contain the requirements for the
applicant to develop procedures and
ICA.
The FAA estimated the cost savings
from eliminating ASISP special
conditions over a ten-year period. The
FAA assumes that, in absence of this
proposed rule,16 an equivalent number
of special conditions processed from
2013 to 2022 would occur in the next
ten years. The FAA processed and
issued a total of 68 special conditions
for cybersecurity from 2013 through
2022.
The FAA estimates, it would take
about 170 hours of FAA’s time to
process a special condition application
of average complexity. The FAA
acknowledges that special conditions
can vary in complexity. However, for
purposes of this analysis, the FAA
estimates its time savings from the
elimination of ASISP special conditions
to average about 170 hours. Multiplying
the forecast for special conditions
processed annually by processing time
provides an estimate for the total time
savings from the elimination of
cybersecurity special conditions for the
FAA over a ten-year period.
The process of issuing special
conditions involves engineers, technical
writers, and managers, and its cost
averages $13,498 per special condition.
To calculate the cost savings from
reducing the number of special
conditions, the FAA multiplied the
forecast for the number of special
conditions issued by its corresponding
processing cost.
In summary, over a 10-year period of
analysis, this proposal would result in
a present value of cost savings for the
FAA of about $783,366 at a three
percent discount rate with an
annualized cost savings of about
$91,834. Applying a seven percent
discount rate would result in a present
value cost savings of about $645,584
with an annualized net cost savings of
$91,916.
The cost savings above does not
include the applicants for type
certificates for transport category
airplanes that would result from the
elimination of the need to issue ASISP
special conditions due to a lack of
information. The FAA requests
information for this group of applicants,
along with supporting data, for the
estimated time and cost savings.
B. Regulatory Flexibility Act
The Regulatory Flexibility Act (RFA)
of 1980, (5 U.S.C. 601–612), as amended
by the Small Business Regulatory
Enforcement Fairness Act of 1996 (Pub.
L. 104–121) and the Small Business Jobs
Act of 2010 (Pub. L. 111–240), requires
Federal agencies to consider the effects
of the regulatory action on small
business and other small entities and to
minimize any significant economic
impact. The term ‘‘small entities’’
comprises small businesses and not-forprofit organizations that are
independently owned and operated and
are not dominant in their fields, and
governmental jurisdictions with
populations of less than 50,000.
The FAA is publishing this Initial
Regulatory Flexibility Analysis (IRFA)
to aid the public in commenting on the
potential impacts on small entities from
this proposal. The FAA invites
interested parties to submit data and
67569
information regarding the potential
economic impact that would result from
the proposal. The FAA will consider
comments when making a
determination or when completing a
Final Regulatory Flexibility Assessment.
An IRFA must contain the following:
(1) A description of the reasons why
the action by the FAA is being
considered;
(2) A succinct statement of the
objective of, and legal basis for, the
proposed rule;
(3) A description of, and where
feasible, an estimate of the number of
small entities to which the proposed
rule would apply;
(4) A description of the projected
reporting, recordkeeping, and other
compliance requirements of the
proposed rule, including an estimate of
the classes of small entities that would
be subject to the requirement and the
type of professional skills necessary for
the preparation of the report or record;
(5) An identification, to the extent
practicable, of all relevant Federal rules
that may duplicate, overlap, or conflict
with the proposed rule; and
(6) A description of any significant
alternatives to the proposed rule which
accomplish the stated objectives of
applicable statutes, and which minimize
any significant economic impact of the
proposed rule on small entities.
Currently, five entities in the United
States manufacture transport category
airplanes, four entities manufacture
engines for transport category airplanes,
and four entities manufacture
propellers. The table below provides the
North American Industrial
Classification System (NAICS) codes for
manufacturing aircraft, aircraft engines,
and aircraft propellers, along with the
size standard in terms of number of
employees established by the Small
Business Administration.17
lotter on DSK11XQN23PROD with PROPOSALS1
TABLE 1
Size standard
(employees)
NAICS Code
Description
336411 .........
336412 .........
336413 .........
Aircraft Manufacturing .........................................................................................................................................
Aircraft Engine and Engine Parts Manufacturing ...............................................................................................
Other Aircraft Parts and Auxiliary Equipment Manufacturing .............................................................................
1,500
1,500
1,250
Based on the Small Business
Administration (SBA) size standard for
NAICS Code 336411 Aircraft
Manufacturing, and NAICS Code
336412 Aircraft Engine and Engine Parts
Manufacturing, the five transport
category airplane manufacturers and
four transport airplane engine
manufacturers are not classified as
small.
Of the four U.S. manufacturers of
propellers (NAICS code 336413), only
15 For example, cybersecurity standards that have
been passed by RTCA and the European
Organization for Civil Aviation Equipment
(EUROCAE) are an FAA-accepted Means of
Compliance.
16 The FAA acknowledges that upon finalization
of this proposed rule cybersecurity special
conditions may still be required on occasion.
17 Small Business Administration, Table of Small
Business Size Standards Matched to NAICS Codes.
Effective March 17, 2023. www.sba.gov/document/
support--table-size-standards.
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
E:\FR\FM\21AUP1.SGM
21AUP1
67570
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
one had published data for their number
of employees. The entity with published
data is not categorized as small by SBA
standards. The FAA does not know how
many people the three remaining
propeller manufacturers employ.
Therefore, the FAA does not know
whether these three remaining
manufacturers are small entities.
This proposed rulemaking would
standardize the FAA’s criteria for
addressing cybersecurity threats for
transport category airplanes, engines,
and propellers to reduce certification
costs and time while maintaining the
same level of safety provided by current
special conditions. Therefore, it results
in cost savings for the industry. The
FAA welcomes comments on this
analysis.
C. International Trade Impact
Assessment
The Trade Agreements Act of 1979
(Pub. L. 96–39), as amended by the
Uruguay Round Agreements Act (Pub.
L. 103–465), prohibits Federal agencies
from establishing standards or engaging
in related activities that create
unnecessary obstacles to the foreign
commerce of the United States.
Pursuant to these Acts, the
establishment of standards is not
considered an unnecessary obstacle to
the foreign commerce of the United
States, so long as the standard has a
legitimate domestic objective, such as
the protection of safety, and does not
operate in a manner that excludes
imports that meet this objective. The
statute also requires consideration of
international standards and, where
appropriate, that they be the basis for
U.S. standards.
The FAA has assessed the potential
effect of this proposed rule and
determined that its objective is to
promote the safety of the American
public and does not exclude imports
that meet this objective. As a result, the
FAA does not consider this proposed
rule as creating an unnecessary obstacle
to foreign commerce.
lotter on DSK11XQN23PROD with PROPOSALS1
D. Unfunded Mandates Assessment
The Unfunded Mandates Reform Act
of 1995 (2 U.S.C. 1531–1538) governs
the issuance of Federal regulations that
require unfunded mandates. An
unfunded mandate is a regulation that
requires a State, local, or Tribal
government or the private sector to
incur direct costs without the Federal
Government having first provided the
funds to pay those costs. The FAA
determined that the proposed rule
would not result in the expenditure of
$183 million or more by State, local, or
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
Tribal governments, in the aggregate, or
the private sector, in any one year.
E. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(44 U.S.C. 3507(d)) requires that the
FAA consider the impact of paperwork
and other information collection
burdens imposed on the public. The
FAA has determined that there would
be no new requirement for information
collection associated with this proposed
rule.
F. International Compatibility
In keeping with U.S. obligations
under the Convention on International
Civil Aviation, it is FAA policy to
conform to International Civil Aviation
Organization (ICAO) Standards and
Recommended Practices to the
maximum extent practicable. The FAA
has reviewed the corresponding ICAO
Standards and Recommended Practices
and has identified no differences with
these proposed regulations.
G. Environmental Analysis
FAA Order 1050.1F identifies FAA
actions that are categorically excluded
from the preparation of an
environmental assessment or
environmental impact statement under
the National Environmental Policy Act
(NEPA) in the absence of extraordinary
circumstances. The FAA has
determined this proposed rulemaking
action qualifies for the categorical
exclusion identified in paragraph 5–6.6f
for regulations and involves no
extraordinary circumstances.
V. Executive Order Determinations
A. Executive Order 13132, Federalism
The FAA has analyzed this proposed
rule under the principles and criteria of
Executive Order (E.O.) 13132,
Federalism. The FAA has determined
that this proposed action would not
have a substantial direct effect on the
States, the relationship between the
Federal Government and the States, or
the distribution of power and
responsibilities among the various
levels of government, and, therefore,
would not have federalism implications.
B. Executive Order 13175, Consultation
and Coordination With Indian Tribal
Governments
Consistent with Executive Order
13175, Consultation and Coordination
with Indian Tribal Governments,18 and
FAA Order 1210.20, American Indian
and Alaska Native Tribal Consultation
18 65
PO 00000
FR 67249 (November 6, 2000).
Frm 00008
Fmt 4702
Sfmt 4702
Policy and Procedures,19 the FAA
ensures that Federally Recognized
Tribes (Tribes) are given the opportunity
to provide meaningful and timely input
regarding proposed Federal actions that
have the potential to affect uniquely or
significantly their respective Tribes. At
this point, the FAA has not identified
any unique or significant effects,
environmental or otherwise, on tribes
resulting from this proposed rule.
C. Executive Order 13211, Regulations
That Significantly Affect Energy Supply,
Distribution, or Use
The FAA analyzed this proposed rule
under E.O. 13211, Actions Concerning
Regulations that Significantly Affect
Energy Supply, Distribution, or Use
(May 18, 2001). The FAA has
determined that it would not be a
‘‘significant energy action’’ under the
Executive order and would not be likely
to have a significant adverse effect on
the supply, distribution, or use of
energy.
D. Executive Order 13609, Promoting
International Regulatory Cooperation
Executive Order 13609, Promoting
International Regulatory Cooperation,
promotes international regulatory
cooperation to meet shared challenges
involving health, safety, labor, security,
environmental, and other issues and
reduce, eliminate, or prevent
unnecessary differences in regulatory
requirements. The FAA has analyzed
this proposed action under the policy
and agency responsibilities of E.O.
13609. The FAA has determined that
this proposed action would eliminate
differences between U.S. aviation
standards and those of other civil
aviation authorities.
VI. Additional Information
A. Comments Invited
The FAA invites interested persons to
participate in this rulemaking by
submitting written comments, data, or
views. The FAA also invites comments
relating to the economic, environmental,
energy, or federalism impacts that might
result from adopting the proposal in this
document. The most helpful comments
reference a specific portion of the
proposal, explain the reason for any
recommended change, and include
supporting data. To ensure the docket
does not contain duplicate comments,
commenters should submit only one
time if comments are filed
electronically, or commenters should
send only one copy of written
19 See FAA Order No. 1210.20, dated January 28,
2004, https://www.faa.gov/documentLibrary/media/
1210.pdf.
E:\FR\FM\21AUP1.SGM
21AUP1
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
comments if comments are filed in
writing.
The FAA will file in the docket all
comments it receives, as well as a report
summarizing each substantive public
contact with FAA personnel concerning
this proposed rulemaking. Before acting
on this proposal, the FAA will consider
all comments it receives on or before the
closing date for comments. The FAA
will consider comments filed after the
comment period has closed if it is
possible to do so without incurring
expense or delay. The FAA may change
this proposal in light of the comments
it receives.
lotter on DSK11XQN23PROD with PROPOSALS1
B. Confidential Business Information
Confidential Business Information
(CBI) is commercial or financial
information that is both customarily and
actually treated as private by its owner.
Under the Freedom of Information Act
(FOIA) (5 U.S.C. 552), CBI is exempt
from public disclosure. If your
comments responsive to this NPRM
contain commercial or financial
information that is customarily treated
as private, that you actually treat as
private, and that is relevant or
responsive to this NPRM, it is important
that you clearly designate the submitted
comments as CBI. Please mark each
page of your submission containing CBI
as ‘‘PROPIN.’’ The FAA will treat such
marked submissions as confidential
under the FOIA, and they will not be
placed in the public docket of this
NPRM. Submissions containing CBI
should be sent to the person in the FOR
FURTHER INFORMATION CONTACT section of
this document. Any commentary that
the FAA receives that is not specifically
designated as CBI will be placed in the
public docket for this rulemaking.
C. Electronic Access and Filing
A copy of this NPRM, all comments
received, any final rule, and all
background material may be viewed
online at www.regulations.gov using the
docket number listed above. A copy of
this proposed rule will be placed in the
docket. Electronic retrieval help and
guidelines are available on the website.
It is available 24 hours a day, 365 days
a year. An electronic copy of this
document may also be downloaded
from the Office of the Federal Register’s
website at www.federalregister.gov and
the Government Publishing Office’s
website at www.govinfo.gov. A copy
may also be found at the FAA’s
Regulations and Policies website at
www.faa.gov/regulations_policies.
Copies may also be obtained by
sending a request to the Federal
Aviation Administration, Office of
Rulemaking, ARM–1, 800 Independence
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
Avenue SW, Washington, DC 20591, or
by calling (202) 267–9677. Commenters
must identify the docket or notice
number of this rulemaking.
All documents the FAA considered in
developing this proposed rule,
including economic analyses and
technical reports, may be accessed in
the electronic docket for this
rulemaking.
D. Small Business Regulatory
Enforcement Fairness Act
The Small Business Regulatory
Enforcement Fairness Act (SBREFA) of
1996 requires the FAA to comply with
small entity requests for information or
advice about compliance with statutes
and regulations within its jurisdiction.
A small entity with questions regarding
this document may contact its local
FAA official, or the person listed under
the FOR FURTHER INFORMATION CONTACT
section of this document. To find out
more about SBREFA on the internet,
visit www.faa.gov/regulations_policies/
rulemaking/sbre_act/.
List of Subjects
14 CFR Part 25
Aircraft, Aviation safety, Navigation
(air), Reporting and recordkeeping
requirements.
14 CFR Part 33
Aircraft, Aviation safety, Reporting
and recordkeeping requirements.
14 CFR Part 35
Aircraft, Aviation safety.
adverse effects on the safety of the
airplane. The applicant must—
(1) Identify and assess the security
risks from all intentional unauthorized
electronic interactions.
(2) Mitigate the security risks as
necessary for safety, functionality, and
continued airworthiness.
(3) Prepare and make available all
procedures and instructions for
continued airworthiness necessary to
maintain security protections in
accordance with appendix H to this
part.
(b) [Reserved]
■ 3. In appendix H:
■ a. Under the heading H25.1, revise
paragraph (a); and
■ b. Under the heading H25.3, add
paragraph (h);
The revision and addition read as
follows:
Appendix H to Part 25—Instructions for
Continued Airworthiness
H25.1 General.
(a) This appendix specifies requirements
for preparation of Instructions for Continued
Airworthiness as required by §§ 25.1319,
25.1529, 25.1729, and applicable provisions
of parts 21 and 26 of this chapter.
*
*
*
*
*
*
*
*
*
*
5. The authority citation for part 33
continues to read as follows:
■
Authority: 49 U.S.C. 106(g), 40113, 44701,
44702, 44704.
1. The authority citation for part 25
continues to read as follows:
*
§ 33.28
Authority: 49 U.S.C. 106(f), 106(g), 40113,
44701, 44702 and 44704; Pub. L. 115–254,
132 Stat 3281 (49 U.S.C. 44903 note).
2. Add § 25.1319 under the
undesignated center heading ‘‘General’’
to read as follows:
■
§ 25.1319 Equipment, systems, and
network information security protection.
(a) Airplane equipment, systems, and
network information security protection.
Airplane equipment, systems, and
networks—considered separately and in
relation to other systems—must be
protected from intentional unauthorized
electronic interactions that may result in
Sfmt 4702
*
6. In § 33.28, add paragraph (n) to read
as follows:
■
Fmt 4702
*
PART 33—AIRWORTHINESS
STANDARDS: AIRCRAFT ENGINES
■
Frm 00009
*
Content.
(h) Procedures and instructions necessary
to maintain airplane security protections
from intentional unauthorized electronic
interactions.
PART 25—AIRWORTHINESS
STANDARDS: TRANSPORT
CATEGORY AIRPLANES
PO 00000
*
H25.3
*
The Proposed Amendment
In consideration of the foregoing, the
Federal Aviation Administration
proposes to amend chapter I of title 14,
Code of Federal Regulations as follows:
67571
Engine control systems.
*
*
*
*
(n) Engine equipment, systems, and
network information security protection.
Engine control, monitoring and
auxiliary equipment, systems, and
networks—considered separately and in
relation to other systems—must be
protected from intentional unauthorized
electronic interactions that may result in
adverse effects on the safety of the
engine or the aircraft. The applicant
must—
(1) Identify and assess the security
risks from all intentional unauthorized
electronic interactions.
(2) Mitigate such security risks as
necessary for safety, functionality, and
continued airworthiness.
E:\FR\FM\21AUP1.SGM
21AUP1
67572
Federal Register / Vol. 89, No. 162 / Wednesday, August 21, 2024 / Proposed Rules
(3) Prepare and make available all
procedures and instructions for
continued airworthiness necessary to
maintain security protections in
accordance with appendix A to this
part.
■ 7. In appendix A, under the heading
a33.3, add paragraph (a)(10) to read as
follows:
maintain information security protections as
required by § 35.23(f).
Appendix A to Part 33—Instructions for
Continued Airworthiness
[FR Doc. 2024–17916 Filed 8–20–24; 8:45 am]
*
*
a33.3
*
*
*
*
*
*
*
*
*
*
*
Issued under authority provided by 49
U.S.C. 106(f) and 44701(a), and 44703 in
Washington, DC.
Wesley L. Mooty,
Acting Executive Director, Aircraft
Certification Service.
content
*
*
DEPARTMENT OF TRANSPORTATION
(a) * * *
(10) Procedures and instructions for
transfer of engine control software,
monitoring software, and data between
aircraft, engines, and ground systems to
maintain information security protections as
required by § 33.28(n).
*
*
*
*
*
Federal Aviation Administration
14 CFR Part 39
[Docket No. FAA–2024–2022; Project
Identifier MCAI–2024–00189–T]
RIN 2120–AA64
PART 35—AIRWORTHINESS
STANDARDS: PROPELLERS
Airworthiness Directives; Dassault
Aviation Airplanes
8. The authority citation for part 35
continues to read as follows:
AGENCY:
■
Authority: 49 U.S.C. 106(f), 106(g), 40113,
44701–44702, 44704.
9. In § 35.23, add paragraph (f) to read
as follows:
■
§ 35.23
Propeller control system.
*
*
*
*
*
(f) Propeller control, monitoring and
auxiliary equipment, systems, and
networks—considered separately and in
relation to other systems—must be
protected from intentional unauthorized
electronic interactions that may result in
adverse effects on the safety of the
propeller or the aircraft. The applicant
must—
(1) Identify and assess the security
risks from all intentional unauthorized
electronic interactions.
(2) Mitigate such security risks as
necessary for safety, functionality, and
continued airworthiness.
(3) Prepare and make available all
procedures and instructions for
continued airworthiness necessary to
maintain security protections in
accordance with appendix A to this
part.
■ 10. In appendix A, under the heading
a35.3, add paragraph (a)(10) to read as
follows:
lotter on DSK11XQN23PROD with PROPOSALS1
BILLING CODE 4910–13–P
Appendix A to Part 35—Instructions for
Continued Airworthiness
*
*
*
*
*
a35.3 content
(a) * * *
(10) Procedures and instructions for
transfer of propeller control software,
monitoring software, and data between
aircraft, propellers, and ground systems to
VerDate Sep<11>2014
17:00 Aug 20, 2024
Jkt 262001
Federal Aviation
Administration (FAA), DOT.
ACTION: Notice of proposed rulemaking
(NPRM).
The FAA proposes to adopt a
new airworthiness directive (AD) for
certain Dassault Aviation Model
FALCON 7X, FALCON 900EX, and
FALCON 2000EX airplanes. This
proposed AD was prompted by reported
occurrences of swelling of the lithiumpolymer internal and external batteries
of certain electronic display units
(EDUs). This proposed AD would
require modifying certain EDUs and
would prohibit the installation of
affected parts, as specified in a
European Union Aviation Safety Agency
(EASA) AD, which is proposed for
incorporation by reference (IBR). The
FAA is proposing this AD to address the
unsafe condition on these products.
DATES: The FAA must receive comments
on this proposed AD by October 7, 2024.
ADDRESSES: You may send comments,
using the procedures found in 14 CFR
11.43 and 11.45, by any of the following
methods:
• Federal eRulemaking Portal: Go to
regulations.gov. Follow the instructions
for submitting comments.
• Fax: 202–493–2251.
• Mail: U.S. Department of
Transportation, Docket Operations, M–
30, West Building Ground Floor, Room
W12–140, 1200 New Jersey Avenue SE,
Washington, DC 20590.
• Hand Delivery: Deliver to Mail
address above between 9 a.m. and 5
p.m., Monday through Friday, except
Federal holidays.
SUMMARY:
PO 00000
Frm 00010
Fmt 4702
Sfmt 4702
AD Docket: You may examine the AD
docket at regulations.gov under Docket
No. FAA–2024–2022; or in person at
Docket Operations between 9 a.m. and
5 p.m., Monday through Friday, except
Federal holidays. The AD docket
contains this NPRM, the mandatory
continuing airworthiness information
(MCAI), any comments received, and
other information. The street address for
Docket Operations is listed above.
Material Incorporated by Reference:
• For EASA material identified in this
proposed AD, contact EASA, KonradAdenauer-Ufer 3, 50668 Cologne,
Germany; telephone +49 221 8999 000;
email ADs@easa.europa.eu; website
easa.europa.eu. You may find this
material on the EASA website at
ad.easa.europa.eu. It is also available at
regulations.gov under Docket No. FAA–
2024–2022.
• You may view this material at the
FAA, Airworthiness Products Section,
Operational Safety Branch, 2200 South
216th St., Des Moines, WA. For
information on the availability of this
material at the FAA, call 206–231–3195.
FOR FURTHER INFORMATION CONTACT: Tom
Rodriguez, Aviation Safety Engineer,
FAA, 1600 Stewart Avenue, Suite 410,
Westbury, NY 11590; telephone 206–
231–3226; email: tom.rodriguez@
faa.gov.
SUPPLEMENTARY INFORMATION:
Comments Invited
The FAA invites you to send any
written relevant data, views, or
arguments about this proposal. Send
your comments to an address listed
under the ADDRESSES section. Include
‘‘Docket No. FAA–2024–2022; Project
Identifier MCAI–2024–00189–T’’ at the
beginning of your comments. The most
helpful comments reference a specific
portion of the proposal, explain the
reason for any recommended change,
and include supporting data. The FAA
will consider all comments received by
the closing date and may amend this
proposal because of those comments.
Except for Confidential Business
Information (CBI) as described in the
following paragraph, and other
information as described in 14 CFR
11.35, the FAA will post all comments
received, without change, to
regulations.gov, including any personal
information you provide. The agency
will also post a report summarizing each
substantive verbal contact received
about this NPRM.
Confidential Business Information
CBI is commercial or financial
information that is both customarily and
actually treated as private by its owner.
E:\FR\FM\21AUP1.SGM
21AUP1
Agencies
[Federal Register Volume 89, Number 162 (Wednesday, August 21, 2024)]
[Proposed Rules]
[Pages 67564-67572]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-17916]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF TRANSPORTATION
Federal Aviation Administration
14 CFR Parts 25, 33, and 35
[Docket No.: FAA-2024-1398; Notice No. 24-23]
RIN 2120-AL94
Equipment, Systems, and Network Information Security Protection
AGENCY: Federal Aviation Administration (FAA), Department of
Transportation (DOT).
ACTION: Notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: This proposed rulemaking would impose new design standards to
address cybersecurity threats for transport category airplanes,
engines, and propellers. The intended effect of this proposed action is
to standardize the FAA's criteria for addressing cybersecurity threats,
reducing certification costs and time while maintaining the same level
of safety provided by current special conditions.
DATES: Send comments on or before October 21, 2024.
ADDRESSES: Send comments identified by docket number FAA-2024-1398
using any of the following methods:
Federal eRulemaking Portal: Go to www.regulations.gov and
follow the online instructions for sending your comments
electronically.
Mail: Send comments to Docket Operations, M-30; U.S.
Department of Transportation, 1200 New Jersey Avenue SE, Room W12-140,
West Building Ground Floor, Washington, DC 20590-0001.
Hand Delivery or Courier: Take comments to Docket
Operations in Room W12-140 of the West Building Ground Floor at 1200
New Jersey Avenue SE, Washington, DC, between 9 a.m. and 5 p.m., Monday
through Friday, except Federal holidays.
Fax: Fax comments to Docket Operations at (202) 493-2251.
Privacy: In accordance with 5 U.S.C. 553(c), DOT solicits comments
from the public to better inform its rulemaking process. DOT posts
these comments, without edit, including any personal information the
commenter provides, to www.regulations.gov, as described in the system
of records notice (DOT/ALL-14 FDMS), which can be reviewed at
www.dot.gov/privacy.
Docket: Background documents or comments received may be read at
www.regulations.gov at any time. Follow the online instructions for
accessing the docket or go to the Docket Operations in Room W12-140 of
the West Building Ground Floor at 1200 New Jersey Avenue SE,
Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday,
except Federal holidays.
FOR FURTHER INFORMATION CONTACT: For technical questions concerning
this action, contact Varun Khanna, AIR-626D, Policy and Standards
Division, Aircraft Certification Service, Federal Aviation
Administration, 2200 South 216th Street, Des Moines, WA 98198;
telephone (206) 231 3159; email [email protected].
SUPPLEMENTARY INFORMATION:
I. Executive Summary
A. Overview of Proposed Rule
The FAA proposes to add new regulations to and revise certain
existing regulations in title 14, Code of Federal Regulations (14 CFR)
part 25
[[Page 67565]]
(Airworthiness Standards: Transport Category Airplanes), part 33
(Airworthiness Standards: Aircraft Engines), and part 35 (Airworthiness
Standards: Propellers). These changes would introduce type
certification and continued airworthiness requirements to protect the
equipment, systems, and networks of transport category airplanes,
engines, and propellers against intentional unauthorized electronic
interactions (IUEI) \1\ that could create safety hazards. Design
approval applicants would be required to identify, assess, and mitigate
such hazards, and develop Instructions for Continued Airworthiness
(ICA) that would ensure such protections continue in service. Proposed
changes to parts 25, 33, and 35 would mandate such protection and apply
to applicants for design approval of transport category airplanes,
engines, and propellers. The changes would also affect future operators
of these products through the application of the ICA.
---------------------------------------------------------------------------
\1\ RTCA Glossary page 24: Intentional Unauthorized Electronic
Interaction (IUEI) is defined, for purposes of this rulemaking, as
``[a] circumstance or event with the potential to affect the
aircraft due to human action resulting from unauthorized access,
use, disclosure, denial, disruption, modification, or destruction of
information and/or aircraft system interfaces. Note that this
includes malware and the effects of external systems, but does not
include physical attacks such as electromagnetic jamming.''
---------------------------------------------------------------------------
The substance of the proposed rules would generally reflect current
practice (e.g., special conditions) that the FAA has used to address
product cybersecurity since 2009. Under the proposed regulations, the
FAA would continue to apply the same substantive requirements
established by current special conditions via the same methods of
compliance to new applicable certification projects; thus, the impact
on applicants and operators would not be significant. The intended
effect of this action is to reduce the costs and time necessary to
certify new and changed products and harmonize FAA regulatory
requirements with the regulations that other civil aviation authorities
are using to address cybersecurity vulnerability, while maintaining the
level of safety provided by current Aircraft System Information
Security/Protection (ASISP) special conditions.
B. Background
The current trend in airplane design includes an increasing level
of integration of airplane, engine, and propeller systems with
increased connectivity to internal or external data networks and
services. Regulators and industry must constantly monitor the
cybersecurity threat environment in order to identify and mitigate new
threat sources. These designs can introduce or allow cybersecurity
vulnerabilities from sources such as:
Field Loadable Software;
Maintenance laptops;
Airport or airline gate link networks;
Public networks, e.g., internet;
Wireless aircraft sensors and sensor networks;
Cellular networks;
Universal Serial Bus (USB) devices;
Satellite communications;
Portable electronic devices and portable electronic flight
bags (EFBs); and
GPS and satellite-based augmentation system digital data.
The FAA has found its airworthiness regulations, including
Sec. Sec. 25.1301, 25.1309, 25.1319, 25.1529, 33.28, and 35.23,
inadequate and inappropriate to address the cybersecurity
vulnerabilities caused by increased interconnectivity. Beginning with
the Boeing 787 program, the FAA has been addressing the need to protect
aircraft systems from the threat of IUEI. Since then, the FAA has
issued special conditions to address IUEI in every new transport
category airplane certification project and relevant design change. A
special condition is a rule that applies to a particular aircraft,
aircraft engine, or propeller design. The FAA issues special conditions
when the agency's airworthiness regulations do not contain adequate or
appropriate safety standards to address a proposed novel or unusual
design feature. The FAA provides the public with an opportunity to
comment on proposed special conditions.\2\
---------------------------------------------------------------------------
\2\ 14 CFR 21.16.
---------------------------------------------------------------------------
Each set of special conditions addresses a project-specific novel
or unusual feature of the applicant's proposed design. The FAA's
special conditions addressing cybersecurity on transport category
airplanes have generally required applicants' proposed designs to
accomplish three things. Applicants have been required to:
1. Show that their proposed airplane designs either provide
isolation from or protection against internal or external unauthorized
access.
2. Show that their designs prevent inadvertent changes, malicious
changes, and all adverse impacts to the airplane equipment, systems,
and networks necessary for safe operation.
3. Establish procedures to ensure that they maintain such
cybersecurity protections.\3\
---------------------------------------------------------------------------
\3\ See, e.g., 88 FR 46953 (July 21, 2023) and 89 FR 3333
(January 18, 2024).
---------------------------------------------------------------------------
Applicants have met the first two criteria using the method of
compliance (MoC) part of the cybersecurity special condition issue
papers. Special conditions are issued if the existing applicable
airworthiness standards do not contain adequate or appropriate safety
standards for an aircraft, aircraft engine, or propeller because of
novel or unusual design features of the product to be type
certificated. Issue papers provide a structured means for describing
and tracking the resolution of significant technical, regulatory, and
administrative issues that occur during a project. The early
cybersecurity MoC followed the positions listed in those issue papers:
the applicants created a certification plan meeting those positions,
then the FAA approved that certification plan. After RTCA, Inc.
published its guidance (Document (DO)-326, DO-355, and DO-356),
industry wanted to use them as a MoC.
After it became evident to the FAA that this new level of system
interconnectivity would most appropriately be addressed through a
single set of objective airworthiness standards, on December 18, 2014,
the Aviation Rulemaking Advisory Committee (ARAC) accepted a task from
the FAA to provide recommendations regarding ASISP \4\ rulemaking,
policy, and guidance on best practices for aircraft systems and parts,
including both certification and continued airworthiness. ASISP refers
to the protection of aircraft from electronic threats from IUEI. The
ARAC created the ASISP Working Group comprised of a wide range of
domestic and international industry and government experts tasked to
ensure that the resulting recommendations considered relevant design,
airworthiness, and international harmonization. On August 22, 2016, the
working group submitted their report, including unanimous
recommendations, to the ARAC. The ARAC approved and publicly released
the report during its September 15, 2016 meeting.\5\
---------------------------------------------------------------------------
\4\ The term ASISP is used to exclude physical security issues
related to individuals who could gain physical access to aircraft to
cause malicious damage to the aircraft systems (e.g., improper
maintenance procedures, fuel contamination, cutting wire bundles),
which is addressed by other Federal agencies.
\5\ See Aviation Rulemaking Advisory Committee (ARAC) Aircraft
System Information Security/Protection (ASISP) working group to the
Federal Aviation Administration, dated October 22, 2016,
www.faa.gov/regulations_policies/rulemaking/committees/documents/media/ARACasisp-T1-20150203R.pdf.
---------------------------------------------------------------------------
The report contained several recommendations on the necessity for
ASISP-related rulemaking and guidance,
[[Page 67566]]
including specific proposals for rule language and destination within
the current regulatory framework for both type certification and
continued airworthiness. This NPRM addresses the report's
recommendations for the FAA to conduct rulemaking to add ASISP
requirements to parts 25, 33, and 35 of title 14.\6\
---------------------------------------------------------------------------
\6\ Recommendations 02, 14, and 15, respectively.
---------------------------------------------------------------------------
In the report, the ASISP Working Group proposed a regulatory
framework that established a single set of objective airworthiness
standards for all transport category airplanes. Its structure provided
a clear set of discrete requirements for applicants to show compliance.
Specific to this proposed rule, the ASISP Working Group recommended the
following regulatory text for transport category airplanes:
Sec. 25.13XX Equipment, Systems, and Network Security Protection
(a) Airplane equipment, systems, and networks, considered
separately and in relation to other systems, must be protected from
intentional unauthorized electronic interactions that may result in an
adverse effect on the safety of the airplane by showing that the
security risks have been identified, assessed, and mitigated as
necessary.
(b) When required by paragraph (a), applicants must make available
procedures and instructions for continued airworthiness to ensure
security protections are maintained.
The ASISP Working Group further recommended the FAA adopt similar
provisions for engine control systems, propeller control systems, and
to harmonize the regulatory requirement between U.S. and international
regulatory authorities.\7\
---------------------------------------------------------------------------
\7\ The Report also contained recommendations for addressing
several other subjects, including cybersecurity concerns related to
rotorcraft and small airplanes, which are not addressed in this
proposed rulemaking.
---------------------------------------------------------------------------
On October 5, 2018, Congress enacted H.R.302--FAA Reauthorization
Act of 2018 (the ``Act''). Section 506 of the Act requires the FAA to
consider revising its airworthiness certification regulations to
address cybersecurity by protecting aircraft systems, including engines
and propellers, from unauthorized internal and external access. The Act
further required the FAA to consider the recommendations of the ASISP
Working Group discussed above.
Additionally, representatives of the European Union Aviation Safety
Agency (EASA) participated in the ASISP Working Group for regulatory
harmonization purposes and have implemented the recommendations of the
ASISP Working Group to introduce cybersecurity provisions into their
relevant certification specifications (CS). EASA CS prescribe the
airworthiness standards for products certified by the European Union:
CS-25 large aeroplanes corresponds to 14 CFR part 25 for transport
category airplanes, CS-E for engines corresponds to 14 CFR part 33, and
CS-P for propellers corresponds to 14 CFR part 35. Like the FAA, prior
to implementing the recommendations of the ASISP Working Group, EASA
had addressed the protection of aircraft systems from IUEI through the
issuance of special conditions.
On February 22, 2019, EASA released NPA 2019-01, Aircraft
Cybersecurity, a set of proposed amendments to CS-23, CS-25, CS-27, CS-
29, CS-E, CS-ETSO, CS-P and also release their related acceptable means
of compliance/guidance material. EASA Decision 2020/006/R ``Aircraft
cybersecurity'' finalized these amendments and their guidance on July
1, 2020, issuing CS-25 Amendment 25, CS-E Amendment 6, and CS-P
Amendment 2, along with amendments to CS for other product types. These
amendments introduced cybersecurity provisions into the relevant CS,
incorporating the provisions of the existing EASA special conditions
and the ARAC ASISP recommendations. While EASA also codified
cybersecurity provisions for other product types such as small
airplanes and rotorcraft, the FAA proposes no such requirements, as
existing rules in parts 23 (Sec. Sec. 23.2500, 23.2505, 23.2510), 27
(Sec. Sec. 27.1301, 27.1309), and 29 (Sec. Sec. 29.1301, 29.1309)
suffice in these cases.\8\
---------------------------------------------------------------------------
\8\ The Report primarily recommended that the FAA undertake
policy rather than regulatory changes to address cybersecurity on
small airplanes and rotorcraft. See, e.g., sections 2.3 and 2.4 of
the Report.
---------------------------------------------------------------------------
C. Statement of the Problem
Aircraft, engines, and propellers increasingly incorporate
networked bus \9\ architectures susceptible to cybersecurity threats.
These threats have the potential to affect the airworthiness of the
airplane. These network architectures require cybersecurity provisions
to address vulnerabilities to IUEI.\10\ The FAA currently addresses
transport category airplane security through the issuance of special
conditions requiring proposed designs to isolate or protect vulnerable
systems from unauthorized internal or external access.
---------------------------------------------------------------------------
\9\ A bus is a communication system that transfers data between
components inside a computer, or between computers.
\10\ The FAA uses the term ``security'' in our rules rather than
cybersecurity.
---------------------------------------------------------------------------
Over time, the FAA has observed that repeated issuance of project-
specific ASISP special conditions could result in cybersecurity-related
certification criteria that are neither standardized between projects
nor harmonized between the FAA and other Civil Aviation Authorities.
These disconnects increase the certification complexity, cost, and time
for both the applicant and regulator. This proposed rulemaking package
codifies the substantive requirements of frequently-issued
cybersecurity special conditions to address these issues.
II. Authority for This Rulemaking
The FAA's authority to issue rules on aviation safety is found in
title 49 of the United States Code. Subtitle I, section 106 describes
the authority of the FAA Administrator. Subtitle VII, Aviation
Programs, describes in more detail the scope of the agency's authority.
This rulemaking is issued under the authority described in subtitle
VII, part A, subpart III, section 44701, ``General Requirements.''
Under that section, the FAA is charged with prescribing regulations
that promote safe flight of civil aircraft in air commerce by
prescribing regulations and minimum standards for the design and
performance of aircraft that the Administrator finds necessary for
safety in air commerce. This regulation is within the scope of that
authority as it prescribes new safety standards for the design and
performance of transport category airplanes, engines, and propellers.
III. Discussion of the Proposed Rule
A. Protection of Transport Airplanes, Engines, and Propellers From IUEI
The FAA is proposing to add new Sec. Sec. 25.1319, 33.28(n),
35.23(f), and revise their associated appendices, to protect against
IUEI that may result in adverse effects on the safety of transport
category airplanes, engines, and propellers. The proposed rule would
implement ARAC recommendations, harmonize with the corresponding EASA
CSs, and reduce if not eliminate the need for the FAA to continue to
issue project-specific special conditions addressing cybersecurity
threats.
The proposed rule would require applicants to ``protect'' transport
category airplanes, engines, and propellers from IUEI that may result
in adverse effects on safety. To provide such protection for each
product, applicants would be required by regulation to ``identify and
assess'' the
[[Page 67567]]
security risks posed by IUEI, and to ``mitigate'' those risks as
necessary for safety, functionality, and continued airworthiness.
For such identification and assessment of security risk,
the applicant would be required to perform a security risk analysis to
identify all threat conditions associated with the system,
architecture, and external or internal interfaces.
The FAA would expect such risk analysis to assess the
severity of the effect of threat conditions on associated assets
(system, architecture, etc.), consistent with the means of compliance
the applicant has been using to meet the FAA's special conditions on
this topic.
Such assessment would also need to analyze these
vulnerabilities for the likelihood of exploitation.
The proposed regulation would then require each applicant
to ``mitigate'' the vulnerabilities, and the FAA expects such
mitigation would occur through the applicant's installation of single
or multilayered protection mechanisms or process controls to ensure
functional integrity, i.e., protection.
Finally, each applicant would be required to include the
procedures within their instructions for continued airworthiness
necessary to maintain such protections.\11\
---------------------------------------------------------------------------
\11\ Instructions for Continued Airworthiness contain the
instructions and information necessary for the continued
airworthiness of the aircraft, engine, propeller, parts, and
appliances as required by the applicable Certification Basis.
---------------------------------------------------------------------------
Pursuant to 14 CFR 21.21(b), determinations regarding
whether applicants have sufficiently identified and mitigated the
security risks from IUEI would be made by the Administrator.
B. Transport Category Airplane Protection (Proposed 14 CFR 25.1319)
The requirements of proposed Sec. 25.1319 are substantively based
on the ASISP special conditions the FAA has issued in past transport
airplane certification projects and the recommendations of the ARAC
ASISP report. The FAA expects applicants would continue meeting the
same objectives required by the ASISP special conditions and EASA's
cybersecurity standards.
The FAA proposes that to adequately ``mitigate the security risks
as necessary for safety, functionality, and continued airworthiness''
the applicant would generally need to show that the design accomplishes
the first two requirements of the FAA's ASISP special conditions.
First, that the design protects against unauthorized access from inside
or outside of the airplane. Second, that the design prevents malicious
changes to, and adverse impacts on, the airplane equipment, systems,
and networks required for safe operation.
In addition, certain proposed regulatory terms merit additional
explanation. The term ``IUEI'' means a circumstance or event with the
potential to affect the aircraft due to human action resulting from
unauthorized access, use, disclosure, denial, disruption, modification,
or destruction of information and/or aircraft system interfaces. Note
that this definition includes malware and the effects of external
systems on aircraft systems but does not include physical attacks or
electromagnetic jamming. The new regulations would require applicants
to consider the airplane's equipment, systems, and networks
``separately and in relation to other systems.'' This language reflects
the concern discussed in the ARAC ASISP report that cybersecurity
threats can propagate from one system to another.\12\
---------------------------------------------------------------------------
\12\ Report, pp. 22, 152, and 182.
---------------------------------------------------------------------------
The FAA also acknowledges that only IUEI vulnerabilities that may
result in adverse effects on safety of the airplane require protection.
This condition would limit the scope of the required protection to
those effects that could impact the safety and airworthiness of the
aircraft and its operation. For example, the ARAC ASISP report noted
that, while devices used to process passenger credit cards may raise
security issues related to passenger information, means other than
airworthiness regulations would address such issues unless they also
could impact systems with the potential to adversely affect the safety
of the airplane.\13\
---------------------------------------------------------------------------
\13\ Report, pp. 22 and 69.
---------------------------------------------------------------------------
The regulatory language used for the proposed Sec. Sec. 25.1319,
33.28(n), 35.23(f), and their associated appendices build upon these
concepts in the same manner. While EASA chose to adopt the ARAC's
recommended wording directly, the FAA formatted the language to match
existing FAA regulations.
C. Engine Control System and Propeller Control System Protections
(Proposed 14 CFR 33.28 and 35.23)
Engine and propeller systems increasingly incorporate networked bus
architectures susceptible to cybersecurity threats. These threats have
the potential to affect the airworthiness of part 25 airplanes. These
network architectures require cybersecurity provisions to address
vulnerabilities from IUEI. Engine and propeller protections against
IUEI threats are important because unmitigated cyberattacks can
adversely affect the propulsion control functions needed for safe
operation of the aircraft. Such attacks could also cause data
corruption in crew displays and in health monitoring parameters used in
operation and maintenance decisions.
To address this need and respond to the recommendations in the ARAC
ASISP report, the FAA proposes to add new Sec. Sec. 33.28(n) ``Engine
Control System'' and 35.23(f) ``Propeller Control System'' sections to
parts 33 and 35 of title 14 respectively. The proposed rule addresses
any engine and propeller systems installed in airplanes, equipment, and
networks that are susceptible to IUEI. These systems can include
control functions that modulate propulsion output, propulsion controls,
monitoring functions that track the health of the engine's systems,
communication functions such as data buses and networks, and auxiliary
equipment such as fuel, lube, or pneumatic subsystems with embedded
electronics.
Like the part 25 proposed rule, the proposed engine and propeller
rules would require the applicant to protect against IUEI that could
result in adverse effects on the safety of the airplane. This
protection is accomplished by identifying and assessing all security
risks caused by IUEI and then mitigating the security risks as
necessary for safety, functionality, and continued airworthiness. The
FAA expects that applicants would assess such risks using a risk
analysis methodology that identifies all system and network
vulnerabilities, a common industry practice used to address
cybersecurity threats, and determine which vulnerabilities require
mitigation for safe operation.
D. Instructions for Continued Airworthiness
Further, proposed revisions to appendix H to part 25 and to
appendix A to both parts 33 and 35 would require applicants to prepare
all procedures and ICA necessary to ensure continued protection against
IEUI. The proposed changes to the appendices of parts 33 and 35 would
require the applicant to furnish these procedures and ICA to the first
owner of any transport airplane, engine, or propeller and make them
available to subsequent operators per 14 CFR 21.50(b). Operators must
follow these procedures and instructions to maintain aircraft, engine,
and propellor security protections.
[[Page 67568]]
The FAA intends that the phrase ``procedures and instructions for
continued airworthiness'' convey that maintenance procedures for
security protections extend beyond typical ICA content. To accomplish
these maintenance procedures, operators develop an Aircraft Network
Security Program \14\ based on the applicant's security guidance to
ensure conformance to type design and continued airworthiness.
---------------------------------------------------------------------------
\14\ See AC 119-1A, Operational Authorization of Aircraft
Network Security Program.
---------------------------------------------------------------------------
The term ``transfer'' in the proposed regulation addresses the
following activities. The lifecycle of airplanes, engines, and
propellers involves data transfers between the onboard and offboard
systems that collect and analyze data for health monitoring, trending,
and maintenance decisions. These data transfer and software
reprogramming activities can create operational vulnerabilities that
require the implementation of safeguards to maintain airworthiness. The
FAA proposes that these regulations will address such vulnerabilities.
E. Harmonization
EASA CS-25 prescribes the airworthiness standards corresponding to
14 CFR part 25 for products certified by the European Union. For
aircraft certification in general, where part 25 and CS-25 differ, an
applicant must meet both airworthiness standards if it desires to
obtain both a U.S. type certificate and the validation of the type
certificate by foreign authorities. Otherwise, the applicant must
obtain exemptions, equivalent level of safety findings, special
conditions, or the foreign authority's equivalent to those as necessary
to meet one standard in lieu of the other. This proposal harmonizes the
FAA's parts 25, 33, and 35 ASISP requirements with those of EASA, which
would benefit manufacturers and modifiers by providing them a single
set of requirements with which they must show compliance, thereby
reducing the cost and complexity of certification and codifying a
consistent level of safety. Unlike the FAA's proposal, EASA developed
its equivalent regulatory text to address a broader range of products
aligned with a European Union Horizontal cybersecurity requirement
imposed across all industries. The proposed rule would eliminate the
need to issue special conditions during the certification process in a
manner harmonized with EASA requirements.
This proposed regulatory framework would establish a set of
cybersecurity airworthiness standards for the certification and
continued airworthiness of transport category airplanes, engines, and
propellers. These standards align with the requirements of previously-
issued ASISP special conditions, ARAC recommendations, and the
corresponding EASA CS. As noted above, this framework would also have
the benefit of reducing cost and time to certify new and changed
products for both industry and the FAA.
F. Advisory Material for Proposed Sec. Sec. 25.1319, 33.28, and 35.23
Miscellaneous Amendments
The FAA has developed proposed Advisory Circular (AC) 20-XXX,
``Aircraft Systems Information Security/Protection (ASISP).'' This AC
would provide guidance on an acceptable means, but not the only means,
of showing compliance with proposed Sec. Sec. 25.1319, 33.28(n), and
35.23(f). It refers to the guidance materials that applicants have been
using to show compliance with commonly issued special conditions. The
FAA has placed this AC into the docket for comment.
IV. Regulatory Notices and Analyses
Federal agencies consider the impacts of regulatory actions under a
variety of Executive orders and other requirements. First, Executive
Order 12866 and Executive Order 13563, as amended by Executive Order
14094 (``Modernizing Regulatory Review''), direct that each Federal
agency shall propose or adopt a regulation only upon a reasoned
determination that the benefits of the intended regulation justify its
costs. Second, the Regulatory Flexibility Act of 1980 (Pub. L. 96-354)
requires agencies to analyze the economic impact of regulatory changes
on small entities. Third, the Trade Agreements Act (Pub. L. 96-39)
prohibits agencies from setting standards that create unnecessary
obstacles to the foreign commerce of the United States. Fourth, the
Unfunded Mandates Reform Act of 1995 (Pub. L. 104-4) requires agencies
to prepare a written assessment of the costs, benefits, and other
effects of proposed or final rules that include a Federal mandate that
may result in the expenditure by State, local, or Tribal governments,
in the aggregate, or by the private sector, of $100 million or more
(adjusted annually for inflation) in any one year. The current
threshold after adjustment for inflation is $183 million using the most
current (2023) Implicit Price Deflator for the Gross Domestic Product.
This portion of the preamble presents the FAA's analysis of the
economic impacts of this proposed rule.
In conducting these analyses, the FAA has determined that this
proposed rule (1) would have benefits that justify its costs, (2) is
not a ``significant regulatory action'' as defined in section 3(f) of
Executive Order 12866, as amended; (3) would not have a significant
economic impact on a substantial number of small entities; (4) would
not create unnecessary obstacles to the foreign commerce of the United
States; and (5) would not impose an unfunded mandate on State, local,
or Tribal governments, or on the private sector by exceeding the
threshold identified above.
A. Regulatory Evaluation
The intended effects of this proposal would be to (1) incorporate
the substance of the requirements contained in commonly issued ASISP
special conditions, (2) reduce the cost and time necessary to certify
new and changed products for both industry and the FAA; (3) harmonize
FAA regulations with EASA cybersecurity CS; and (4) address ARAC
recommendations. Subsequently, this proposal would create a cost
savings for the FAA and the applicant by eliminating the need to
continue issuing similar ASISP special conditions.
Aircraft, engines, and propellers increasingly incorporate
networked bus architectures susceptible to cybersecurity threats. These
threats have the potential to affect the airworthiness of the airplane.
These network architectures require cybersecurity provisions to address
vulnerabilities to IUEI.
The proposed rule may affect all five U.S. entities manufacturing
transport category airplanes, four entities manufacturing engines for
transport category airplanes, and four entities manufacturing
propellers. Additionally, operators could have modifiers retrofit
legacy airplanes with systems that would require cybersecurity
provisions. The proposed changes to parts 25, 33, and 35 would apply to
applicants for design approval of transport category airplanes,
engines, and propellers. Under the proposed rule, the FAA would apply
the requirements currently contained in the ASISP special conditions.
This action would reduce the costs and time to certify new and changed
products while maintaining the level of safety provided by current
ASISP special conditions.
Type certification of engines and propellers against cybersecurity
threats has not required the issuance of special conditions. An issue
paper provided to applicants describes an acceptable means of
compliance for existing
[[Page 67569]]
Sec. Sec. 33.28, 33.75, 35.15, and 35.23 rules for these systems. The
MoC contains FAA-accepted industry standards for protection against
cybersecurity threats.\15\ This proposal would codify the requirements
for engine control systems and propeller control systems in Sec. Sec.
33.28(n) and 35.23(f), respectively. Appendix A of these parts would
contain the requirements for the applicant to develop procedures and
ICA.
---------------------------------------------------------------------------
\15\ For example, cybersecurity standards that have been passed
by RTCA and the European Organization for Civil Aviation Equipment
(EUROCAE) are an FAA-accepted Means of Compliance.
---------------------------------------------------------------------------
The FAA estimated the cost savings from eliminating ASISP special
conditions over a ten-year period. The FAA assumes that, in absence of
this proposed rule,\16\ an equivalent number of special conditions
processed from 2013 to 2022 would occur in the next ten years. The FAA
processed and issued a total of 68 special conditions for cybersecurity
from 2013 through 2022.
---------------------------------------------------------------------------
\16\ The FAA acknowledges that upon finalization of this
proposed rule cybersecurity special conditions may still be required
on occasion.
---------------------------------------------------------------------------
The FAA estimates, it would take about 170 hours of FAA's time to
process a special condition application of average complexity. The FAA
acknowledges that special conditions can vary in complexity. However,
for purposes of this analysis, the FAA estimates its time savings from
the elimination of ASISP special conditions to average about 170 hours.
Multiplying the forecast for special conditions processed annually by
processing time provides an estimate for the total time savings from
the elimination of cybersecurity special conditions for the FAA over a
ten-year period.
The process of issuing special conditions involves engineers,
technical writers, and managers, and its cost averages $13,498 per
special condition. To calculate the cost savings from reducing the
number of special conditions, the FAA multiplied the forecast for the
number of special conditions issued by its corresponding processing
cost.
In summary, over a 10-year period of analysis, this proposal would
result in a present value of cost savings for the FAA of about $783,366
at a three percent discount rate with an annualized cost savings of
about $91,834. Applying a seven percent discount rate would result in a
present value cost savings of about $645,584 with an annualized net
cost savings of $91,916.
The cost savings above does not include the applicants for type
certificates for transport category airplanes that would result from
the elimination of the need to issue ASISP special conditions due to a
lack of information. The FAA requests information for this group of
applicants, along with supporting data, for the estimated time and cost
savings.
B. Regulatory Flexibility Act
The Regulatory Flexibility Act (RFA) of 1980, (5 U.S.C. 601-612),
as amended by the Small Business Regulatory Enforcement Fairness Act of
1996 (Pub. L. 104-121) and the Small Business Jobs Act of 2010 (Pub. L.
111-240), requires Federal agencies to consider the effects of the
regulatory action on small business and other small entities and to
minimize any significant economic impact. The term ``small entities''
comprises small businesses and not-for-profit organizations that are
independently owned and operated and are not dominant in their fields,
and governmental jurisdictions with populations of less than 50,000.
The FAA is publishing this Initial Regulatory Flexibility Analysis
(IRFA) to aid the public in commenting on the potential impacts on
small entities from this proposal. The FAA invites interested parties
to submit data and information regarding the potential economic impact
that would result from the proposal. The FAA will consider comments
when making a determination or when completing a Final Regulatory
Flexibility Assessment.
An IRFA must contain the following:
(1) A description of the reasons why the action by the FAA is being
considered;
(2) A succinct statement of the objective of, and legal basis for,
the proposed rule;
(3) A description of, and where feasible, an estimate of the number
of small entities to which the proposed rule would apply;
(4) A description of the projected reporting, recordkeeping, and
other compliance requirements of the proposed rule, including an
estimate of the classes of small entities that would be subject to the
requirement and the type of professional skills necessary for the
preparation of the report or record;
(5) An identification, to the extent practicable, of all relevant
Federal rules that may duplicate, overlap, or conflict with the
proposed rule; and
(6) A description of any significant alternatives to the proposed
rule which accomplish the stated objectives of applicable statutes, and
which minimize any significant economic impact of the proposed rule on
small entities.
Currently, five entities in the United States manufacture transport
category airplanes, four entities manufacture engines for transport
category airplanes, and four entities manufacture propellers. The table
below provides the North American Industrial Classification System
(NAICS) codes for manufacturing aircraft, aircraft engines, and
aircraft propellers, along with the size standard in terms of number of
employees established by the Small Business Administration.\17\
---------------------------------------------------------------------------
\17\ Small Business Administration, Table of Small Business Size
Standards Matched to NAICS Codes. Effective March 17, 2023.
www.sba.gov/document/support--table-size-standards.
Table 1
------------------------------------------------------------------------
Size standard
NAICS Code Description (employees)
------------------------------------------------------------------------
336411.................... Aircraft Manufacturing... 1,500
336412.................... Aircraft Engine and 1,500
Engine Parts
Manufacturing.
336413.................... Other Aircraft Parts and 1,250
Auxiliary Equipment
Manufacturing.
------------------------------------------------------------------------
Based on the Small Business Administration (SBA) size standard for
NAICS Code 336411 Aircraft Manufacturing, and NAICS Code 336412
Aircraft Engine and Engine Parts Manufacturing, the five transport
category airplane manufacturers and four transport airplane engine
manufacturers are not classified as small.
Of the four U.S. manufacturers of propellers (NAICS code 336413),
only
[[Page 67570]]
one had published data for their number of employees. The entity with
published data is not categorized as small by SBA standards. The FAA
does not know how many people the three remaining propeller
manufacturers employ. Therefore, the FAA does not know whether these
three remaining manufacturers are small entities.
This proposed rulemaking would standardize the FAA's criteria for
addressing cybersecurity threats for transport category airplanes,
engines, and propellers to reduce certification costs and time while
maintaining the same level of safety provided by current special
conditions. Therefore, it results in cost savings for the industry. The
FAA welcomes comments on this analysis.
C. International Trade Impact Assessment
The Trade Agreements Act of 1979 (Pub. L. 96-39), as amended by the
Uruguay Round Agreements Act (Pub. L. 103-465), prohibits Federal
agencies from establishing standards or engaging in related activities
that create unnecessary obstacles to the foreign commerce of the United
States. Pursuant to these Acts, the establishment of standards is not
considered an unnecessary obstacle to the foreign commerce of the
United States, so long as the standard has a legitimate domestic
objective, such as the protection of safety, and does not operate in a
manner that excludes imports that meet this objective. The statute also
requires consideration of international standards and, where
appropriate, that they be the basis for U.S. standards.
The FAA has assessed the potential effect of this proposed rule and
determined that its objective is to promote the safety of the American
public and does not exclude imports that meet this objective. As a
result, the FAA does not consider this proposed rule as creating an
unnecessary obstacle to foreign commerce.
D. Unfunded Mandates Assessment
The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538)
governs the issuance of Federal regulations that require unfunded
mandates. An unfunded mandate is a regulation that requires a State,
local, or Tribal government or the private sector to incur direct costs
without the Federal Government having first provided the funds to pay
those costs. The FAA determined that the proposed rule would not result
in the expenditure of $183 million or more by State, local, or Tribal
governments, in the aggregate, or the private sector, in any one year.
E. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (44 U.S.C. 3507(d)) requires
that the FAA consider the impact of paperwork and other information
collection burdens imposed on the public. The FAA has determined that
there would be no new requirement for information collection associated
with this proposed rule.
F. International Compatibility
In keeping with U.S. obligations under the Convention on
International Civil Aviation, it is FAA policy to conform to
International Civil Aviation Organization (ICAO) Standards and
Recommended Practices to the maximum extent practicable. The FAA has
reviewed the corresponding ICAO Standards and Recommended Practices and
has identified no differences with these proposed regulations.
G. Environmental Analysis
FAA Order 1050.1F identifies FAA actions that are categorically
excluded from the preparation of an environmental assessment or
environmental impact statement under the National Environmental Policy
Act (NEPA) in the absence of extraordinary circumstances. The FAA has
determined this proposed rulemaking action qualifies for the
categorical exclusion identified in paragraph 5-6.6f for regulations
and involves no extraordinary circumstances.
V. Executive Order Determinations
A. Executive Order 13132, Federalism
The FAA has analyzed this proposed rule under the principles and
criteria of Executive Order (E.O.) 13132, Federalism. The FAA has
determined that this proposed action would not have a substantial
direct effect on the States, the relationship between the Federal
Government and the States, or the distribution of power and
responsibilities among the various levels of government, and,
therefore, would not have federalism implications.
B. Executive Order 13175, Consultation and Coordination With Indian
Tribal Governments
Consistent with Executive Order 13175, Consultation and
Coordination with Indian Tribal Governments,\18\ and FAA Order 1210.20,
American Indian and Alaska Native Tribal Consultation Policy and
Procedures,\19\ the FAA ensures that Federally Recognized Tribes
(Tribes) are given the opportunity to provide meaningful and timely
input regarding proposed Federal actions that have the potential to
affect uniquely or significantly their respective Tribes. At this
point, the FAA has not identified any unique or significant effects,
environmental or otherwise, on tribes resulting from this proposed
rule.
---------------------------------------------------------------------------
\18\ 65 FR 67249 (November 6, 2000).
\19\ See FAA Order No. 1210.20, dated January 28, 2004, https://www.faa.gov/documentLibrary/media/1210.pdf.
---------------------------------------------------------------------------
C. Executive Order 13211, Regulations That Significantly Affect Energy
Supply, Distribution, or Use
The FAA analyzed this proposed rule under E.O. 13211, Actions
Concerning Regulations that Significantly Affect Energy Supply,
Distribution, or Use (May 18, 2001). The FAA has determined that it
would not be a ``significant energy action'' under the Executive order
and would not be likely to have a significant adverse effect on the
supply, distribution, or use of energy.
D. Executive Order 13609, Promoting International Regulatory
Cooperation
Executive Order 13609, Promoting International Regulatory
Cooperation, promotes international regulatory cooperation to meet
shared challenges involving health, safety, labor, security,
environmental, and other issues and reduce, eliminate, or prevent
unnecessary differences in regulatory requirements. The FAA has
analyzed this proposed action under the policy and agency
responsibilities of E.O. 13609. The FAA has determined that this
proposed action would eliminate differences between U.S. aviation
standards and those of other civil aviation authorities.
VI. Additional Information
A. Comments Invited
The FAA invites interested persons to participate in this
rulemaking by submitting written comments, data, or views. The FAA also
invites comments relating to the economic, environmental, energy, or
federalism impacts that might result from adopting the proposal in this
document. The most helpful comments reference a specific portion of the
proposal, explain the reason for any recommended change, and include
supporting data. To ensure the docket does not contain duplicate
comments, commenters should submit only one time if comments are filed
electronically, or commenters should send only one copy of written
[[Page 67571]]
comments if comments are filed in writing.
The FAA will file in the docket all comments it receives, as well
as a report summarizing each substantive public contact with FAA
personnel concerning this proposed rulemaking. Before acting on this
proposal, the FAA will consider all comments it receives on or before
the closing date for comments. The FAA will consider comments filed
after the comment period has closed if it is possible to do so without
incurring expense or delay. The FAA may change this proposal in light
of the comments it receives.
B. Confidential Business Information
Confidential Business Information (CBI) is commercial or financial
information that is both customarily and actually treated as private by
its owner. Under the Freedom of Information Act (FOIA) (5 U.S.C. 552),
CBI is exempt from public disclosure. If your comments responsive to
this NPRM contain commercial or financial information that is
customarily treated as private, that you actually treat as private, and
that is relevant or responsive to this NPRM, it is important that you
clearly designate the submitted comments as CBI. Please mark each page
of your submission containing CBI as ``PROPIN.'' The FAA will treat
such marked submissions as confidential under the FOIA, and they will
not be placed in the public docket of this NPRM. Submissions containing
CBI should be sent to the person in the FOR FURTHER INFORMATION CONTACT
section of this document. Any commentary that the FAA receives that is
not specifically designated as CBI will be placed in the public docket
for this rulemaking.
C. Electronic Access and Filing
A copy of this NPRM, all comments received, any final rule, and all
background material may be viewed online at www.regulations.gov using
the docket number listed above. A copy of this proposed rule will be
placed in the docket. Electronic retrieval help and guidelines are
available on the website. It is available 24 hours a day, 365 days a
year. An electronic copy of this document may also be downloaded from
the Office of the Federal Register's website at www.federalregister.gov
and the Government Publishing Office's website at www.govinfo.gov. A
copy may also be found at the FAA's Regulations and Policies website at
www.faa.gov/regulations_policies.
Copies may also be obtained by sending a request to the Federal
Aviation Administration, Office of Rulemaking, ARM-1, 800 Independence
Avenue SW, Washington, DC 20591, or by calling (202) 267-9677.
Commenters must identify the docket or notice number of this
rulemaking.
All documents the FAA considered in developing this proposed rule,
including economic analyses and technical reports, may be accessed in
the electronic docket for this rulemaking.
D. Small Business Regulatory Enforcement Fairness Act
The Small Business Regulatory Enforcement Fairness Act (SBREFA) of
1996 requires the FAA to comply with small entity requests for
information or advice about compliance with statutes and regulations
within its jurisdiction. A small entity with questions regarding this
document may contact its local FAA official, or the person listed under
the FOR FURTHER INFORMATION CONTACT section of this document. To find
out more about SBREFA on the internet, visit www.faa.gov/regulations_policies/rulemaking/sbre_act/.
List of Subjects
14 CFR Part 25
Aircraft, Aviation safety, Navigation (air), Reporting and
recordkeeping requirements.
14 CFR Part 33
Aircraft, Aviation safety, Reporting and recordkeeping
requirements.
14 CFR Part 35
Aircraft, Aviation safety.
The Proposed Amendment
In consideration of the foregoing, the Federal Aviation
Administration proposes to amend chapter I of title 14, Code of Federal
Regulations as follows:
PART 25--AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY AIRPLANES
0
1. The authority citation for part 25 continues to read as follows:
Authority: 49 U.S.C. 106(f), 106(g), 40113, 44701, 44702 and
44704; Pub. L. 115-254, 132 Stat 3281 (49 U.S.C. 44903 note).
0
2. Add Sec. 25.1319 under the undesignated center heading ``General''
to read as follows:
Sec. 25.1319 Equipment, systems, and network information security
protection.
(a) Airplane equipment, systems, and network information security
protection. Airplane equipment, systems, and networks--considered
separately and in relation to other systems--must be protected from
intentional unauthorized electronic interactions that may result in
adverse effects on the safety of the airplane. The applicant must--
(1) Identify and assess the security risks from all intentional
unauthorized electronic interactions.
(2) Mitigate the security risks as necessary for safety,
functionality, and continued airworthiness.
(3) Prepare and make available all procedures and instructions for
continued airworthiness necessary to maintain security protections in
accordance with appendix H to this part.
(b) [Reserved]
0
3. In appendix H:
0
a. Under the heading H25.1, revise paragraph (a); and
0
b. Under the heading H25.3, add paragraph (h);
The revision and addition read as follows:
Appendix H to Part 25--Instructions for Continued Airworthiness
H25.1 General.
(a) This appendix specifies requirements for preparation of
Instructions for Continued Airworthiness as required by Sec. Sec.
25.1319, 25.1529, 25.1729, and applicable provisions of parts 21 and
26 of this chapter.
* * * * *
H25.3 Content.
* * * * *
(h) Procedures and instructions necessary to maintain airplane
security protections from intentional unauthorized electronic
interactions.
* * * * *
PART 33--AIRWORTHINESS STANDARDS: AIRCRAFT ENGINES
0
5. The authority citation for part 33 continues to read as follows:
Authority: 49 U.S.C. 106(g), 40113, 44701, 44702, 44704.
0
6. In Sec. 33.28, add paragraph (n) to read as follows:
Sec. 33.28 Engine control systems.
* * * * *
(n) Engine equipment, systems, and network information security
protection. Engine control, monitoring and auxiliary equipment,
systems, and networks--considered separately and in relation to other
systems--must be protected from intentional unauthorized electronic
interactions that may result in adverse effects on the safety of the
engine or the aircraft. The applicant must--
(1) Identify and assess the security risks from all intentional
unauthorized electronic interactions.
(2) Mitigate such security risks as necessary for safety,
functionality, and continued airworthiness.
[[Page 67572]]
(3) Prepare and make available all procedures and instructions for
continued airworthiness necessary to maintain security protections in
accordance with appendix A to this part.
0
7. In appendix A, under the heading a33.3, add paragraph (a)(10) to
read as follows:
Appendix A to Part 33--Instructions for Continued Airworthiness
* * * * *
a33.3 content
* * * * *
(a) * * *
(10) Procedures and instructions for transfer of engine control
software, monitoring software, and data between aircraft, engines,
and ground systems to maintain information security protections as
required by Sec. 33.28(n).
* * * * *
PART 35--AIRWORTHINESS STANDARDS: PROPELLERS
0
8. The authority citation for part 35 continues to read as follows:
Authority: 49 U.S.C. 106(f), 106(g), 40113, 44701-44702, 44704.
0
9. In Sec. 35.23, add paragraph (f) to read as follows:
Sec. 35.23 Propeller control system.
* * * * *
(f) Propeller control, monitoring and auxiliary equipment, systems,
and networks--considered separately and in relation to other systems--
must be protected from intentional unauthorized electronic interactions
that may result in adverse effects on the safety of the propeller or
the aircraft. The applicant must--
(1) Identify and assess the security risks from all intentional
unauthorized electronic interactions.
(2) Mitigate such security risks as necessary for safety,
functionality, and continued airworthiness.
(3) Prepare and make available all procedures and instructions for
continued airworthiness necessary to maintain security protections in
accordance with appendix A to this part.
0
10. In appendix A, under the heading a35.3, add paragraph (a)(10) to
read as follows:
Appendix A to Part 35--Instructions for Continued Airworthiness
* * * * *
a35.3 content
(a) * * *
(10) Procedures and instructions for transfer of propeller
control software, monitoring software, and data between aircraft,
propellers, and ground systems to maintain information security
protections as required by Sec. 35.23(f).
* * * * *
Issued under authority provided by 49 U.S.C. 106(f) and 44701(a),
and 44703 in Washington, DC.
Wesley L. Mooty,
Acting Executive Director, Aircraft Certification Service.
[FR Doc. 2024-17916 Filed 8-20-24; 8:45 am]
BILLING CODE 4910-13-P