Closed thomas-moulard closed 5 years ago
Wow.
@thomas-moulard: nice article. I notice however that there is just a single reference to related/existing work. Was there really no usable literature available, or was it all non-applicable? Grounding these sort of articles in the existing body of knowledge -- also (or preferably?) from outside the ROS community -- would significantly increase the value of them. Edit: oops, I should scroll to the right.
Perhaps a References section would be a good idea?
Great work @thomas-moulard! We have reviewed it and it looks very promising. I think that most of the attack vectors have been covered. Just a small concern, several risks for physical attacks to the OpenCR controller and the Raspberry Pi have been taken as acceptable for this architecture. Shouldn't we advise at least for physically protecting access to sensitive components? I would suggest a combination of shields or covers + usage of the ZimKey perimeter breach detection mechanisms. In our experience with commercial robots, this is the way to go.
That was very nice reading @thomas-moulard! Thanks a lot for the contribution. Very, very nice.
A few further comments:
Thanks a lot everyone for the feedback - I'll integrate all of those points and push an update to this PR ASAP.
@gavanderhoorn @vmayoral I added a references section - open for ideas there if you feel it could be improved.
I think splitting the doc could be a good idea, but it could also probably be done after this first pass.
All feedback is not addressed yet and I'll take care of that tomorrow.
I think the tables are a bit too wide to reasonably read with one screen:
Perhaps we could collapse the columns for:
And use a fixed width encoding of flags and values, e.g:
Threat Category | Threat Risk Assessment | ... |
---|---|---|
S✓ T✘ R✘ I✓ D✓ E✓ | D3 R1 E1 A2 D3 = 10 | ... |
... | .. | ... |
I think the tables are a bit too wide to reasonably read with one screen
You should try reviewing the document on an iPad.
With the first round of comments resolved and the structure laid out. This has been marked as a draft. Please open new PRs to discuss specific areas of the document so we can have deeper threaded discussions on this document.
This adds an article describing a threat model for ROS 2 robotic applications.
The objective of this work is to drive ROS 2 security work and define, end-to-end, what it takes for a robotic company to build a secure ROS 2 robotic application.
Signed-off-by: Thomas Moulard tmoulard@amazon.com