The Challenges | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.

The four challenges are first, the vehicle complexity. Vehicles are having more and more interfaces, and each of those interfaces is becoming increasingly software-based and has more and more functionality. This means that the overall attack surface on the vehicle is growing.

The second challenge is the backend systems. We’re seeing more and more vehicles being connected today and in the upcoming years to backend systems. The vehicle uploads data to those systems and is increasingly controlled by these backend systems. Those backend systems are in turn connected to other backend systems, which ultimately increase the number of ways in which an attacker can get from the internet to a controlling position of the vehicle.

The third is supply chain. The vehicle has a very complex supply chain, both horizontally and vertically. And managing the supply chain from the cybersecurity perspective for the lifetime of the vehicle, which could be between 10 and 15 years, is complex.

And last but not least is the changing threat landscape. While the vehicle is on the road for 10 and 15 years, during this period, there will be new threats introduced, both because of changing functionality in the vehicle and because of new attack techniques that will be in the market.

Addressing these challenges is complex and requires several countermeasures.

The first is securing the vehicle throughout its lifecycle, from development through production and in its post-production period.

The second is applying a centralized detection system that will collect logs from the vehicles, the communication channel, and the backend systems, and detect threats on the vehicles coming both directly from the backend systems and from the communication channels.

The third is secure supply chain management, which means that OEMs need to require that suppliers and service providers implement cybersecurity management systems and the ability to detect new threats in an ongoing basis throughout the vehicle lifecycle.

Upstream Security aids OEMs and service providers in addressing these challenges, using its C4 and AutoThreat products in multiple ways.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Don’t wait for warranty claims to pile up

Don’t wait for warranty claims to pile up. Using your connected vehicle data, repair order trends, and DTC analytics you can detect patterns before they…

More Details

Too many claims, not enough time

Too many claims, not enough time. Upstream helps you cut through the noise with AI-powered prioritization: ranking issues by impact, predicted cost, and severity so…

More Details

Speed matters when quality claims hit

Speed matters when quality claims hit. With Upstream’s proactive quality detection, you can accelerate root cause analysis by seeing every vehicle in full context: claims,…

More Details

Turn complex vehicle data into instant answers

Turn complex vehicle data into instant answers with Upstream’s Ocean AI. See how “talking to your data” makes analysis simple. Ask questions, spot issues, set…

More Details

프랑스어 요약 – 모빌리티와 IoT의 미래 보안 및 강화

업스트림은 커넥티드 카, IoT, 스마트 모빌리티 데이터의 잠재력을 극대화합니다. 업스트림의 데이터 관리 플랫폼은 진화하는 사이버 위험으로부터 모�

More Details

모빌리티 분야의 사이버 위협에 대한 정보

실행 가능한 수정 권장 사항에 뒷받침된 실행 가능한 장치별 분석을 통해 모빌리티 위협 환경에 대한 탁월한 가시성을 확보하세요.

More Details
Skip to content