The Challenges | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.

The four challenges are first, the vehicle complexity. Vehicles are having more and more interfaces, and each of those interfaces is becoming increasingly software-based and has more and more functionality. This means that the overall attack surface on the vehicle is growing.

The second challenge is the backend systems. We’re seeing more and more vehicles being connected today and in the upcoming years to backend systems. The vehicle uploads data to those systems and is increasingly controlled by these backend systems. Those backend systems are in turn connected to other backend systems, which ultimately increase the number of ways in which an attacker can get from the internet to a controlling position of the vehicle.

The third is supply chain. The vehicle has a very complex supply chain, both horizontally and vertically. And managing the supply chain from the cybersecurity perspective for the lifetime of the vehicle, which could be between 10 and 15 years, is complex.

And last but not least is the changing threat landscape. While the vehicle is on the road for 10 and 15 years, during this period, there will be new threats introduced, both because of changing functionality in the vehicle and because of new attack techniques that will be in the market.

Addressing these challenges is complex and requires several countermeasures.

The first is securing the vehicle throughout its lifecycle, from development through production and in its post-production period.

The second is applying a centralized detection system that will collect logs from the vehicles, the communication channel, and the backend systems, and detect threats on the vehicles coming both directly from the backend systems and from the communication channels.

The third is secure supply chain management, which means that OEMs need to require that suppliers and service providers implement cybersecurity management systems and the ability to detect new threats in an ongoing basis throughout the vehicle lifecycle.

Upstream Security aids OEMs and service providers in addressing these challenges, using its C4 and AutoThreat products in multiple ways.

Newsletter Icon

Subscribe
to our newsletter

Sign up to receive updates delivered to your inbox

By clicking Subscribe, I agree to the use of my personal data in accordance with Privacy Policy. Upstream will not sell, trade, lease, or rent your personal data to third parties.

Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue

There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected capability such as GPS, mobile…

More Details

Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats

Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.

More Details

Cybersecurity for Connected Vehicles: From Cost Centre to Value Centre

OEMs are relying on their connected vehicles to drive them from “Car Co’s” to “Tech Co’s”.

More Details

Upstream Detects a Critical Vulnerability in Linux-Based Head Units

Read about how Upstream’s AutoThreat® Intelligence team works to hunt threats that are hiding in the surface, deep, and dark web- allowing you to meet…

More Details

What is Upstream’s AutoThreat® Intelligence?

Upstream’s AutoThreat® Intelligence is the automotive industry’s leading cyber threat intelligence and risk assessment solution. It is purpose-built to collect, analyze, and leverage automotive t

More Details

How AutoThreat® Supports Automotive Cybersecurity

AutoThreat’s® automotive-focused analysts scour the surface, deep, and dark web for incidents that matter most to the automotive ecosystem. Together, our researchers combine both manual…

More Details