The Challenges | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

There are four major challenges in securing connected vehicles. All of these challenges are addressed by the WP.29 regulation and the ISO/SAE 21434 standard.

The four challenges are first, the vehicle complexity. Vehicles are having more and more interfaces, and each of those interfaces is becoming increasingly software-based and has more and more functionality. This means that the overall attack surface on the vehicle is growing.

The second challenge is the backend systems. We’re seeing more and more vehicles being connected today and in the upcoming years to backend systems. The vehicle uploads data to those systems and is increasingly controlled by these backend systems. Those backend systems are in turn connected to other backend systems, which ultimately increase the number of ways in which an attacker can get from the internet to a controlling position of the vehicle.

The third is supply chain. The vehicle has a very complex supply chain, both horizontally and vertically. And managing the supply chain from the cybersecurity perspective for the lifetime of the vehicle, which could be between 10 and 15 years, is complex.

And last but not least is the changing threat landscape. While the vehicle is on the road for 10 and 15 years, during this period, there will be new threats introduced, both because of changing functionality in the vehicle and because of new attack techniques that will be in the market.

Addressing these challenges is complex and requires several countermeasures.

The first is securing the vehicle throughout its lifecycle, from development through production and in its post-production period.

The second is applying a centralized detection system that will collect logs from the vehicles, the communication channel, and the backend systems, and detect threats on the vehicles coming both directly from the backend systems and from the communication channels.

The third is secure supply chain management, which means that OEMs need to require that suppliers and service providers implement cybersecurity management systems and the ability to detect new threats in an ongoing basis throughout the vehicle lifecycle.

Upstream Security aids OEMs and service providers in addressing these challenges, using its C4 and AutoThreat products in multiple ways.

Newsletter Icon

Subscribe
to our newsletter

Sign up to receive updates delivered to your inbox

The high-impact automotive cyber security trends and incidents of H1-2022

This webinar will discuss three emerging cyber threats and their potential impact on end users, OEMs, and the entire smart mobility ecosystem.

More Details

H1’2022 Automotive Cyber Trend Report

This report offers extensive coverage and analysis of automotive-specific cyber incidents across all attack vectors and their impact on the wide ecosystem.

More Details

EV 充電所 拡大に向けて: EV充電所インフラ安全確保への課題

Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by tampering with charging station data.

More Details

The Leading Managed Vehicle SOC: Actively Protecting Millions of Vehicles for OEMs Worldwide

Protect automotive cybersecurity with an automotive-specific Vehicle Security Operations Center (VSOCs) to address the complexity of cyberattacks targeting OT networks, such as connected vehicles and&

More Details

Beyond Cyber: Upstream Puts Data in Motion

Automotive data in the cloud breaks silos, allowing teams to analyze information in the pursuit of identifying exciting new revenue opportunities.

More Details

2022 グローバルモビリティ サイバーセキュリティ報告書

2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を

More Details