Supply Chain Strategies | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

There are multiple possible strategies to secure the supply chain. And securing the supply chain is mandated both by the WP.29 regulation and by the ISO/SAE 21434 standard.

The ISO/SAE standard even offers specific strategies on how to secure the supply chain.

The first one is that as part of the supplier evaluation by the OEM, the supplier would provide the OEM with a cybersecurity record of capability. This record will include various evidence on the cybersecurity quality of the supplier, including the overall cybersecurity management system with regards to the vehicles’ automotive security, the overall information security management of the supplier, and evidence of past cybersecurity assessments of the supplier.

The second strategy is that as part of the contractual agreement between the supplier and the OEM, a cybersecurity interface for development will be included. This agreement will list the overall division of responsibilities between the supplier and the OEM throughout the vehicle lifecycle from development to production and post-production.

There is not one method in how to do that, therefore, the important thing is to actually define how responsibilities will be shared and divided. One possible model for doing that is called RASIC, which stands for Responsible, Approve, Support, Inform, and Consult.

Implementing this model throughout the vehicle lifecycle in post-production, for example, can include the supplier monitoring for ongoing vulnerabilities regarding its component throughout the vehicle lifecycle. Once a new vulnerability is detected, it will be assessed using TARA by the supplier, and if the risk level justifies it, the supplier will inform the OEM.

The OEM will then consult the supplier if a fix is required, the supplier will develop and test the fix, and then the OEM will test the fix. And once the fix is approved, it will be deployed as a FOTA to the vehicles.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Sécuriser et renforcer l’avenir de la mobilité et de l’IoT

Upstream libère le potentiel des véhicules connectés, de l’IoT et des données de la mobilité intelligente. 
 Sa plateforme de gestion des données est spécialement…

More Details

Études de cas : Comment l’IA permet de détecter plus tôt les problèmes de qualité véhicule

La détection proactive de la qualité (PQD) d’Upstream en action, accélérant l’analyse des causes premières (RCA), l’évaluation de la gravité et la priorisation des problèmes…

More Details

Beyond the Cyber Resilience Act: Building
Cyber Resilience for the EV Charging Ecosystem

The CRA places broad obligations on manufacturers, including those who design, develop, or brand charge points, backend systems, and embedded communication software used throughout the…

More Details

Beyond the Cyber Resilience Act: Building Holistic Cyber Resilience

A decade ago, the value of connected vehicle data was associated with new revenue streams for OEMs. Fast forward to today, a more effective and…

More Details

Tech Talk: Securing the Commercial Fleet Ecosystem with IVECO’s CISO

The commercial vehicle industry is undergoing a seismic shift. The convergence of connectivity, electrification, and software-defined vehicles is unlocking unprecedented efficiency but also exposing f

More Details

Unmasking the Blind Spot: Why API Security Is the Weak Link in Automotive Cybersecurity

In this session, recorded during the Auto ISAC Partners Week, Upstream's Dr. Matthias Lenk and Fabian Stahl explain why API security remains a critical yet…

More Details
Skip to content