Telemetries and Data | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

Collecting vehicle telemetries and vehicle data is super-important for securing the vehicle in post-production. The reason is that in post-production, we need to protect the vehicle against attacks that were known at the time of the vehicle development, but also against new attacks that were unknown while the vehicle was developed. And these new attacks are result of new attack techniques and new services that are being introduced to the market.

This is why CSMS actually requires the OEM to detect cyber attacks based on vehicle logs. And if you look specifically
at the requirement, in CSMS, it’s required to have detection, a centralized detection system that is based on vehicle logs, detects cyber attacks, and provides a response within a reasonable timeframe to these attacks.

In the Vehicle Type requirements, it’s required to secure critical elements in the vehicle, but also to emit meaningful telemetry that will enable this type of post-production detection for vehicles while they’re on the road.

And when you combine these two requirements, you get a very powerful way to detect attacks in a centralized manner as
part of the management system.

So, such a detection system really enables a very broad coverage of the threats listed in Annex 5 of the WP.29, but also because you collect telemetries from millions of vehicles, you really can create a very strong baseline that describes the normal
behavior of the vehicle and have an effective anomaly detection system that can also help detect unknown attacks.

Lastly, when you collect lots of telemetries, you can not only detect the attack, but you can apply forensics and really detect the root cause of the attack.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Mind the Cyber Gap: Uncovering the Latest Trends in Automotive Cybersecurity

Join Upstream’s experts in this webinar to explore the latest trends in Automotive and Smart Mobility cybersecurity and their impact on safety, availability, and customer…

More Details

Driving Cybersecurity – CISO Conversations: Insights from Automotive and Mobility Leaders

Explore the future of automotive cybersecurity in this exclusive panel discussion. Industry leaders from Upstream, Google Cloud, Deloitte, Auto ISAC, BorgWarner, CNH Industrial, and General…

More Details

Transforming Automotive Quality, Warranty, and Recall Strategies: AI Meets Connected Vehicle Data

The automotive industry is undergoing a profound transformation, with software-defined vehicles (SDVs) at the forefront of this revolution. Vehicles now generate unparalleled volumes of data,…

More Details

Paving the Roadmap from vSOC 3.0 to 4.0: Navigating Cybersecurity’s Next Frontier

Discover their insights on securing the future of connected and autonomous vehicles, safeguarding IP amid regulatory complexities, and the critical role of AI in the…

More Details

Mobility Cyber Threat Intelligence

Gain unparalleled visibility into the mobility threat landscape with actionable asset-specific intelligence findings and mitigation recommendations.

More Details

Upstream for IoT Cybersecurity Solution Overview

Monitor and secure connected devices in the Automotive and Smart Mobility Ecosystem with a multi-layered, ML-based detection and response (XDR) solution, augmented by robust GenAI-powered…

More Details
Skip to content