Threat Analysis and Risk Assessment | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

For WP.29, as part of the CSMS requirement, it’s required to apply TARA throughout the vehicle lifecycle. When you build a vehicle, you need to apply TARA on the critical vehicle components and as a result of this TARA, you need to apply mitigation inside the vehicle.

But, you also need to emit logs, that will later be used in the post-production detection system, and, you also need to secure the supply chain.

In post-production, you need to leverage these logs and additional logs, to apply post-production detection.

And, over the entire lifecycle of the vehicle, you need to have a process to assess risk, categorize risk, and apply risk treatment decisions, as part of your TARA process.

WP.29 also provides a specific list of threats in Annex Five of the regulation, that actually outlines a comprehensive list of attacks that cover many of the interfaces of the vehicle.

This list of attacks is used as a baseline for securing the vehicle, both in development and in post-production.

 

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Upstream、日本での事業拡大のため元富士通幹部を迎える

佐藤俊也は、日本におけるUpstreamの成長加速の陣頭指揮をとります。 Upstreamは、2024年グローバルモビリティサイバーセキュリティ報告書の日本語版�

More Details

Exploring Upstream’s Cybersecurity Report with Giuseppe Serio

The episode explores the latest developments in automotive cybersecurity, focusing on the Upstream Cybersecurity Threat Report for 2023. It highlights the importance of responsible disclosure…

More Details

IoT Cybersecurity in an Evolving Regulatory Landscape

The rising use of IoT devices has transformed operations in the mobility and automotive ecosystem. However, this expansion has also escalated the risks associated with…

More Details

Enhance Cybersecurity Investigations with Ocean AI by Upstream

In the fast-evolving world of automotive and mobility cybersecurity, Ocean AI by Upstream adds another tool to the toolkit used by analysts to identify and…

More Details

Can Your Radio Take Control of Your Truck?

Cybersecurity risks facing the automotive industry are rapidly evolving beyond ransomware attacks on fleets. Hackers can weaponize connected vehicles through a wide array of connected…

More Details

2024 グローバル自動車サイバーセキュリティレポートUpstreamのグローバル自動車

サイバーセキュリティレポートは、自動車サイバーセキュリティの状況に関する包括的な概要を提供します。Upstreamの研究者が数百件の自動車サイバ

More Details