Vehicle SOC: Incident Detection and Response with Upstream C4

TEAM UPSTREAM

[Transcript]

In this presentation we will demonstrate the architecture and operation of a Vehicle SOC or VSOC, encompassing IT and OT security operations while leveraging incident detection and response with The Upstream Platform.

The right side shows a typical IT SOC  – Assets on the IT network are monitored such as mobile phones, Servers, Network devices and endpoints. The left side shows a typical OT  automotive environment – with a range of monitored assets such as Telematics servers (sending and receiving messages to/from the vehicles), the vehicles themselves, the different mobility services as well as the vehicle APIs and sensors.

In the IT environment – assets are protected by IT cybersecurity detection products – such as Firewalls, Endpoint security, etc designed to detect both insider and outsider threats. In the OT environment assets are protected by an Automotive Cloud cybersecurity solution – Upstream’s C4 platform.

Events and incidents detected by the IT and OT solutions are then sent to the SIEM solution for aggregation, investigation and triage within the SOC by the trained analysts. In addition, the solution typically includes a Workflow product to take the necessary actions to mitigate the potential threats.

Now let’s take a look at an example of an automotive cyber-attack and the detection-triage-mitigation lifecycle within the vSOC.

  • A hacker remotely exploits a vulnerability to take over the Telematics server. Once control is gained, the hacker can steal sensitive data, track vehicle locations and maliciously attack multiple vehicles (for example by sending remote commands such as unlock door or stop engine). The result can potentially impact the entire service
  • Upstream’s cloud-based platform detects the malicious attack and indicates an incident on its main dashboard – as you can see here with a high risk indicator for this scenario.
  • Using the seamless integration of the automotive SIEM module of Upstream’s C4 to the IT SIEM, the incident is aggregated and appears in the IT SIEM dashboard.
  • SOC analysts can now perform a deep investigation and analysis to decide on the mitigation plan or using a workflow to trigger pre defined playbooks that will remediate the attack and mitigate the impact on the vehicles and entire service.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Cybersecurity and compliance in the age of autonomy

As autonomous technologies advance toward Levels 3-4, securing these innovative systems requires a unique product cybersecurity approach.

More Details

Cybersecurity in motion: Safeguarding mobility critical infrastructure

The evolution of connected mobility, electrification, and data-driven services has transformed them into critical infrastructure, reshaping the risk landscape of smart mobility. This shift demands&hel

More Details

Global Automaker Partners with Upstream to Enhance Fleet Cybersecurity

More Details

Upstream Security and Volta Team Up to Safeguard the Future of Electric Fleets

Ensuring driver safety, vehicle safety, and cybersecurity resilience is a top priority for Volta. We’re thrilled to support this commitment and showcase how our collaboration…

More Details

Podcast by Sonatus: Navigating Cybersecurity Threats in the Automotive Industry

Auto Tech Detroit 2024 highlighted the pressing issue of cybersecurity in the automotive ecosystem. Recorded live during the event, John Heinlein, CMO of Sonatus, had…

More Details

H1’2024 Report: Redefining Automotive & Smart Mobility IoT Cyber Risks

SIM-enabled IoT devices, primarily in the automotive and smart mobility ecosystem, have evolved into critical infrastructure, redefining cyber risks and requiring stakeholders to ensure safety,&hellip

More Details
Skip to content