Vehicle SOC: Incident Detection and Response with Upstream C4



In this presentation we will demonstrate the architecture and operation of a Vehicle SOC or VSOC, encompassing IT and OT security operations while leveraging incident detection and response with The Upstream Platform.

The right side shows a typical IT SOC  – Assets on the IT network are monitored such as mobile phones, Servers, Network devices and endpoints. The left side shows a typical OT  automotive environment – with a range of monitored assets such as Telematics servers (sending and receiving messages to/from the vehicles), the vehicles themselves, the different mobility services as well as the vehicle APIs and sensors.

In the IT environment – assets are protected by IT cybersecurity detection products – such as Firewalls, Endpoint security, etc designed to detect both insider and outsider threats. In the OT environment assets are protected by an Automotive Cloud cybersecurity solution – Upstream’s C4 platform.

Events and incidents detected by the IT and OT solutions are then sent to the SIEM solution for aggregation, investigation and triage within the SOC by the trained analysts. In addition, the solution typically includes a Workflow product to take the necessary actions to mitigate the potential threats.

Now let’s take a look at an example of an automotive cyber-attack and the detection-triage-mitigation lifecycle within the vSOC.

  • A hacker remotely exploits a vulnerability to take over the Telematics server. Once control is gained, the hacker can steal sensitive data, track vehicle locations and maliciously attack multiple vehicles (for example by sending remote commands such as unlock door or stop engine). The result can potentially impact the entire service
  • Upstream’s cloud-based platform detects the malicious attack and indicates an incident on its main dashboard – as you can see here with a high risk indicator for this scenario.
  • Using the seamless integration of the automotive SIEM module of Upstream’s C4 to the IT SIEM, the incident is aggregated and appears in the IT SIEM dashboard.
  • SOC analysts can now perform a deep investigation and analysis to decide on the mitigation plan or using a workflow to trigger pre defined playbooks that will remediate the attack and mitigate the impact on the vehicles and entire service.

Newsletter Icon

to our newsletter

Sign up to receive updates delivered to your inbox

The Leading Managed Vehicle SOC: Actively Protecting Millions of Vehicles for OEMs Worldwide

Protect automotive cybersecurity with an automotive-specific Vehicle Security Operations Center (VSOCs) to address the complexity of cyberattacks targeting OT networks, such as connected vehicles and&

More Details

Beyond Cyber: Upstream Puts Data in Motion

Automotive data in the cloud breaks silos, allowing teams to analyze information in the pursuit of identifying exciting new revenue opportunities.

More Details

2022 グローバルモビリティ サイバーセキュリティ報告書

2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を

More Details

Leading the Charge: Securing Charging Station Infrastructures

Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by tampering with charging station data.

More Details

Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue

There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected capability such as GPS, mobile…

More Details

Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats

Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.

More Details