Reader small image

You're reading from  Automotive Cybersecurity Engineering Handbook

Product typeBook
Published inOct 2023
PublisherPackt
ISBN-139781801076531
Edition1st Edition
Right arrow
Author (1)
Dr. Ahmad MK Nasser
Dr. Ahmad MK Nasser
author image
Dr. Ahmad MK Nasser

Dr. Ahmad MK Nasser is an automotive cybersecurity architect with a long experience in securing safety-critical systems. He started his career as a software engineer, building automotive network drivers, diagnostics protocols, and flash programming solutions. This naturally led him into the field of automotive cybersecurity, where he designed secure firmware solutions for various microcontrollers and SoCs, defined secure hardware and software architectures of embedded systems, and performed threat analysis of numerous vehicle architectures, ECUs, and smart sensors. Ahmad holds a B.S. and an M.S. in electrical and computer engineering from Wayne State University, as well as a Ph.D. in computer science from the University of Michigan in Dearborn. He is currently a principal security architect for NVIDIA's autonomous driving software platform.
Read more about Dr. Ahmad MK Nasser

Right arrow

Exploring the Landscape of Automotive Cybersecurity Standards

Designing cyber-resilient automotive systems calls for more than a surface-level understanding of the automotive security threat environment. It necessitates an orderly, process-driven approach that guarantees every facet of vehicle development, production, and operation is guarded against cybersecurity threats. To that end, standardization bodies have published numerous standards on the process and technical measures for protecting vehicles and their supporting systems throughout the vehicle’s life cycle. Such standards establish the state of the art to help organizations understand gaps in their engineering processes and technology offerings. They also provide a framework for maintaining a consistent level of security across the automotive supply chain by adhering to a common set of procedures and practices. Besides complying with the state of the art, abiding by standards helps reduce debate among practitioners...

Primary standards

Three binding standards govern the cybersecurity aspects of how vehicles and their supporting systems are developed, produced, and maintained. Non-compliance with those standards can lead to legal and financial implications for OEMs and suppliers, so let’s take a deeper look.

UNECE WP.29

Different government and international bodies have mandated cybersecurity standards and regulations that govern OEMs within their geographic region. The United Nations Economic Commission for Europe (UNECE) World Forum for Harmonization of Vehicle Regulations (WP.29) has defined two such regulations that apply to members of the UNECE region [17]. The first regulation concerns the mandate for automotive manufacturers to implement a Cybersecurity Management System (CSMS) [3], while the second concerns the regulation for establishing a Software Update Management System (SUMS) [6]. These regulations cover four distinctareas, which include managing the vehicle cybersecurity...

Secondary standards

While the primary standards may provide a holistic framework for engineering secure automotive products, they rely on secondary and supporting standards to address specific technical areas of the engineering life cycle. Awareness of such standards is necessary to judge whether they apply to your organization or product offering.

IATF 16949:2016

Developing automotive products within the framework of a quality management system (QMS) serves as a prerequisite to achieving product security. ISO/SAE 21434 makes adherence to a QMS a requirement, which is reasonable considering the difficulty of arguing that a product is secure while not being able to demonstrate its quality [9]. For example, software developed outside a QMS is expected to contain more bugs due to the lack of formal quality checks, such as code reviews and software tests. A percentage of those software bugs are likely exploitable by an attacker. Without the help of a QMS, we are unable to manage...

Supporting standards and resources

The remaining part of this chapter focuses on standards and resources that are useful but not mandatory. Organizations are encouraged to maintain a list of such resources to raise awareness among security practitioners and stay up to date on the latest publications of security best practices.

MITRE Common Weakness Enumeration (CWE)

MITRE compiles a list of software and hardware security weaknesses based on vulnerabilities that are periodically filed in the National Vulnerability Database (NVD) [72]. These weaknesses are grouped into classes for ease of searching. Every year, MITRE publishes the Top 25 CWEs [42] based on the vulnerabilities reported throughout the year:

Figure 4.9 – Snapshot of the Top 25 CWEs from 2022

Figure 4.9 – Snapshot of the Top 25 CWEs from 2022

As shown in Figure 4.9, CWE-787 remains in the Top 25 CWEs as the most common root cause of memory safety vulnerabilities that produce out-of-bound writes. Being aware of the Top 25 CWEs as...

Summary

In conclusion, understanding and implementing automotive cybersecurity standards is not merely a regulatory requirement but a cornerstone of building cyber-resilient automotive systems. In this chapter, we classified standards into three main categories: primary, secondary, and supporting, to provide a holistic view of the compliance layers. While primary standards form the backbone and are often mandated, secondary and supporting standards play an important role in implementing a robust cybersecurity management system. They also serve as useful resources in understanding security weaknesses and security best practices and offer general guidance for developing secure automotive systems and their supporting infrastructure. Furthermore, compliance with these standards ensures an orderly, process-driven approach that fortifies each stage of the vehicle life cycle, from development to operation. Given the fact that the landscape of automotive cybersecurity is in constant flux,...

References

Besides the standards and references we discussed in this chapter, the following list contains additional resources that are worthy of consideration for further reading:

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Automotive Cybersecurity Engineering Handbook
Published in: Oct 2023Publisher: PacktISBN-13: 9781801076531
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Dr. Ahmad MK Nasser

Dr. Ahmad MK Nasser is an automotive cybersecurity architect with a long experience in securing safety-critical systems. He started his career as a software engineer, building automotive network drivers, diagnostics protocols, and flash programming solutions. This naturally led him into the field of automotive cybersecurity, where he designed secure firmware solutions for various microcontrollers and SoCs, defined secure hardware and software architectures of embedded systems, and performed threat analysis of numerous vehicle architectures, ECUs, and smart sensors. Ahmad holds a B.S. and an M.S. in electrical and computer engineering from Wayne State University, as well as a Ph.D. in computer science from the University of Michigan in Dearborn. He is currently a principal security architect for NVIDIA's autonomous driving software platform.
Read more about Dr. Ahmad MK Nasser