Focuses on cybersecurity for automotive systems, addressing risk management in vehicle software, hardware, and networks.
Core Components:
-
Threat and Risk Assessment (TARA)
-
Incident response planning
-
Secure design principles for vehicle systems
Focuses on cybersecurity for automotive systems, addressing risk management in vehicle software, hardware, and networks.
Core Components:
Threat and Risk Assessment (TARA)
Incident response planning
Secure design principles for vehicle systems
Deals with functional safety in electrical and electronic systems in road vehicles, introducing the concept of Automotive Safety Integrity Levels (ASIL) to assess risks.
Core Components:
Safety management across the supply chain
Mandates cybersecurity measures in vehicle design, manufacturing, and maintenance and establishes a baseline for regulatory compliance in global markets.
Core Components:
Focuses on software update management for road vehicles and encompasses secure methods for over-the-air (OTA) updates.
Core Components:
A broad cybersecurity standard for industrial automation, including connected vehicles, that advocates for defense-in-depth strategies.
Core Components:
A proposed set of rules aimed at safeguarding the connected vehicle supply chain by regulating the software and hardware used in connected vehicles — particularly those originating from China and Russia.
(Proposed) Core Components:
Proposed deadline: 2027 for software, 2030 for hardware (or 2029 for units without a model year)
"Finite State's continuous monitoring plays a crucial part in our ability to surface both regulatory and compliance needs"
Cybersecurity measures must be implemented throughout the product lifecycle to reduce vulnerabilities in automotive systems and enhance resilience against cyber threats.
Automotive systems must be monitored in real-time to detect potential security threats, anomalies, or vulnerabilities before they can be exploited.
Manufacturers must conduct regular assessments to identify, evaluate, and prioritize risks in their automotive systems to stay ahead of evolving threats.
A detailed list of all software components within a vehicle must be maintained, including any open-source and third-party components.
Automotive manufacturers must have a comprehensive strategy for detecting, responding to, and recovering from cybersecurity incidents.
Third-party vendor and supplier management protocols must be implemented to ensure that every component used in vehicles meets cybersecurity standards.