Overview of ISO/SAE 21434 Standard




ISO/SAE 21434, jointly published by the International Standardization Organization (ISO) and the Society of Automotive Engineers (SAE), serves as a comprehensive cybersecurity framework for electronic systems within road vehicles. Developed to bolster cybersecurity across the entire lifecycle of automotive products, this standard outlines essential vocabulary, objectives, requirements, and guidelines.


Purpose and Scope:

The primary objective of ISO/SAE 21434 is to enhance cybersecurity measures for vehicles throughout their lifecycle. By providing a standardized framework, this standard facilitates the establishment of cybersecurity policies, risk management practices, and a cybersecurity-oriented culture within organizations operating in the automotive industry.


Three Pillars:

ISO/SAE 21434 is structured around three main pillars:

  • Cyber Security Governance:  
    • Establishing policies, processes, and cultural norms to govern cybersecurity activities within organizations.

  • Risk Management:
    • Incorporating threat analysis, risk assessment, supply chain management, and cybersecurity operations to mitigate cybersecurity risks effectively.

  • Cyber Security Culture:
    • Fostering a culture of secure development practices, cybersecurity awareness, and continuous improvement.



Clause 5: Organizational Cybersecurity Management:

This clause delineates the organizational responsibilities and processes essential for effective cybersecurity management. Key elements include defining cybersecurity policies, assigning responsibilities, managing cybersecurity risks, fostering a cybersecurity culture, and conducting cybersecurity audits.


Corresponding Work Products:

Work products associated with Clause 5 include cybersecurity governance documents, RASIC tables, Information Security Charters, Cyber Incident Response Plans, Cybersecurity Culture initiatives, Data Classification Policies, organizational Quality Management Systems (QMS), cybersecurity metrics, and cybersecurity audits.


Clause 6: Project Dependent Cybersecurity Management:

This clause outlines requirements for managing cybersecurity activities specific to individual projects. It encompasses responsibilities allocation, cybersecurity planning, tailoring of cybersecurity activities, component analysis, and risk assessment for off-the-shelf components.


Clause 9: Concept Phase:

During the concept phase, organizations define the item in development, establish cybersecurity goals, and outline cybersecurity concepts necessary to meet these goals. This phase also entails conducting Threat Assessment and Risk Analysis (TARA) to identify potential cybersecurity risks.


Chapter 15: TARA and Risk Management:

This chapter emphasizes asset identification, threat scenario identification, impact rating, attack paths analysis, attack feasibility rating, risk value determination, and risk treatment decision, all integral to effective risk management.


Chapters 10-14: Product Development and Post Development Phases:

These chapters delineate product development activities, including secure system development procedures, architecture design, manufacturing requirements, vulnerability management, component-level and vehicle-level tests, and validation of cybersecurity goals.


Clause 13: Operations & Maintenance Phase:

During this phase, organizations establish cybersecurity incident response procedures, update mechanisms, and define end-of-support and decommissioning protocols to ensure ongoing cybersecurity resilience.


Incident Response Plan:

Preparing a formal incident response plan is crucial for defending against cyberattacks and breaches. Such a plan typically includes remediation actions, communication protocols, assigned responsibilities, progress tracking mechanisms, closure criteria, and lessons learned documentation.


By adhering to the guidelines outlined in ISO/SAE 21434, organizations can fortify their cybersecurity posture, mitigate risks, and foster a culture of vigilance and resilience against emerging cyber threats in the automotive industry.

Comments

Popular posts from this blog

Cryptography and Encryption Basics - I

UDS Protocol Interview Question