ISO 21434 Automotive Cybersecurity

This intensive 3-day course will guide attendees on implementing the ISO 21434 Cybersecurity Standard for Road Vehicles in an engineering organization. Through case studies, Q&A and exercises, attendees will gain valuable insights about this new standard and the overall challenges of managing cybersecurity risk for complex real-time embedded systems.

Day wise Topics
Day 1 Introduction and Cybersecurity Management Framework
  • Introduction, Terms and Definitions for Cyber security in automotive applications
  • Overall Cyber security Management
  • Project dependent Cyber security Management
  • Continuous Cyber security Activities
  • a. Monitoring,
  • b. Event assessment,
  • c. Vulnerabilities analysis and
  • d. Vulnerabilities Management
  • Security standards (e.g. UNECE-SUMS, UNECE-CSMS, ISO-21434, NHTSA, IEC 62304)
  • Risk Assessment Methodology
  • Threat analysis and risk assessment (TARA)
Day 2 Framework Cybersecurity Implementation
  • Case example on TARA and security engineering from Asset identification to Security concept
  • Efficient implementation of security in the lifecycle from the security assets to the risk analysis to the consistent implementation throughout the entire lifecycle
  • Concept phase
  • Item Definition
  • Cyber security Goals
  • Cyber security concepts
  • Cyber security requirements, design, Verification, Validation and Life-Cycle Management
  • Design for security, e.g. Secure Boot and SecOC
Day 3 Cyber security Testing with case examples
  • Cyber security Testing with case examples
  • a. Cybersecurity testing: pen testing and fuzz testing
  • Automotive Cybersecurity Strategies
  • a. Embedded systems security developments,
  • b. Intrusion and threat detection strategies ,
  • Automotive Embedded System Vulnerability Analysis
  • a. Networking and network attacks
  • b. Wireless networks and embedded systems
  • c. Embedded hardware and firmware analysis
  • Automotive Cybersecurity and Layers of Protection
  • a. Fundamental Vehicle Cybersecurity Protections
  • b. Protective/preventive measures and techniques
  • c. Real-time intrusion (hacking) detection measures
  • d. Real-time response methods
  • e. Assessment of solutions
  • f. Layered Approach
  • Cybersecurity Best Practices for Modern Vehicles
  • Use Segmentation and Isolation Techniques in Vehicle Architecture Design
  • Cyber security incident Response and Updates in Post development processes

We support to Integrate cybersecurity into existing workflows and allow organizations to reduce the likelihood of an incident occurring and save time and money in addressing cybersecurity defects.