Automotive cybersecurity: 360-degree framework for comprehensive cybersecurity
Published March 5, 2024
- Automotive & Industry
- Cybersecurity

Cybersecurity as a decisive competitive factor
In a world where everything is more connected and more digitalized than ever, risks and threats are decupled. Whether it is about protecting corporate data, customers’ privacy or the safety of the vehicles, automotive manufacturers have to consider Cyber Security during the complete product life cycle, at each level of the company. Every, thousands of cyber attacks occur everywhere in the world. For the automotive industry, it represents a very important threat as the risks are decupled with the software-defined vehicles.
End-to-End Automotive Cybersecurity: Navigating the 4 Pivotal Levels
What & Why: Threats and Risks have evolved very quickly over the past years in the automotive industry. To face them, companies have to address Cyber Security from end-to-end, which requires a structured approach and organization, a strong governance and strategy from the beginning.
Major challenges: Considered for a long time as a niche topic, Cyber Security was delegated by executives to operational teams and experts. Poor attention was paid to it, resulting in low budgets and only partial risk understanding and mitigation.
Our conviction: Deploying technical solutions alone does not define the security of a product or entity. The executive level must increase their understanding of the new risks and threats and show a strong commitment to their product security lifecycle. Cyber Security can become a competitive differentiating factor for automotive players if addressed with the right budget and at the right level.
What & Why: Integrating security into a product can be expensive – especially during later development stages. That is why development must follow a “security-by-design” approach. This concept involves a risk-based analysis, clear requirements and architecture focused on security.
Major challenges: Identifying risks and aligning security objectives with business strategy can be a source of internal conflicts. Moreover, multiple stakeholders are involved in security activities, from system architects to developers, together with many suppliers.
Our conviction: Delivering a secure product relies heavily on teams that can take the necessary actions in a security-by-design approach. This requires a strong security mindset within the teams. Security must become one of the core driven-principles for the product design, at the same level as the business strategy or market demands.
What & Why: Besides classic OT security threats, the switch from R&D to production is critical for product security. It is the final stage of the development to address risks and to lock down the product before it is released to clients. It is also the moment when individual cryptographic secrets are integrated into each vehicle; hence production is an important element in the security chain.
Major challenges: In mass production, the pressure for delivery is extreme. With multiple parts coming from different providers, it is complex to integrate individual keys or certificates for each product and to ensure closing open interfaces. Moreover, the industrial environment is a tricky one to keep secrets; older technologies, many employees involved, etc.
Our conviction: The production phase will face a major change in the next year with the increase of the software part inside the vehicles and the associated cryptographic secrets to be deployed to guarantee security. The production capabilities must be considered during the security-by-design phase. Also, the security topic shall not be underestimated when considering the upgrade cycle of factories and production equipment (Industry 4.0).
What & Why: Vehicles are increasingly defined by software – amplified by connected and “partly-automated” driving functions. In this context, Security can only be maintained of software and security measures can be upgraded. Additionally, and despite all measures, incidents will happen. OEMs must prepare to react accordingly – while cars are running on the streets.
Major challenges: The quick addition of software features in released products will increase the vulnerabilities; dealing with them while cars are in the field – sometimes offline – is a real challenge. This trend will be amplified by over-the-air updates – a Software Update Management Systems (SUMS) will have to be set up. In order to manage this post-production phase, it requires operational security teams with associated processes and incident/crisis management capabilities. This is expensive and demands a lot of resources and competencies.
Our conviction: Automotive world has been for long focused on development phases, to implement safety, and now security. However, the operational part, post-production, remains a dead-angle of the security concept. OEMs shall take the complete end-to-end security chain, from development to decommission, to ensure security and safety into consideration. These operational costs for continuous update and monitoring may even result in a service-oriented business model.
Automotive Cybersecurity Framework
Ensure cyber security along the entire product lifecycle with a good strategy, clear guidelines and established solutions.
Authors
-
Dr. Thiemo Brandt
Associate Partner – Germany, Stuttgart
Wavestone
LinkedIn