An Integrated View on Automotive SPICE, Functional Safety and Cyber-Security 2020-01-0145
The automotive domain has seen safety engineering at the forefront of the industry’s priorities for the last decade. Therefore, additional safety engineering efforts, design approaches, and well-established safety processes have been stipulated. Today many connected and automated vehicles are available and connectivity features and information sharing are increasingly used. This increases the attractiveness of an attack on vehicles and thus introduces new risks for vehicle cybersecurity. Thus, just as safety became a critical part of the development in the late 20th century, the automotive domain must now consider cybersecurity as an integral part of the development of modern vehicles.
Aware of this fact, the automotive industry has, therefore, recently taken multiple efforts in designing and producing safe and secure connected and automated vehicles. As the domain geared up for the cybersecurity challenges, they leveraged experiences from many other domains, but must face several unique challenges. For that aim, the domain invested multiple efforts in the development of industry standards to tackle automotive cybersecurity issues and protect their assets. The joint working group of the standardization organizations ISO and SAE has recently established and published a committee draft of the”ISO/SAE CD 21434 Road Vehicles - Cybersecurity Engineering” standard.
This paper will summarize the previous results and extensions of the SoQrates assessment model, the working group’s vision and work from prior publications, how Automotive SPICE can also support the auditing of projects with close security relations, also in the context of the new ISO/SAE CD 21434. This work will show enhanced and adapted approach details for the new ISO/SAE CD 21434 norm requirements. Further, we propose a structured method for integrating security and safety engineering in the existing Automotive SPICE context. Additionally, provide methodical descriptions for the security development based on an in-depth treatment on signal and data-level to determine the essential security architecture requirements on the system level.