A Beginner's Guide to Automotive Security Testing: Requirements and Overcoming Challenges

people

Poonam Junjunwala

. 2 min read

Automotive security testing goes beyond physically hacking a car or vehicle. It encompasses the entire ecosystem of a connected vehicle, including its external communication and internal operations. With the increasing connectivity of cars to wireless networks, apps, electronic components, and even video chat capabilities, ensuring end-to-end security has become crucial in the automotive industry.


Requirements for Securing Automotive Software

To enhance security and prevent hacks, governments and international organizations have developed guidelines and requirements for secure automotive software development. Following these best practices will help implement robust security measures in in-vehicle solutions. Some notable guidelines include:

Cybersecurity Best Practices for the Safety of Modern Vehicles by the US National Highway Traffic Safety Administration (non-binding, regularly updated).

UN regulations Nos. 155, 156, and 157, which describe requirements for vehicle cybersecurity, security management, and software updates. These regulations will become mandatory for UNECE member countries in July 2024.

The draft of Provisions on Management of Automotive Data Security by the Cyberspace Administration of China, expected to be implemented and made mandatory in 2021.

Importance of Automotive Cybersecurity

As the automotive industry embraces electronic road vehicles, the increased connectivity and reliance on software introduce new challenges. The growing complexity and code volume in modern cars expose them to potential vulnerabilities and attacks, jeopardizing safety and raising cybersecurity concerns. The importance of automotive cybersecurity cannot be overstated, as it necessitates a revolutionary approach to designing and developing cars.

Identifying Automotive Cybersecurity Risks

Every technology-dependent industry has its unique security "attack surface," and the automotive sector is no exception. In a survey, a majority of respondents expressed concerns about malicious attacks on their software or components within the next 12 months. Two components were highlighted as posing the greatest cybersecurity risks: RF technology and telematics. These technologies, although common in vehicles, were not purpose-built for automotive use, making them potentially vulnerable.

The Six Principles of Security Testing to Secure the Environment

To establish a secure environment, security testing follows six key principles:

  1. Confidentiality: Protects against the unauthorized disclosure of information.
  2. Integrity: Maintains the accuracy, consistency, and trustworthiness of data throughout its lifecycle.
  3. Authentication: Verifies the identity of users and ensures the origin of received information.
  4. Authorization: Specifies access rights for users based on their roles.
  5. Availability: Ensures that information is readily accessible when required.
  6. Non-repudiation: Prevents denial from senders or receivers regarding sent or received messages.

Conclusion

This article aimed to provide a beginner's overview of automotive security testing. It emphasized the importance of securing the entire ecosystem of connected vehicles and highlighted the requirements and best practices recommended by governments and international organizations. By implementing robust security measures and following the principles of security testing, the automotive industry can mitigate risks and ensure safer and more secure vehicles. In the next blog post, we will delve into the attack surface of cars/vehicles, providing further insights into this critical aspect of automotive security. We hope you found this article informative and engaging.