Skip to main content

US DOT issues federal guidance for improving motor vehicle cyber security

The US Department of Transportation's National Highway Traffic Safety Administration (NHTSA) is taking a proactive safety approach to protect vehicles from malicious cyber-attacks and unauthorised access by releasing proposed guidance for improving motor vehicle cyber security. The proposed cyber security guidance focuses on layered solutions to ensure vehicle systems are designed to take appropriate and safe actions, even when an attack is successful. The guidance recommends risk-based prioritised ident
October 25, 2016 Read time: 2 mins
The 324 US Department of Transportation's National Highway Traffic Safety Administration (NHTSA) is taking a proactive safety approach to protect vehicles from malicious cyber-attacks and unauthorised access by releasing proposed guidance for improving motor vehicle cyber security.

The proposed cyber security guidance focuses on layered solutions to ensure vehicle systems are designed to take appropriate and safe actions, even when an attack is successful. The guidance recommends risk-based prioritised identification and protection of critical vehicle controls and consumers' personal data. Further, it recommends that companies should consider the full life-cycle of their vehicles and facilitate rapid response and recovery from cyber security incidents.

This guidance also highlights the importance of making cyber security a top leadership priority for the automotive industry, and suggests that companies should demonstrate it by allocating appropriate and dedicated resources, and enabling seamless and direct communication channels though organisational ranks related to vehicle cyber security matters.

"Cyber security is a safety issue, and a top priority at the Department," said US Transportation Secretary Anthony Foxx. "Our intention with today's guidance is to provide best practices to help protect against breaches and other security failures that can put motor vehicle safety."

"In the constantly changing environment of technology and cyber security, no single or static approach is sufficient," said NHTSA Administrator Dr Mark Rosekind. "Everyone involved must keep moving, adapting, and improving to stay ahead of the bad guys."

In addition to product development, the guidance suggests best practices for researching, investigating, testing and validating cyber security measures, NHTSA recommends the industry self-audit and consider vulnerabilities and exploits that may impact their entire supply-chain of operations. The safety agency also recommends employee training to educate the entire automotive workforce on new cyber security practices and to share lessons learned with others.

For more information on companies in this article

Related Content

  • Opinion: With e-scooters sharing is caring
    April 25, 2022
    Micromobility use is expanding: Voi’s Matthew Pencharz explains why lawmakers need to catch up with the growth of e-scooters in particular and the implications for safety
  • IRF World Congress 2024: 'Silent pandemic' of road deaths must be reduced
    October 16, 2024
    Day 1 of three-day meeting in Istanbul focuses on sustainability and safety
  • 'No lack of political drive' on ITS
    June 11, 2012
    This issue of ITS International contains a feature article based on interviews with leading figures of the ITS associations of the United States, Europe, Japan and Malaysia. A key point made is the importance of political leadership or policy direction in driving take up and implementation of ITS technology. This industry actually need not complain of a lack of drive on the part of politicians, or so it seems from other projects reported in this issue. True, the US would welcome a new transport bill and the
  • V2X: “The stars are aligning,” says Qualcomm’s Jim Misener
    July 5, 2023
    The roll-out of Vehicle to Everything technology has been given a massive boost by the US Federal Communications Commission: Adam Hill talks to Qualcomm’s Jim Misener and Andres Castrillon to find out why it matters so much – and what the next steps to mass deployment are