Skip to main content

Automotive industry releases vehicle cybersecurity best practices

Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry. The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat de
July 22, 2016 Read time: 2 mins
Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry.     

The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat detection and protection incident response, security by design, awareness and training and more.

The Best Practices provide deep technical and organizational breadth to support, develop, and improve defences against potential cybersecurity threats of the motor vehicle network. They are grounded in ISO, NIST and other established cybersecurity frameworks but are tailored to the motor vehicle. Auto-ISAC members have committed to continuously enhancing the Best Practices over time to keep pace with the constantly evolving cyber landscape.

"Automakers are committed to being proactive and will not wait for cyber threats to materialise into safety risks," said Auto-ISAC chairman Tom Stricker of Toyota.

Related Content

  • ITS need not reinvent machine vision
    October 29, 2014
    Machine vision techniques hold the potential to solve a multitude of challenges facing the transportation sector Optical Character Recognition (OCR), the base technology for number plate recognition, has been in industrial use for more than three decades. It is a prime example of how, instead of having to start from scratch, the transportation sector can leverage and adapt the machine vision expertise already used in industry in order to provide robust solutions with new capabilities. “The real val
  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y
  • Transportation infrastructure technology continues its advance
    July 17, 2012
    It is now 20 years since publication of the Strategic Plan for Intelligent Vehicle Highway Systems. A select group of luminary figures of the ITS industry give their assessment of progress to date This year the IVHS Strategic Plan turns 20, signaling the graduation of the field of Intelligent Transportation Systems from its tumultuous teens to young adulthood. After two decades tethered by the cords of youth and protected by the strict control of adult institutions, ITS has reached a turning point. Its y