Skip to main content

Automotive industry releases vehicle cybersecurity best practices

Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry. The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat de
July 22, 2016 Read time: 2 mins
Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry.     

The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat detection and protection incident response, security by design, awareness and training and more.

The Best Practices provide deep technical and organizational breadth to support, develop, and improve defences against potential cybersecurity threats of the motor vehicle network. They are grounded in ISO, NIST and other established cybersecurity frameworks but are tailored to the motor vehicle. Auto-ISAC members have committed to continuously enhancing the Best Practices over time to keep pace with the constantly evolving cyber landscape.

"Automakers are committed to being proactive and will not wait for cyber threats to materialise into safety risks," said Auto-ISAC chairman Tom Stricker of Toyota.

Related Content

  • C2A and NXP unveil cybersecurity solution for C/AVs
    September 25, 2019
    C2A Security has launched a cybersecurity solution for connected and autonomous vehicles (C/AVs) that uses NXP Semiconductors’ CAN (Controller Area Network) transceivers. C2A says the transceivers detect and prevent malicious activity on the vehicle’s CAN bus. The solution also includes the C2A Stamper firewall and the SecMon intrusion detection software to detect potentially malicious activity. It also uses an in-vehicle System on Chip to enable an appropriate response, the company adds. Nathanie
  • More than 20 million connected cars with built-in software-based security by 2020
    February 14, 2014
    The findings of ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This
  • MaaS will be adopted quicker in Europe than in the US: here’s why
    December 5, 2018
    A new report suggests that MaaS will be implemented more quickly in Europe than in the US – but why should this be? Ben Spencer examines the arguments
  • Harman and Airbiquity join forces on intrusion detection solution for connected vehicles
    November 1, 2016
    US connected technologies companies Harman International Industries and Airbiquity have announced the first automotive grade end-to-end intrusion detection system (IDS) for connected vehicles at TU-Automotive Europe 2016 in Munich, Germany. The solution combines Harman's intrusion detection and prevention system inside the vehicle with Airbiquity's cloud-based Choreo service delivery platform and software and data management solution to provide a robust connected vehicle security threat detection and res