Skip to main content

Vehicle cybersecurity guidebook published

SAE International has published its guidebook on vehicle cybersecurity, SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Standards, which establishes a set of high-level guiding principles for cybersecurity as it relates to cyber-physical vehicle systems. The guidebook includes: Definition of a complete lifecycle process framework that can be tailored and utilised within each organisation’s development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept ph
January 21, 2016 Read time: 2 mins
567 SAE International has published its guidebook on vehicle cybersecurity, SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Standards, which establishes a set of high-level guiding principles for cybersecurity as it relates to cyber-physical vehicle systems.

The guidebook includes: Definition of a complete lifecycle process framework that can be tailored and utilised within each organisation’s development processes to incorporate cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning;  Information on some common existing tools and methods used when designing, verifying and validating cyber-physical vehicle systems; Basic guiding principles on cybersecurity for vehicle systems; The foundation for further standards development activities in vehicle cybersecurity.

“This first in the world SAE Recommended Practice for automotive cyber security was developed by an international group of top experts in the field,” said Jack Pokrzywa, director of ground vehicle standards for SAE International.

“It describes commonly structured process to ensure that cybersecurity is built in to the design throughout all phases of product development from concept through product design, verification/validation, deployment, service & disposal. As a result, the likelihood of a successful attack is reduced.”

For more information on companies in this article

Related Content

  • European ITS Directive: From Minority Report to majority rapport
    December 1, 2023
    A 21-year old movie by Steven Spielberg appears to predict a C-ITS Day 3 use case. Richard Lax of Kapsch TrafficCom looks at the new European ITS Directive and idly wonders whether the great Hollywood movie director was once a European Commission intern in DG Move…
  • On a WIM – a global view of weigh in motion
    May 25, 2016
    Q-Free’s Andrew Lees looks at regional characteristics and technology trends in the global Weigh-In-Motion market. The principles of Weigh-In-Motion (WIM) are well established. Data derived from vehicles passing over in-ground sensors can be interpreted for vehicle classification (axle counts and spacing) and positive identification (especially when linked to image capture) applications as well as to derive individual axle and gross vehicle weight (GVW).
  • Low-costs solutions to improve pedestrian safety
    May 8, 2015
    David Crawford welcomes low-cost safety initiatives for pedestrians in America. Some 10 people die each week in accidents on crosswalks in the US, that’s more than 10% of all pedestrian fatalities in road traffic incidents - the number of which is running at a five-year high. Ensuring crosswalks are safe is key in supporting the growing enthusiasm for walking as a travel mode. In the last decade of the 20th century, numbers walking to work in the US fell by 26%; while, as recently as 2012, Americans were e
  • Gridsmart creates cybersecurity division
    May 11, 2018
    Gridsmart Technologies has formed a cyber security group to help transportation industry technology and infrastructure partners build security programmes for their organisations. The Gridsmart Information Security and Threat Intelligence Division (ISTI) will provide vulnerability and threat assessments and tailored security strategies to private companies, state and municipal Departments of Transportations and other groups working to enhance their technical infrastructure. ISTI, led by cyber security