This curriculum spans the technical and organisational practices found in multi-workshop cybersecurity integration programs, addressing threat modeling, secure development, cryptographic deployment, and supply chain controls as applied across vehicle lifecycle phases from architecture design to post-deployment incident response.
Module 1: Threat Modeling for Automotive Systems
- Conduct STRIDE-based threat assessments on vehicle ECUs to identify spoofing and tampering risks in CAN and Ethernet communications.
- Map attack surfaces across telematics units, infotainment systems, and over-the-air (OTA) update mechanisms using data flow diagrams.
- Collaborate with hardware and software teams to classify trust boundaries between domain controllers and legacy subsystems.
- Integrate threat modeling outputs into system requirements to enforce security controls during vehicle architecture design.
- Update threat models iteratively as new components (e.g., V2X modules) are introduced in vehicle platforms.
- Document and prioritize risks using DREAD scoring, ensuring alignment with ISO/SAE 21434 risk assessment procedures.
Module 2: Secure Software Development Lifecycle (S-SDLC) Integration
- Enforce mandatory static application security testing (SAST) gates in CI/CD pipelines for embedded automotive software builds.
- Define secure coding standards for C/C++ used in microcontroller-based ECUs, focusing on memory safety and input validation.
- Implement binary composition analysis to detect open-source components with known vulnerabilities in infotainment applications.
- Coordinate security peer reviews during sprint planning in Agile teams developing OTA update managers.
- Integrate dynamic analysis (DAST) for web-based vehicle services exposed via APIs or cloud connectivity.
- Track and remediate security defects in issue management systems with traceability to functional safety (ISO 26262) work products.
Module 3: Cryptographic Implementation in Embedded Environments
- Select and deploy lightweight cryptographic algorithms (e.g., AES-128, ECDSA) suitable for resource-constrained ECUs.
- Manage lifecycle of cryptographic keys used in secure boot processes, including generation, storage, and revocation.
- Implement hardware-backed key storage using Trusted Platform Modules (TPMs) or Hardware Security Modules (HSMs) in gateways.
- Configure secure communication channels (TLS 1.3, DTLS) for vehicle-to-cloud data transmission with certificate pinning.
- Audit cryptographic module compliance with FIPS 140-2 or equivalent standards in safety-critical systems.
- Address side-channel attack risks in cryptographic operations executed on shared vehicle processors.
Module 4: Secure Communication Protocols and Network Segmentation
- Design and enforce CAN FD message authentication using MACs to prevent injection attacks on high-speed buses.
- Implement firewall rules in zone controllers to restrict traffic between infotainment and powertrain domains.
- Configure Ethernet AVB/TSN networks with VLAN segmentation and IEEE 802.1X port-based access control.
- Deploy intrusion detection systems (IDS) on central gateways to monitor anomalous CAN message frequencies or payloads.
- Validate secure routing policies between vehicle domains and external networks via cellular or Wi-Fi interfaces.
- Test resilience of communication stacks against denial-of-service conditions during ECU stress testing.
Module 5: Over-the-Air (OTA) Update Security
- Design end-to-end signed and encrypted update packages with rollback protection to prevent downgrade attacks.
- Implement secure update coordination between vehicle gateway and individual ECUs using Uptane framework principles.
- Validate update integrity at each ECU using hardware-rooted trust chains before flashing new firmware.
- Enforce role-based access controls for OTA deployment pipelines to prevent unauthorized release approvals.
- Monitor and log OTA update attempts across fleets to detect coordinated tampering or replay attacks.
- Establish fallback mechanisms and safe states for ECUs that fail during update processes.
Module 6: Vulnerability Management and Incident Response
- Operate a coordinated vulnerability disclosure program (CVD) to receive and triage security reports from external researchers.
- Classify vulnerabilities using CVSS scores and map them to vehicle-specific exploitability in different driving states.
- Develop and test incident response playbooks for scenarios such as telematics server compromise or ECU takeover.
- Coordinate with OEMs, suppliers, and regulatory bodies during disclosure of critical vulnerabilities (e.g., under WP.29 regulations).
- Deploy runtime application self-protection (RASP) techniques in Android-based infotainment systems to detect exploitation.
- Conduct red team exercises simulating remote attacks via Bluetooth, Wi-Fi, or cellular attack vectors.
Module 7: Compliance and Regulatory Alignment
- Map security controls to ISO/SAE 21434 requirements for cybersecurity management system (CSMS) documentation.
- Prepare audit evidence for UNECE WP.29 R155 (cybersecurity) and R156 (software updates) compliance assessments.
- Integrate cybersecurity risk assessments into vehicle type approval processes with designated technical services.
- Ensure data protection in connected vehicle services aligns with GDPR or equivalent privacy regulations.
- Document security rationale for deviations from best practices due to legacy system constraints or cost-bounded platforms.
- Update compliance artifacts annually or after significant architectural changes in vehicle electronic systems.
Module 8: Third-Party and Supply Chain Risk Management
- Enforce security requirements in supplier contracts for software components delivered with known SBOMs.
- Audit Tier 1 and Tier 2 suppliers’ adherence to secure development practices through on-site assessments.
- Validate firmware images from external vendors using cryptographic hashing and signature verification.
- Monitor supplier networks for exposure of development tools or build servers that could enable supply chain compromise.
- Establish secure handoff procedures for software components moving from supplier to OEM integration teams.
- Respond to third-party vulnerabilities (e.g., in open-source libraries) with patch deployment timelines based on vehicle risk exposure.