ISO/SAE 21434:2021
(Main)Road vehicles — Cybersecurity engineering
Road vehicles — Cybersecurity engineering
This document specifies engineering requirements for cybersecurity risk management regarding concept, product development, production, operation, maintenance and decommissioning of electrical and electronic (E/E) systems in road vehicles, including their components and interfaces. A framework is defined that includes requirements for cybersecurity processes and a common language for communicating and managing cybersecurity risk. This document is applicable to series production road vehicle E/E systems, including their components and interfaces, whose development or modification began after the publication of this document. This document does not prescribe specific technology or solutions related to cybersecurity.
Véhicules routiers — Ingénierie de la cybersécurité
General Information
Standards Content (Sample)
INTERNATIONAL ISO/SAE
STANDARD 21434
First edition
2021-08
Road vehicles — Cybersecurity
engineering
Véhicules routiers — Ingénierie de la cybersécurité
Reference number
©
ISO/SAE International 2021
© ISO/SAE International 2021
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication
may be reproduced, or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or
posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO or SAE
International at the respective address below or ISO’s member body in the country of the requester.
ISO copyright office SAE International
CP 401 • Ch. de Blandonnet 8 400 Commonwealth Dr.
CH-1214 Vernier, Geneva Warrendale, PA, USA 15096
Phone: +41 22 749 01 11 Phone: 877-606-7323 (inside USA and Canada)
Phone: +1 724-776-4970 (outside USA)
Email: copyright@iso.org Fax: 724-776-0790
Website: www.iso.org Email: CustomerService@sae.org
Website: www.sae.org
Published in Switzerland by ISO, published in the USA by SAE International
ii © ISO/SAE International 2021 – All rights reserved
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
SAE International is a global association of more than 128,000 engineers and related technical experts
in the aerospace, automotive and commercial-vehicle industries. Standards from SAE International
are used to advance mobility engineering throughout the world. The SAE Technical Standards
Development Program is among the organization's primary provisions to those mobility industries
it serves aerospace, automotive, and commercial vehicle. These works are authorized, revised, and
maintained by the volunteer efforts of more than 9,000 engineers, and other qualified professionals
from around the world. SAE subject matter experts act as individuals in the standards process, not
as representatives of their organizations. Thus, SAE standards represent optimal technical content
developed in a transparent, open, and collaborative process.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1 and the SAE Technical Standards Board Policy. In particular,
the different approval criteria needed for the different types of ISO documents should be noted. This
document was drafted in accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www
.iso. org/d irectives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and SAE International shall not be held responsible for identifying any or all such
patent rights. Details of any patent rights identified during the development of the document will be in
the Introduction and/or on the ISO list of patent declarations received (see www. iso. org/p atents).
SAE Technical Standards Board Rules provide that: “This document is published to advance the state of
technical and engineering sciences. The use of this document is entirely voluntary, and its applicability
and suitability for any particular use, including any patent infringement arising therefrom, is the sole
responsibility of the user.”
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www. iso. org/
iso/f oreword. html.
This document was jointly prepared by Technical Committee ISO/TC 22, Road vehicles, Subcommittee
SC 32, Electrical and electronic components and general system aspects, and SAE TEVEES18A Vehicle
Cybersecurity Systems Engineering Committee.
[37]
This first edition of ISO/SAE 21434 cancels and supersedes SAE J3061: 2016 .
The main changes are as follows:
— complete rework of contents and structure.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www. iso. org/ members. html. Alternatively, to provide
feedback on this document, please visit https://ww w. sae. org/standards /content /I S O/ SA E 2143 4/.
© ISO/SAE International 2021 – All rights reserved iii
Introduction
Purpose of this document
This document addresses the cybersecurity perspective in engineering of electrical and electronic
(E/E) systems within road vehicles. By ensuring appropriate consideration of cybersecurity, this
document aims to enable the engineering of E/E systems to keep up with state-of-the-art technology
and evolving attack methods.
This document provides vocabulary, objectives, requirements and guidelines related to cybersecurity
engineering as a foundation for common understanding throughout the supply chain. This enables
organizations to:
— define cybersecurity policies and processes;
— manage cybersecurity risk; and
— foster a cybersecurity culture.
This document can be used to implement a cybersecurity management system including cybersecurity
risk management.
Organization of this document
An overview of the document structure is given in Figure 1. The elements of Figure 1 do not prescribe
an execution sequence of the individual topics.
iv © ISO/SAE International 2021 – All rights reserved
Figure 1 — Overview of this document
Clause 4 (General considerations) is informational and includes the context and perspective of the
approach to road vehicle cybersecurity engineering taken in this document.
Clause 5 (Organizational cybersecurity management) includes the cybersecurity management and
specification of the organizational cybersecurity policies, rules and processes.
Clause 6 (Project dependent cybersecurity management) includes the cybersecurity management and
cybersecurity activities at the project level.
Clause 7 (Distributed cybersecurity activities) includes requirements for assigning responsibilities for
cybersecurity activities between customer and supplier.
Clause 8 (Continual cybersecurity activities) includes activities that provide information for ongoing
risk assessments and defines vulnerability management of E/E systems until end of cybersecurity
support.
Clause 9 (Concept) includes activities that determine cybersecurity risks, cybersecurity goals and
cybersecurity requirements for an item.
Clause 10 (Product development) includes activities that define the cybersecurity specifications, and
implement and verify cybersecurity requirements.
Clause 11 (Cybersecurity validation) includes the cybersecurity validation of an item at the vehicle level.
© ISO/SAE International 2021 – All rights reserved v
Clause 12 (Production) includes the cybersecurity-related aspects of manufacturing and assembly of
an item or component.
Clause 13 (Operations and maintenance) includes activities related to cybersecurity incident response
and updates to an item or component.
Clause 14 (End of cybersecurity support and decommissioning) includes cybersecurity considerations
for end of support and decommissioning of an item or component.
Clause 15 (Threat analysis and risk assessment methods) includes modular methods for analysis and
assessment to determine the extent of cybersecurity risk so that treatment can be pursued.
Clauses 5 through 15 have their own objectives, provisions (i.e. requirements, recommendations,
permissions) and work products. Work products are the results of cybersecurity activities that fulfil
one or more associated requirements.
“Prerequisites” are mandatory inputs consisting of work products from a previous phase. “Further
supporting information” is information that can be considered, which can be made available by sources
that are different from the persons responsible for the cybersecurity activities.
A summary of cybersecurity activities and work products can be found in Annex A.
Provisions and work products are assigned unique identifiers consisting of a two-letter abbreviation
(“RQ” for a requirement, “RC” for a recommendation, “PM” for a permission and “WP” for a work
product), followed by two numbers, separated by hyphens. The first number refers to the clause, and
the second gives the order in the consecutive sequence of provisions or work products, respectively, of
that clause. For example, [RQ-05-14] refers to the 14th provision in Clause 5, which is a requirement.
vi © ISO/SAE International 2021 – All rights reserved
INTERNATIONAL STANDARD ISO/SAE 21434:2021(E)
Road vehicles — Cybersecurity engineering
1 Scope
This document specifies engineering requirements for cybersecurity risk management regarding
concept, product development, production, operation, maintenance and decommissioning of electrical
and electronic (E/E) systems in road vehicles, including their components and interfaces.
A framework is defined that includes requirements for cybersecurity processes and a common language
for communicating and managing cybersecurity risk.
This document is applicable to series production road vehicle E/E systems, including their components
and interfaces, whose development or modification began after the publication of this document.
This document does not prescribe specific technology or solutions related to cybersecurity.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 26262-3:2018, Road vehicles — Functional safety — Part 3: Concept phase
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
ISO Online browsing platform: available at https:// www .iso .org/ obp
IEC Electropedia: available at https:// www .electropedia .org/
3.1.1
architectural design
representation that allows for identification of components (3.1.7), their boundaries, interfaces and
interactions
3.1.2
asset
object that has value, or contributes to value
Note 1 to entry: An asset has one or more cybersecurity properties (3.1.20) whose compromise can lead to one or
more damage scenarios (3.1.22).
3.1.3
attack feasibility
attribute of an attack path (3.1.4) describing the ease of successfully carrying out the corresponding set
of actions
© ISO/SAE International 2021 – All rights reserved 1
3.1.4
attack path
attack
set of deliberate actions to realize a threat scenario (3.1.33)
3.1.5
attacker
person, group, or organization that carries out an attack path (3.1.4)
3.1.6
audit
examination of a process to determine the extent to which the process objectives are achieved
[1]
[SOURCE: ISO 26262-1:2018 , 3.5, modified — The phrase “with regard to” was substituted by "to
determine the extent to which" and "are achieved" was added.]
3.1.7
component
part that is logically and technically separable
3.1.8
customer
person or organization that receives a service or product
[2]
[SOURCE: ISO 9000:2015 , 3.2.4, modified — The phrase “could or does receive” was replaced by
“receives”, the phrase “that is intended for or required by this person or organization” was omitted, and
the example and note 1 to entry were omitted.]
3.1.9
cybersecurity
road vehicle cybersecurity
condition in which assets (3.1.2) are sufficiently protected against threat scenarios (3.1.33) to items
(3.1.25) of road vehicles, their functions and their electrical or electronic components (3.1.7)
Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle
cybersecurity.
3.1.10
cybersecurity assessment
judgement of cybersecurity (3.1.9)
3.1.11
cybersecurity case
structured argument supported by evidence to state that risks (3.1.29) are not unreasonable
3.1.12
cybersecurity claim
statement about a risk (3.1.29)
Note 1 to entry: The cybersecurity claim can include a justification for retaining or sharing the risk.
3.1.13
cybersecurity concept
cybersecurity requirements of the item (3.1.25) and requirements on the operational environment
(3.1.26), with associated information on cybersecurity controls (3.1.14)
3.1.14
cybersecurity control
measure that is modifying risk (3.1.29)
[3]
[SOURCE: ISO 31000:2018 , 3.8, modified — The word "cybersecurity" was added to the term, the
phrase “maintains and/or” was deleted, the notes to entry were deleted.]
2 © ISO/SAE International 2021 – All rights reserved
3.1.15
cybersecurity event
cybersecurity information (3.1.18) that is relevant for an item (3.1.25) or component (3.1.7)
3.1.16
cybersecurity goal
concept-level cybersecurity requirement associated with one or more threat scenarios (3.1.33)
3.1.17
cybersecurity incident
situation in the field that can involve vulnerability (3.1.38) exploitation
3.1.18
cybersecurity information
information with regard to cybersecurity (3.1.9) for which relevance is not yet determined
3.1.19
cybersecurity interface agreement
agreement between customer (3.1.8) and supplier concerning distributed cybersecurity activities (3.1.23)
3.1.20
cybersecurity property
attribute that can be worth protecting
Note 1 to entry: Attributes include confidentiality, integrity and/or availability.
3.1.21
cybersecurity specification
cybersecurity requirements and corresponding architectural design (3.1.1)
3.1.22
damage scenario
adverse consequence involving a vehicle or vehicle function and affecting a road user (3.1.31)
3.1.23
distributed cybersecurity activities
cybersecurity activities for the item (3.1.25) or component (3.1.7) whose responsibilities are distributed
between customer (3.1.8) and supplier
3.1.24
impact
estimate of magnitude of damage or physical harm from a damage scenario (3.1.22)
3.1.25
item
component or set of components (3.1.7) that implements a function at the vehicle level
Note 1 to entry: A system can be an item if it implements a function at the vehicle level, otherwise it is a component.
[1]
[SOURCE: ISO 26262-1:2018 , 3.8, modified — The term “system” has been replaced by “component”,
the phrases “to which ISO 26262 is applied” and “or part of a function” have been omitted and the Note
1 to entry has been replaced.]
3.1.26
operational environment
context considering interactions in operational use
Note 1 to entry: Operational use of an item (3.1.25) or a component (3.1.7) can include use in a vehicle function, in
production, and/or in service and repair.
© ISO/SAE International 2021 – All rights reserved 3
3.1.27
out-of-context
not developed in the context of a specific item (3.1.25)
EXAMPLE Processing unit with assumed cybersecurity requirements to be integrated in different items.
3.1.28
penetration testing
cybersecurity testing in which real-world attacks are mimicked to identify ways to compromise
cybersecurity goals (3.1.16)
3.1.29
risk
cybersecurity risk
effect of uncertainty on road vehicle cybersecurity (3.1.9) expressed in terms of attack feasibility (3.1.3)
and impact (3.1.24)
3.1.30
risk management
coordinated activities to direct and control an organization with regard to risk (3.1.29)
[3]
[SOURCE: ISO 31000:2018 , 3.2]
3.1.31
road user
person who uses a road
EXAMPLE Passenger, pedestrian, cyclist, motorist, or vehicle owner.
3.1.32
tailor, verb
to omit or perform an activity in a different manner compared to its description in this document
3.1.33
threat scenario
potential cause of compromise of cybersecurity properties (3.1.20) of one or more assets (3.1.2) in order
to realize a damage scenario (3.1.22)
3.1.34
triage
analysis to determine the relevance of cybersecurity information (3.1.18) to an item (3.1.25) or
component (3.1.7)
3.1.35
trigger
criterion for triage (3.1.34)
3.1.36
validation
confirmation, through the provision of objective evidence, that the cybersecurity goals (3.1.16) of the
item (3.1.25) are adequate and are achieved
[4]
[SOURCE: ISO/IEC/IEEE 15288:2015 , 4.1.53, modified — The phrase “requirements for a specific
intended use or application have been fulfilled” has been replaced by “cybersecurity goals of the item
are adequate and are achieved”, note 1 to entry has been omitted.]
3.1.37
verification
confirmation, through the provision of objective evidence, that specified requirements have been
fulfilled
[4]
[SOURCE: ISO/IEC/IEEE 15288:2015 , 4.1.54, modified — The note 1 to entry has been omitted.]
4 © ISO/SAE International 2021 – All rights reserved
3.1.38
vulnerability
weakness (3.1.40) that can be exploited as part of an attack path (3.1.4)
[5]
[SOURCE: ISO/IEC 27000:2018 , 3.77, modified — The phrase “of an asset or control” has been omitted;
the phrase “by one or more threats” has been replaced by “as part of an attack path”.]
3.1.39
vulnerability analysis
systematic identification and evaluation of vulnerabilities (3.1.38)
3.1.40
weakness
defect or characteristic that can lead to undesirable behaviour
EXAMPLE 1 Missing requirement or specification.
EXAMPLE 2 Architectural or design flaw, including incorrect design of a security protocol.
EXAMPLE 3 Implementation weakness, including hardware and software defect, incorrect implementation of
a security protocol.
EXAMPLE 4 Flaw in the operational process or procedure, including misuse and inadequate user training.
EXAMPLE 5 Use of an outdated or deprecated function, including cryptographic algorithms.
3.2 Abbreviated terms
CAL cybersecurity assurance level
CVSS common vulnerability scoring system
E/E electrical and electronic
ECU electronic control unit
OBD on-board diagnostic
OEM original equipment manufacturer
PM permission
RC recommendation
RQ requirement
RASIC responsible, accountable, supporting, informed, consulted
TARA threat analysis and risk assessment
WP work product
4 General considerations
An item comprises all electronic equipment and software (i.e. its components) in a vehicle involved in
the realization of a specific functionality at vehicle level, e.g. braking. An item or a component interacts
with its operational environment.
The application of this document is limited to cybersecurity-relevant items and components of a series
production road vehicle (i.e. not a prototype) including aftermarket and service parts. Systems external
© ISO/SAE International 2021 – All rights reserved 5
to the vehicle (e.g. back-end servers) can be considered for cybersecurity purposes but are not in the
scope of this document.
This document describes cybersecurity engineering from the perspective of a single item. The suitable
allocation of functionality to items within the E/E architecture of a road vehicle is not specified in
this document. For the vehicle as a whole, the vehicle E/E architecture or the set of the cybersecurity
cases of its cybersecurity-relevant items and components can be considered. If cybersecurity activities
described in this document are performed on items and components, then unreasonable vehicle
cybersecurity risk is addressed.
The overall cybersecurity risk management of an organization described in this document applies
throughout all lifecycle phases as illustrated in Figure 2.
Figure 2 — Overall cybersecurity risk management
Cybersecurity risk management is applied throughout the supply chain to support cybersecurity
engineering. Automotive supply chains exhibit diverse models of collaboration. Not all cybersecurity
activities apply to all organizations involved in a specific project. Cybersecurity activities can be
tailored to accommodate the needs of a specific situation (see Clause 6). Development partners for a
specific item or component agree on the work-split so that the applicable cybersecurity activities are
performed (see Clause 7).
Figure 3 shows the relationship between an item, function, component and related terms.
6 © ISO/SAE International 2021 – All rights reserved
Figure 3 — Relationship between item, function, component and related terms
Clause 15 describes modular methods for assessment of cybersecurity risk that are invoked in
cybersecurity activities described in other clauses.
Analysis activities in the context of cybersecurity engineering identify and explore potential actions
performed by abstract adversarial actors with malicious intent and the damage that can arise from
the compromise of cybersecurity of the vehicle E/E systems. Coordination between cybersecurity
engineering and expertise from other disciplines can support the in-depth analysis and mitigation of
[6]
specific cybersecurity risks (cf. ISO/TR 4804 ). Cybersecurity monitoring, remediation and incident
response activities complement concept and product development activities as a reactive approach
acknowledging the changing conditions in the environment (e.g. new attack technologies) and the
ongoing need to identify and manage weaknesses and vulnerabilities in road vehicle E/E systems.
A defence-in-depth approach can be used to mitigate cybersecurity risk. The defence-in-depth approach
utilizes layers of cybersecurity controls to improve the cybersecurity of the vehicle. If an attack is able
to penetrate or bypass one layer, another layer can help contain the attack and maintain protection of
the assets.
5 Organizational cybersecurity management
5.1 General
To enable cybersecurity engineering, the organization institutes and maintains cybersecurity
governance and a cybersecurity culture, including cybersecurity awareness management, competence
management and continuous improvement. This involves specifying organizational rules and processes
that are independently audited against the objectives of this document.
To support cybersecurity engineering, the organization implements management systems for
cybersecurity including managing tools and applying a quality management system.
5.2 Objectives
The objectives of this clause are to:
a) define a cybersecurity policy and the organizational rules and processes for cybersecurity;
b) assign the responsibilities and corresponding authorities that are required to perform
cybersecurity activities;
c) support the implementation of cybersecurity, including the provision of resources and the
management of the interactions between cybersecurity processes and related processes;
d) manage the cybersecurity risk;
© ISO/SAE International 2021 – All rights reserved 7
e) institute and maintain a cybersecurity culture, including competence management, awareness
management and continuous improvement;
f) support and manage the sharing of cybersecurity information;
g) institute and maintain management systems that support the maintenance of cybersecurity;
h) provide evidence that the use of tools does not adversely affect cybersecurity; and
i) perform an organizational cybersecurity audit.
5.3 Inputs
5.3.1 Prerequisites
None.
5.3.2 Further supporting information
The following information can be considered:
— existing evidence of conformity with standards that support quality management.
[7] [8] [9] ®1)
EXAMPLE IATF 16949 in conjunction with ISO 9001 , ISO 10007 , Automotive SPICE , the
[10] [11] [12]
ISO/IEC 330xx family of standards , ISO/IEC/IEEE 15288 and ISO/IEC/IEEE 12207 .
5.4 Requirements and recommendations
5.4.1 Cybersecurity governance
[RQ-05-01] The organization shall define a cybersecurity policy that includes:
a) acknowledgement of road vehicle cybersecurity risks; and
b) the executive management’s commitment to manage the corresponding cybersecurity risks.
NOTE 1 The cybersecurity policy can include links to the organization’s objectives and other policies.
NOTE 2 The cybersecurity policy can include a statement regarding the risk treatment of generic threat
scenarios with respect to the organization’s products or services portfolio, considering the context, either
external or internal.
[RQ-05-02] The organization shall establish and maintain rules and processes to:
a) enable the implementation of the requirements of this document; and
b) support the execution of the corresponding activities.
EXAMPLE 1 Process definitions, technical rules, guidelines, methods and templates.
NOTE 3 Cybersecurity risk management can include effort-benefit considerations of activities.
NOTE 4 Rules and processes cover concept, product development, production, operation, maintenance, and
decommissioning, including TARA methods, information sharing, cybersecurity monitoring, cybersecurity
incident response, and triggers.
NOTE 5 Rules and processes regarding vulnerability disclosure, for example as part of information sharing,
[14]
can be specified in accordance with ISO 29147 .
® [13]
1) Automotive SPICE is an example of suitable products available commercially. This information is given for
the convenience of users of this document and does not constitute an endorsement by ISO of these products.
8 © ISO/SAE International 2021 – All rights reserved
NOTE 6 Figure 4 outlines the relationship between an overarching cybersecurity policy (see [RQ-05-01]), and
organization-specific cybersecurity rules and processes (see [RQ-05-02]), responsibilities (see [RQ-05-03]) and
resources (see [RQ-05-04]).
Figure 4 — Cybersecurity governance
[RQ-05-03] The organization shall assign and communicate the responsibilities and corresponding
organizational authority to achieve and maintain cybersecurity.
NOTE 7 This relates to organizational as well as to project-dependent activities.
[RQ-05-04] The organization shall provide the resources to address cybersecurity.
NOTE 8 Resources include the persons responsible for cybersecurity risk management, development, and
incident management.
EXAMPLE 2 Skilled personnel and suitable tools to perform cybersecurity activities.
[RQ-05-05] The organization shall identify disciplines related to, or interacting with, cybersecurity
and establish and maintain communication channels between those disciplines in order to:
a) determine if and how cybersecurity will be integrated into existing processes; and
b) coordinate the exchange of relevant information.
NOTE 9 Coordination can include sharing of processes and using strategies and tools between disciplines.
NOTE 10 Disciplines include information technology security, functional safety, and privacy.
EXAMPLE 3 Interdisciplinary exchange of:
[1]
— threat scenarios and hazard (cf. ISO 26262-1:2018 , 3.75) information;
[1]
— cybersecurity goals and safety goals (cf. ISO 26262-1:2018 , 3.139); and/or
— cybersecurity requirements conflicting or competing with functional safety requirements (cf. ISO 26262-
[1]
1:2018 , 3.69).
5.4.2 Cybersecurity culture
[RQ-05-06] The organization shall foster and maintain a strong cybersecurity culture.
NOTE 1 See Annex B for examples.
[RQ-05-07] The organization shall ensure that persons to which cybersecurity roles and responsibilities
are assigned have the competences and awareness to fulfil these.
NOTE 2 A competence, awareness and training program can include:
— organizational rules and processes regarding cybersecurity, including cybersecurity risk management;
— organizational rules and processes regarding disciplines related to cybersecurity, such as functional safety
and privacy;
© ISO/SAE International 2021 – All rights reserved 9
— domain knowledge;
— systems engineering;
— cybersecurity-related methods, tools and guidelines; and/or
— known attack methods and cybersecurity controls.
[RQ-05-08] The organization shall institute and maintain a continuous improvement process.
EXAMPLE Continuous improvement process, including:
— learning from previous experiences, including cybersecurity information gathered by cybersecurity
monitoring and observation of internal and external cybersecurity-related information;
— learning from information related to cybersecurity regarding products of similar application in the field;
— deriving improvements to be applied during subsequent cybersecurity activities;
— communicating lessons learned about cybersecurity to the appropriate persons; and
— checking the adequacy of the organizational rules and processes in accordance with [RQ-05-02].
NOTE 3 Continuous improvement applies to all cybersecurity activities in this document.
5.4.3 Information sharing
[RQ-05-09] The organization shall define the circumstances under which information sharing related
to cybersecurity is required, permitted, or prohibited, internal or external to the organization.
NOTE Circumstances to share information can be based on:
— types of information that can be shared;
— approval processes for sharing;
— requirements for redacting information;
— rules for source attribution;
— types of communications for specific parties;
— vulnerability disclosure procedures (see NOTE 5 in 5.4.1); and/or
— requirements for receiving party on handling of highly sensitive information.
[RC-05-10] The organization should align its information security management of the shared data
with other parties in accordance with [RQ-05-09].
EXAMPLE Alignment of security classification levels of public, internal, confidential, third-party confidential.
5.4.4 Management systems
[RQ-05-11] The organization shall institute and maintain a quality management system in accordance
with International Standards, or equivalent, to support cybersecurity engineering, addressing:
[7] [8]
EXAMPLE 1 IATF 16949 in conjunction with ISO 9001 .
a) change management;
NOTE 1 The scope of change management in cybersecurity is to manage changes in items and their
components so that the applicable cybersecurity goals and requirements continue to be fulfilled, e.g. a
review of the changes in production processes against the production control plan to prevent such changes
from introducing new vulnerabilities.
b) documentation management;
10 © ISO/SAE International 2021 – All rights reserved
NOTE 2 A work product can be combined or mapped to different documentation repositories.
c) configuration management; and
d) requirements management.
[RQ-05-12] The configuration information required for maintaining cybersecurity of a product in the
field shall remain available until the end of cybersecurity support for the product, in order to enable
remedial actions.
NOTE 3 Archiving the build environment can be useful to ensure later usage of configuration information.
EXAMPLE 2 Bill of materials, software configuration.
[RC-05-13] A cybersecurity management system for the production processes should be established in
order to support the activities of Clause 12.
[15]
EXAMPLE 3 IEC 62443 2-1 .
5.4.5 Tool management
[RQ-05-14] Tools that can influence the cybersecurity of an item or component shall be managed.
EXAMPLE 1 Tools used for concept or product development, such as model based development, static checkers,
verification tools.
EXAMPLE 2 Tools used during production such as a flash writer, end of line tester.
EXAMPLE 3 Tools used for maintenance, such as an on-board diagnostic tool or reprogramming tool.
NOTE Such management can be established by:
— application of the user manual with errata;
— protection against unintended usage or action;
— access control for the tool users; and/or
— authentication of the tool.
[RC-05-15] An appropriate environment to support remedial actions for cybersecurity incidents (see
13.3) should be reproducible until the end of cybersecurity support for the product.
EXAMPLE 4 Testing, software build and development environments for reproducing and managing
vulnerabilities.
EXAMPLE 5 Toolchain and compilers used for building the software of the product.
5.4.6 Information security management
[RC-05-16] Work products should be managed in accordance with an information security management
system.
EXAMPLE Work products can be stored on a file server that protects them from unauthorized alteration or
deletion.
5.4.7 Organizational cybersecurity audit
[RQ-05-17] A cybersecurity audit shall be performed independently to judge whether the
organizational processes achieve the objectives of this document.
NOTE 1 A cybersecurity audit can be included in, or combined with, an audit in accordance with a quality
[7] [8]
management system standard, e.g. IATF 16949 in conjunction with ISO 9001 .
© ISO/SAE International 2021 – All rights reserved 11
[16]
NOTE 2 Independence can be based on, for example, the ISO 26262 series .
NOTE 3 Persons that perform the audit can be internal or external to the organization.
NOTE 4 To ensure that organizational processes remain appropriate for cybersecurity, an audit can be
performed periodically.
NOTE 5 Figure 7 illustrates the organizational cybersecurity audit in relation to other cybersecurity activities.
5.5 Work products
[WP-05-01] Cybersecurity policy, rules and processes, resulting from the requirements of 5.4.1 to
5.4.3
[WP-05-02] Evidence of competence management, awareness management resulting from
[RQ-05-07] and continuous improvement resulting from [RQ-05-08] of 5.4.2
[WP-05-03] Evidence of the organization's management systems, resulting from the requirements
of 5.4.4 and 5.4.6
[WP-05-04] Evidence of tool management, resulting from the requirements of 5.4.5
[WP-05-05] Organizational cybersecurity audit report, resulting from the requirements of 5.4.7
6 Project dependent cybersecurity management
6.1 General
This clause describes the requirements regarding the management of cybersecurity development
activities for a specific project.
Project dependent cybersecurity management includes the allocation of responsibilities (see 6.4.1) and
planning of the cybersecurity activities (see 6.4.2). This document defines requirements in a generic
manner such that it can be applied to a variety of items and components. In addition, tailoring can be
applied (see 6.4.3) that is based on a rationale and is defined in the cybersecurity plan. Examples of
when tailoring can be used include:
— reuse (see 6.4.4),
— component out-of-context (see 6.4.5),
— use of an off-the-shelf component (see 6.4.6),
— update (see 13.4).
Reuse of items and components is a possible development strategy that can be applied, with or without
modifications to an item, component, or their operational environment. However, modifications can
introduce vulnerabilities that might not have been considered for the original item or component.
Furthermore, there might have been a change in known attacks, for example:
— an evolution of attack techniques,
— newly emerged vulnerabilities, e.g. learned from cybersecurity monitoring (see 8.3) and/or
cybersecurity event evaluation (see 8.4), or
— a change of the assets since the original development.
If the original item or component was developed in accordance with this document, the reuse of that
item or component is based on the existing work products. If the item or component was not originally
developed in accordance with this document, the reuse can be based on the existing documentation
with a rationale.
12 © ISO/SAE International 2021 – All rights reserved
A component can be developed out-of-context, i.e. based on an assumed context. An organization can
develop generic components for different applications and for different customers, prior to engagement
or commercial agreement with a customer. The supplier can make assumptions about the context and
intended use. Based on this, the supplier can derive requirements for the out-of-context development.
For example, a microcontroller can be developed out-of-context.
An off-the-shelf component is a component that is not developed on behalf of a specific customer and
that can be used without modification of its design or implementation, e.g. a third-party software
library, an open source software component. An off-the-shelf component is not assumed to have been
developed in accordance with this document.
Figure 5 shows that both an off-the-shelf component and an out-of-context component can be integrated
into an item or component in accordance with this document. The integration can involve activities
similar to reuse analysis in 6.4.4, and if changes are made to address invalid assumptions then change
management (see 5.4.4) applies. The changes can be made to a component that is intended to be
integrated and/or to the component or item that is the target of the integration.
Figure 5 — Integration of off-the-shelf and out-of-context components
The cybersecurity case (see 6.4.7) is an input to a cybersecurity assessment and to the release for post-
development.
The cybersecurity assessment (see 6.4.8) judges independently the cybersecurity of an item or
component and is an input for the decision to the release for post-development (see 6.4.9).
6.2 Objectives
The objectives of this clause are to:
a) assign the responsibilities regarding the project’s cybersecurity activities;
b) plan the cybersecurity activities, including the definition of the tailored cybersecurity activities;
c) create a cybersecurity case;
d) perform a cybersecurity assessment, if applicable; and
e) decide whether the item or component can be released for post-development from a cybersecurity
perspective.
6.3 Inputs
6.3.1 Prerequisites
None.
© ISO/SAE International 2021 – All rights reserved 13
6.3.2 Further supporting information
The following information can be considered:
— organizational cybersecurity audit report [WP-05-03];
— project plan.
6.4 Requirements and recommendations
6.4.1 Cybersecurity responsibilities
[RQ-06-01] The responsibilities regarding the project’s cybersecurity activities shall be assigned and
communicated in accordance with [RQ-05-03].
NOTE Responsibilities for cybersecurity activities can be transferred provided that this is communicated
and that the relevant information is made available.
6.4.2 Cybersecurity planning
[RQ-06-02] In order to decide cybersecurity activities needed for the item or component, the item or
component shall be analysed to determine:
a) whether the item or component is cybersecurity relevant;
NOTE 1 Annex D provides a method and criteria that can be used to assess the cybersecurity relevance.
NOTE 2 If the item or component is determined as not cybersecurity relevant, then there are no
cybersecurity activities, thus cybersecurity planning is not continued.
b) if the item or component is cybersecurity relevant, whether the item or component is a new
development or a reuse; and
c) whether tailoring in accordance with 6.4.3 is applied.
[RQ-06-03] The cybersecurity plan shall include the:
a) objective of an activity;
b) dependencies on other activities or information;
c) personnel responsible for performing an activity;
d) required resources for performing an activity;
e) starting point or end point, and the expected duration of an activity; and
f) identification of the work products to be produced.
[RQ-06-04] The responsibilities for developing and maintaining the cybersecurity plan, and for
tracking the progress of the cybersecurity activities against the cybersecurity plan shall be assigned in
accordance with [RQ-05-03] and [RQ-05-04].
[RQ-06-05] The cybersecurity plan shall either be:
a) referenced in the project plan for the development; or
b) included in the project plan, such that the cybersecurity activities are distinguishable.
NOTE 3 The cybersecurity plan can incorporate cross-references to other plans (e.g. the project plan) which
are also under configuration management (see also [RQ-06-09]).
14 © ISO/SAE International 2021 – All rights reserved
[RQ-06-06] The cybersecurity plan shall specify the activities that are required for cybersecurity
during the concept and product development phases in accordance with the relevant requirements of
Clauses 9, 10, 11 and 15.
[RQ-06-07] The cybersecurity plan shall be updated when a change or a refinement of the activities to
be performed is identified.
NOTE 4 The cybersecurity plan can be refined in incremental steps during development. For example,
the cybersecurity plan can be updated based on the result of cybersecurity activities, such as the TARA (see
Clause 15).
[PM-06-08] For threat scenarios of risk value 1 that are determined from an analysis in accordance
with 15.8, conformity with 9.5, Clause 10 and Clause 11 may be omitted.
NOTE 5 These threat scenarios can have consequences with regard to cybersecurity and if so, the
corresponding risks are treated, albeit potentially with less rigour than defined in this document.
NOTE 6 The sufficiency of the treatment of such risks can be argued based on a rationale defined in the
cybersecurity case. The rationale can be based on conformity with a quality management standard, such as
[7] [8]
IATF 16949 in conjunction with ISO 9001 , in combination with additional measures, for example:
— cybersecurity awareness assurance;
— cybersecurity training of quality personnel; and/or
— cybersecurity specific measures defined in the organization’s quality management system.
[RQ-06-09] The work products identified in the cybersecurity plan shall be updated and maintained
for accuracy until and at the release for post-development.
[RQ-06-10] If cybersecurity activities are distributed, customer and supplier shall each define a
cybersecurity plan regarding their respective cybersecurity activities and interfaces in accordance
with Clause 7.
[RQ-06-11] The cybersecurity plan shall be subject to configuration management and documentation
management, in accordance with 5.4.4.
[RQ-06-12] The work products identified in the cybersecurity plan shall be subject to configuration
management, change management, requirements management, and documentation management, in
accordance with 5.4.4.
6.4.3 Tailoring
[PM-06-13] A cybersecurity activity may be tailored.
[RQ-06-14] If a cybersecurity activity is tailored, then a rationale why the tailoring is adequate and
sufficient to achieve the relevant objectives of this document shall be provided and reviewed.
NOTE Activities that are not performed because they are performed by another entity in the supply chain
are not considered as tailored, but as distributed cybersecurity activities (see Clause 7). However, distribution of
cybersecurity activities can lead to joint tailoring (see 7.4.3).
6.4.4 Reuse
[RQ-06-15] A reuse analysis shall be carried out if an item or component has been developed and:
a) modifications are planned;
b) is planned to be reused in another operational environment; or
EXAMPLE
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.