UK government issues cybersecurity guidelines for connected cars
Cyber The Department for Transport has published cybersecurity guidelines for manufacturers of smart or connected cars. Written with help from the Centre for the Protection of National Infrastructure, the principles implore everyone in the automotive supply chain to collaborate during the design process and over software upgrades and maintenance long after cars hit the road. The authorities are concerned about the prospect of older vehicles running outdated software.
As cars become increasingly automated and ultimately, driverless the stakes will rise. Last year ethical hackers managed to wrest control of a Tesla Model S while the car was moving and slam on the brakes (see how they did it in the video below). Attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Mark Noctor, VP EMEA, Arxan Technologies The eight principles, which were launched by transport minister Lord Callanan, follow: Organisational security is owned, governed and promoted at board level Security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain Organisations need product aftercare and incident response to ensure systems are secure over their lifetime All organisations, including sub-contractors, suppliers and potential 3rd parties, work together to enhance the security of the system Systems are designed using a defence-in-depth approach The security of all software is managed throughout its lifetime The storage and transmission of data is secure and can be controlled The system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail embedded content Connecting to WiFi and external devices via Bluetooth, Modern cars are increasingly smart . The communications and entertainment systems are particularly vulnerable to attack, and can be reverse engineered to access the API libraries that facilitate data sharing between systems, says Mark Noctor, VP EMEA at Arxan Technologies. From here attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking. Preventing application code from being accessed and tampered is one of the biggest priorities in protecting a connected vehicle, and it is encouraging to see the government s guidelines specifically list the ability to protect code and ensure its integrity as key principles. Manufacturers must deploy code hardening measures to prevent attackers from accessing their source code and removing vital data such as cryptographic keys which can be used to access other systems. Anti-tampering measures should be hidden in the code to alert them if the code has been changed, and prevent systems from starting if alterations are detected.
The government announced the Autonomous and Electric Vehicles Bill, which will allow innovation to flourish and ensure the next wave of self-driving technology is invented, designed and operated safely in the UK , during the Queens Speech in June. The outcome of recent efforts by the US government to engage with US automakers over the issue do not augur well. Asked by a Senate committee if they supported mandatory privacy and safety standards, executives from Google, General Motors, Delphi and Lyft were evasive. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.
Click here to download now