For technical audiences, ISO 21434 is not a checklist but a risk-based engineering process integrated into the entire vehicle development lifecycle. It mandates specific activities, work products, and rigorous documentation.
The Core Engine: Threat Analysis and Risk Assessment (TARA)
The TARA is the fundamental technical process upon which all security measures are built. It's a systematic method to identify, quantify, and mitigate security risks.
Key Technical Steps in TARA:
- Asset Identification: Define valuable elements within the vehicle system (e.g., ECU, communication bus, gateway, critical signal like brake command, key fob protocol).
- Threat Scenario Identification: For each asset, brainstorm how it could be compromised (e.g., "An attacker spoofs a brake command message on the CAN bus").
- Impact Rating: Classify the severity of the threat scenario's outcome using a scale (e.g., 0-3) for Safety, Financial, Operational, and Privacy impacts.
- Attack Path Analysis: Detail the steps an attacker would take, often using frameworks like HEAVENS or TVRA.
- Attack Feasibility Rating: Evaluate how easy it is to execute the attack path based on factors like:
- Expertise: Required skill level.
- Knowledge: Need for specific information about the system.
- Window of Opportunity: Time required.
- Equipment: Need for special tools.
- Risk Determination: Combine Impact and Feasibility ratings to assign a risk value to each threat scenario (e.g., High, Medium, Low).
- Risk Treatment Decision: For each high-risk scenario, decide on a mitigation strategy:
- Avoid: Redesign the system to remove the asset or threat.
- Reduce: Implement security controls to lower the risk (most common).
- Share: Transfer risk (e.g., via insurance).
- Retain: Accept the risk (requires justification).
Output: The TARA directly generates Cybersecurity Goals (high-level security requirements) and Cybersecurity Requirements (technical, verifiable specs).
Key Technical Artifacts (The "Proof")
The standard requires documented evidence. These are critical for audits and proving due care.
- Cybersecurity Case: A comprehensive argument, supported by evidence, that the item achieves its cybersecurity goals. It's the culmination of all work products.
- Cybersecurity Specification: A formal document containing all allocated cybersecurity requirements.
- TARA Report: The complete output of the TARA process.
- Verification and Validation Report: Evidence that testing was completed and requirements were met.
Traceability: The Golden Thread
A non-negotiable technical requirement is bi-directional traceability. You must be able to trace:
- From a threat scenario to a cybersecurity goal.
- From a goal to a technical requirement.
- From a requirement to its implementation and test case.
This ensures every security control is justified by a risk, and every risk has been mitigated. Tools like dedicated Application Lifecycle Management (ALM) systems are often used to manage this complexity.
Relationship with Other Standards
Technical teams must understand how 21434 interacts with other frameworks:
- ISO 26262 (Functional Safety): The two standards are deeply intertwined (Security-Safety overlap). A cyber-attack can cause a safety violation. Joint analysis (e.g., combining TARA and HARA) is often necessary.
- UNECE R155 / R156: While R155 is a regulatory requirement for a Cybersecurity Management System (CSMS) and Software Update Management System (SUMS), ISO 21434 provides the technical engineering framework to achieve compliance. You use 21434's processes to satisfy R155's objectives.
- Common Criteria (ISO 15408): 21434 is a process standard for development. Common Criteria is a evaluation standard for finished products. A component developed per 21434 would be well-prepared for a Common Criteria evaluation.