
A TPMS consists of sensors inside the tires that measure pressure and temperature and wirelessly transmit this data to a receiver ECU in the vehicle, which then displays the information to the driver. From a cybersecurity perspective, its wireless communication and safety function make it a critical item to analyze.
The first step is to define the scope of the "item" we're analyzing—the TPMS.
Output: A detailed Item Definition document that scopes all elements of the TPMS.
Step 1: Asset Identification
What valuable things need protection?
Step 2: Threat Scenario Identification
Using the assets, we brainstorm attack scenarios. For example:
Step 3: Impact Rating
We evaluate the impact if the attack succeeds. For the spoofing scenario:
Step 4: Attack Path Analysis
We detail the steps an attacker would take:
Step 5: Attack Feasibility Rating
We rate how easy this is. Given the public knowledge of TPMS protocols and cheap availability of SDR tools, the feasibility is High.
Step 6: Risk Determination
Combining the High Impact (Safety) and High Feasibility results in a Unacceptable Risk.
Step 7: Risk Treatment Decision
The risk must be reduced. We decide to mitigate it by implementing security controls.
Output: A TARA Report documenting all threat scenarios and their risk levels. For the spoofing scenario, the result is: "Unacceptable Risk - Must be mitigated."
The TARA results are translated into actionable specifications.
Output: A Cybersecurity Specification with verifiable requirements.
Engineering teams design and test to the requirements.
Output: Test reports proving the security controls work as intended.
Security doesn't end at production. ISO 21434 requires ongoing vigilance.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.