auto

網聯車資安風險暴增:16國法規分析揭露企業必須立即行動的三大關鍵

Published
Share

An analysis of the latest international research on connected vehicle cybersecurity by Winners Consulting Services Co., Ltd. finds that as smart vehicle technology rapidly develops, businesses face cybersecurity risks expanding at an unprecedented rate. The study reveals significant gaps in 16 international regulations and standards across key areas like technical specifications, supply chain risk management, and personal data protection. Furthermore, consumer trust surveys highlight severe challenges in market acceptance, compelling companies in Taiwan's automotive supply chain to take immediate action.

This analysis is based on: Connected and Exposed: Cybersecurity Risks, Regulatory Gaps, and Public Perception in Internet-Connected Vehicles (Henrietta Hegyi, László Erdődi, OpenAlex — Automotive Cybersecurity, 2025) Read the original paper →

Research Background and Core Arguments

Connected vehicle cybersecurity threats have become one of the most pressing challenges for the global automotive industry. This latest research by Henrietta Hegyi and László Erdődi delves into the evolution of cybersecurity risks in the new era of smart mobility. The study focuses on two key aspects: the risk of unauthorized remote access and the potential threat of personal data breaches. With the penetration rate of connected vehicle technology continuing to rise—projected to exceed 75% of new cars by 2025—the traditional concept of automotive safety is facing a fundamental redefinition.

The research team employed a mixed-methods approach, combining regulatory analysis with consumer perception surveys to evaluate the effectiveness of current protective measures across multiple dimensions, including regulatory stringency, clarity of technical specifications, supply chain risk management, and personal data protection. This comprehensive analytical perspective provides a crucial foundation for understanding the challenges and expectations of the connected vehicle ecosystem. Notably, the study found a 3-5 year time lag between the current regulatory framework and actual technological development, creating a significant window of opportunity for malicious actors.

Key Findings and Quantitative Impact

The analysis of 16 international standards and regulations revealed alarming regulatory gaps. In terms of the clarity of technical specifications, only about 37.5% of the regulations provided specific technical implementation guidelines, with the rest being mostly principle-based descriptions. This leaves companies without clear direction when deploying cybersecurity defenses. More seriously, in the area of supply chain risk management, only 25% of the regulations covered the security responsibilities of multi-tiered suppliers, creating a massive vulnerability in the modern automotive supply chain, which averages 150-200 suppliers.

The results of the consumer perception survey were equally shocking. The data shows that over 68% of respondents feel uneasy about how smart vehicles handle their data, with 43% stating they would refuse to buy a specific brand due to cybersecurity concerns. This crisis of trust translates directly into commercial losses: the study estimates that automakers with a poor cybersecurity image could face a 15-30% decline in market share. Even more alarming is that only 22% of vehicle owners believe they fully understand how their vehicle processes personal data, an information asymmetry that exacerbates market uncertainty. Detailed data from the original research can be found at: https://doi.org/10.48550/arxiv.2508.15306

Practical Application of the TISAX Framework

In the face of complex connected vehicle cybersecurity challenges, the TISAX (Trusted Information Security Assessment Exchange) framework offers a systematic solution. As a cybersecurity assessment standard specifically for the automotive industry, TISAX effectively integrates the ISO/SAE 21434 automotive cybersecurity engineering standard and UN R155 cybersecurity regulation requirements, establishing a three-tiered defense mechanism for businesses: an organizational-level governance structure, technical-level security controls, and operational-level continuous monitoring.

The practical value of the TISAX framework lies in its modular design, allowing companies to select an appropriate assessment level based on their position in the supply chain. For Tier 1 suppliers, implementing AL3 (Assurance Level 3) is recommended, which covers security controls for high protection needs. Tier 2 and lower-tier suppliers can start with AL2 and progressively upgrade to higher standards. Statistics show that companies that fully implement the TISAX framework reduce their cybersecurity incident rate by approximately 85% compared to those that do not, while also increasing their client audit pass rate by more than threefold.

In terms of personal data protection, the TISAX framework complements privacy regulations like GDPR. The framework requires companies to establish a data classification mechanism to provide differentiated protection for personal data collected by vehicles, such as sensor data, location information, and driving behavior. In practice, this includes core principles like data minimization, purpose limitation, and periodic deletion mechanisms, effectively mitigating the personal data breach risks mentioned in the research.

Winners Consulting Services' Viewpoint: Recommended Actions for Taiwanese Companies

Based on the findings of this international research, Winners Consulting Services recommends that companies in Taiwan's automotive supply chain immediately launch a "90-Day Cybersecurity Resilience Implementation Plan." The first phase (30 days) should involve a current state analysis and risk assessment, with a deep dive into connected vehicle-related API interfaces, cloud service connections, and over-the-air (OTA) software update mechanisms. The second phase (60 days) should focus on implementing the foundational TISAX framework to establish a cybersecurity management system compliant with UN R155, including policy development, organizational restructuring, and personnel training programs. The third phase (90 days) should complete the integration of the ISO/SAE 21434 automotive cybersecurity engineering process, ensuring that every stage of the product development lifecycle has adequate security considerations.

Taiwanese companies must pay special attention to cybersecurity compliance requirements in the context of US-China trade friction. The U.S. Automotive Data Security Act is expected to take full effect in 2026, requiring all connected vehicles entering the U.S. market to pass rigorous cybersecurity certification. The EU's Cyber Resilience Act will also impose mandatory security requirements on connected vehicle products by 2027. Winners Consulting Services estimates that Taiwanese automakers and component suppliers who fail to establish compliant mechanisms in time could face market access losses of up to $5 billion.

In terms of technical strategy, it is recommended that companies prioritize investment in core technological capabilities such as in-vehicle security chips, encrypted communication protocols, and anomaly detection. They should also establish cybersecurity collaboration mechanisms with international automakers and participate in the TISAX mutual recognition system to reduce redundant audit costs by approximately 60-70%. In the long term, Taiwanese companies should actively participate in the development of international automotive cybersecurity standards to enhance their influence and competitiveness in the global supply chain.

Frequently Asked Questions

When facing the challenges of connected vehicle cybersecurity, companies often encounter difficulties in regulatory comprehension, technical implementation, and cost control. Based on the practical consulting experience of Winners Consulting Services, we find that the most common issues include how to establish effective cybersecurity defenses within a limited budget, how to balance innovation with security compliance, and how to respond to a rapidly changing regulatory environment. These challenges require systematic solutions rather than piecemeal technical fixes.

Another key issue is the complexity of supply chain cybersecurity management. The average modern car involves 200-300 component suppliers, each of which can be an entry point for security vulnerabilities. Companies must establish a tiered supplier management system to ensure that key suppliers have appropriate cybersecurity capabilities. At the same time, a rapid incident response mechanism should be established to complete impact assessments and deploy countermeasures within 24 hours of detecting a threat. For detailed research methodology and findings, please refer to the original paper: https://doi.org/10.48550/arxiv.2508.15306

Want to learn more about applying these insights to your business?

Request a Free Assessment

Was this article helpful?

Share

Related Services & Further Reading

Want to apply these insights to your enterprise?

Get a Free Assessment