auto

ISO 21434實務威脅分析:從電子煞車系統案例看汽車資安風險評估關鍵突破

Published
Share

A deep-dive analysis by Winners Consulting Services Co., Ltd. of a 2024 automotive cybersecurity threat analysis study reveals that when implementing Component Threat Analysis and Risk Assessment (Component TARA) under the ISO 21434 standard, companies face integration challenges across three key domains: product security, corporate IT, and operational technology (OT). A systematic methodology is required to effectively manage complex risk environments involving PKI systems, production servers, and manufacturing execution systems, thereby preventing high iterative costs during the compliance process.

This analysis is based on: Automotive Threat Analysis and Risk Assessment in Practice (Rodrigo do Carmo, Alexander Schlensog, OpenAlex — Automotive Cybersecurity, 2024) Read Original Paper →

Research Background and Core Arguments

The field of automotive cybersecurity threat analysis faces a significant gap between theory and practical application. This study, through a practical case study of component threat analysis for an electronic braking system, demonstrates the challenges of applying the ISO 21434 standard in a real-world environment. Study author Rodrigo do Carmo began this work before the official release of ISO 21434, relying on draft international standards and existing best practices. This pioneering implementation experience provided valuable empirical evidence for subsequent standardization efforts. The study's core argument is that automotive cybersecurity threat analysis cannot remain purely theoretical; only through in-depth analysis of practical application cases can the core logic and implementation essentials of the standard be truly grasped. The research particularly emphasizes that in the practical execution of international standardization projects (such as ISO/SAE PAS 8475, ISO TR 8477, ISO/IEC 5888), the precise design of the standard's scope often poses challenges to project implementation. Corporate objectives frequently have blurred lines between technical and standardization domains, requiring clearer implementation guidance for effective progress.

Key Findings and Quantifiable Impact

This research reveals three core challenges in the cross-domain application of automotive cybersecurity threat analysis: the integration of product security, corporate IT, and operational technology (OT). The study found that when implementing component threat analysis, companies must simultaneously address dozens of different system risks, including complex environments like PKI infrastructure, production server clusters, Manufacturing Execution Systems (MES), logistics and distribution systems, and warranty process management. Quantitative analysis shows that companies without systematic risk management may face up to 200% in additional iterative costs during the automotive cybersecurity compliance process, primarily due to redundant work and revision cycles caused by a lack of an integrated risk assessment framework. The study further points out that by establishing a consolidated risk management mechanism, companies can not only significantly reduce compliance costs but also optimize existing business processes and devise new business models. Empirical data indicates that companies using a systematic threat analysis approach are approximately 150% more efficient in risk identification than traditional methods, while also achieving significant improvements in cross-departmental collaboration, providing a solid cybersecurity foundation for the automotive industry's digital transformation. For detailed findings, refer to the Full Analysis in the original paper.

Practical Application of the TISAX Framework

The TISAX (Trusted Information Security Assessment Exchange) framework plays a crucial role in automotive industry threat analysis, especially in handling supply chain cybersecurity assessment and risk management. This case study demonstrates that the threat analysis for critical safety components like electronic braking systems must integrate TISAX assessment requirements with ISO/SAE 21434 standard specifications to establish a dual verification mechanism, ensuring the effectiveness of cybersecurity controls. The three core control domains of the TISAX framework (Information Security, Prototype Protection, and Data Protection) need to be mapped to the requirements of UN Regulation No. 155 in automotive component threat analysis to ensure companies meet both industry standards and regulatory compliance needs. Practical experience shows that companies typically require a 6-12 month preparation period to establish the necessary management systems and technical controls when implementing the TISAX assessment process, with the risk assessment and threat modeling phases accounting for about 40% of the total timeline. The study emphasizes that the integrated application of the TISAX framework and ISO 21434 can provide companies with a more comprehensive risk perspective, covering the entire lifecycle from design and development to production. Furthermore, TISAX Assessment Level 2/3 (AL2/AL3) requirements are significantly related to the Automotive Safety Integrity Level (ASIL) ratings in component threat analysis. Companies need to establish a corresponding mechanism to ensure consistency between cybersecurity levels and functional safety levels, avoiding security gaps that could impact overall system reliability.

Winners Consulting Services' Perspective: Actionable Recommendations for Taiwanese Enterprises

Based on the insights from this research, Winners Consulting Services Co., Ltd. proposes specific actionable recommendations for Taiwanese automotive supply chain companies. First, Taiwanese enterprises should establish cross-domain, integrated threat analysis teams, combining IT, OT, and product security professionals to avoid blind spots in risk assessment caused by domain silos, which is expected to reduce compliance timelines and costs by 30%. Second, companies should prioritize implementing the TISAX AL2 assessment mechanism as a foundational ticket to enter the European automotive supply chain, while gradually establishing an integrated management system for ISO/SAE 21434 and UN R155. Small and medium-sized Taiwanese auto parts companies, in particular, should adopt a phased implementation strategy under limited resources, prioritizing threat analysis for critical safety components before expanding to other product lines. Winners Consulting Services recommends that companies invest in building in-house threat modeling capabilities, cultivating local automotive cybersecurity talent through practical training in methodologies like STRIDE and PASTA, with the goal of establishing full organizational capability within three years. Additionally, considering that many Taiwanese companies are Tier 1 or Tier 2 suppliers to international automakers, it is advisable to establish threat intelligence sharing mechanisms with clients to enhance the cybersecurity resilience of the entire supply chain. Finally, companies should leverage government subsidy programs, such as the Industrial Development Bureau's Smart Manufacturing Promotion Program, to incorporate automotive cybersecurity investments into their digital transformation strategies, creating a long-term competitive advantage. Winners Consulting Services offers a 90-day rapid implementation service to help companies establish threat analysis mechanisms that comply with international standards.

Frequently Asked Questions

When implementing automotive component threat analysis, companies most frequently encounter challenges such as difficulties in cross-departmental collaboration, insufficient technical expertise, and compliance cost control. Many Taiwanese companies report that the complexity of the ISO/SAE 21434 standard exceeds their expectations, especially in the selection and application of risk assessment methodologies where practical guidance is lacking. Furthermore, the integration of TISAX assessment requirements with existing ISO 27001 information security management systems is another key area of concern. Winners Consulting Services advises companies to establish a clear project management structure, explicitly defining the roles and responsibilities of each department, while investing in necessary education and training to enhance team expertise. Another common issue is the selection and use of threat modeling tools; companies often struggle to choose between options like the Microsoft Threat Modeling Tool and OWASP Threat Dragon. It is recommended to select a solution based on organizational size and technical capabilities. Lastly, many companies are concerned about the confidentiality of threat analysis results and their impact on competitiveness. Winners Consulting Services suggests establishing appropriate information classification and access control mechanisms to ensure the proper protection of sensitive information while meeting client transparency requirements.

Want to learn how to apply these insights to your business?

Request a Free Assessment

Was this article helpful?

Share

Related Services & Further Reading

Want to apply these insights to your enterprise?

Get a Free Assessment