Part 3: Executing the Process to Engineer a Secure Automotive Product
In this part, we shift into the practical aspects by building on top of what we have learned in the prior chapters to make the vehicle secure. First, we go through the threat modeling approach to understand how to perform an effective TARA that uncovers all threats relevant to our product. Then, we explore technical cybersecurity controls that can be applied at the vehicle architectural layers. Finally, we dive into the ECU hardware and software architecture to highlight technical cybersecurity controls that can be applied at those layers as well.
This part has the following chapters:
- Chapter 7, A Practical Threat Modeling Approach for Automotive Systems
- Chapter 8, Vehicle-Level Security Controls
- Chapter 9, ECU-Level Security Controls