Supplier & External Interfaces
For China-market vehicles, GB/T 44495 (cybersecurity) and GB/T 44496 (software updates) expect the manufacturer to manage end-to-end supply-chain security: requirements flow-down, evidence exchange, audits, update coordination, and incident handling. This non-normative guide outlines a practical, audit-ready approach.
Objectives
- Define responsibilities across OEM, Tier-1/2, tool vendors, and service partners.
 - Flow down security & update requirements with measurable acceptance criteria.
 - Operate a controlled evidence exchange (artifacts, SBOMs, test reports).
 - Run risk-based assessments/audits and track CAPA to closure.
 - Coordinate update campaigns, keys/credentials, and incident response.
 
Responsibility Split & Governance
- RACI matrices per interface (item security, TARA, V&V, PSIRT, SUMS, records/retention).
 - Design authority and waiver rules (who can accept residual risk; re-approval triggers).
 - Local CN contacts for audits, incident comms, and authority queries.
 
Requirements Flow-Down (Contract & Spec)
Embed both product and process expectations:
- Product security: secure boot, partitioning, authenticated comms, logging, IDS hooks.
 - Update controls: signing/verification, anti-rollback counters, eligibility rules, rollback path.
 - Process: SDLC security gates, vuln handling/PSIRT SLAs, SBOM delivery & maintenance.
 - Evidence: test reports (incl. fuzz/pentest scope), coverage/traceability, conformity letters.
 - Acceptance criteria: measurable entry/exit, defect classes & fix timelines.
 
Evidence Exchange & Versioning
- Portal-based delivery with access control; encrypt in transit and at rest.
 - Artifact packages: TARA excerpts, requirements coverage, V&V results, SBOMs, update procedures.
 - Stable IDs & manifests for documents/builds/keys; record hashes and owners.
 - Bilingual labels (EN/中文) for CN audits and joint reviews.
 
Supplier Assessment & Audits
- Capability: CSMS/SUMS maturity, competence, incident playbooks, toolchain control.
 - Product risk: interface exposure, criticality, backend dependencies, update path robustness.
 - Audit focus: high-risk controls (keys, signing, parsers, diag/service tools).
 - CAPA: time-bound fixes, re-test triggers (major release, incident, key rotation).
 
Interface Security & Keys/Credentials
- Key custody: HSM-backed generation, rotation, revocation; dual control for sensitive ops.
 - Delegation: supplier signing under OEM-approved PKI with scoped certs and audit logs.
 - Service tools: authenticated access, attestation/version control, tamper-evident logs.
 - Backend: mutual auth, rate limits, replay protection, secrets management.
 
Open Source & Third-Party Components
- Deliver and maintain SBOMs per release; track vulnerabilities against SBOM.
 - Define patch SLAs and backport policy for critical components.
 - Verify provenance (supply-chain integrity) for imported binaries and libraries.
 
China Context: Localization, Residency & Compliance
- Localization: CN translations for critical specs, comms, and evidence indices.
 - Data residency: document storage locations for telemetry/records; cross-border transfer rules if any.
 - Regulatory comms: align supplier notices with OEM authority filings when applicable.
 
Incident Coordination (PSIRT)
- Shared intake channels (security, portal forms) and encrypted exchange.
 - Severities & SLAs agreed contractually; OEM incident commander identified.
 - Corrective updates linked to GB/T 44496 campaign dossiers; joint post-mortems and lessons learned.
 
KPIs & Continuous Improvement
- Supplier first-time pass rate on acceptance; time-to-patch for critical vulns.
 - Evidence completeness (on-time, correct IDs, coverage); audit findings closure.
 - Key/signing errors, eligibility failures, and rollback events by supplier-sourced items.
 
Practical Do / Don’t
Do
- Provide standard contract clauses and evidence templates up front.
 - Require SBOM + test summaries with every delivery.
 - Run joint incident drills (focus: keys, eligibility, rollback).
 - Snapshot eligibility rules used for each VIN decision.
 - Tag all artifacts for China applicability and keep translations versioned.
 
Don’t
- Accept deliveries without signed manifests and stable IDs.
 - Share keys/credentials via email or unmanaged channels.
 - Depend on certificates alone—ask for evidence tied to your threats.
 - Change rollout eligibility mid-campaign without re-approval and supplier alignment.
 
Typical Outputs / Evidence
- RACI per interface; CN contacts for audits/incidents.
 - Contracts/SOWs with security/update clauses, SLAs, and acceptance criteria.
 - Supplier evidence packs: TARA excerpts, requirements coverage, V&V reports, SBOMs, update procedures.
 - Key/credential custody records, PKI delegation docs, access/audit logs.
 - Assessment/audit reports, CAPA and re-test results; localized indices and manifests.
 - Joint incident timelines, corrective updates linked to campaign dossiers.
 
                        Disclaimer: This page summarizes supplier and external interface practices relevant to
                        GB/T 44495 & 44496. For authoritative requirements, consult the official standards and applicable
                        guidance from Chinese authorities or accredited bodies.