Risk Management
Under UNECE R155, manufacturers must demonstrate a systematic, repeatable risk management process that identifies, evaluates, treats, and monitors cybersecurity risks across the vehicle lifecycle and supply chain. In practice, this is commonly implemented using ISO/SAE 21434 methods and work products.
Objectives
- Identify assets, threats, and vulnerabilities relevant to vehicle types.
 - Evaluate impact and feasibility to derive risk levels.
 - Select and implement proportionate risk treatments.
 - Maintain traceability from risks → goals/requirements → tests → operation.
 - Continuously monitor and update risk posture in the field.
 
Process Expectations (At a Glance)
- Scoping & Context – define vehicle type boundaries, interfaces, dependencies.
 - Asset Identification – E/E components, comms channels, data, credentials, tooling.
 - Threats & Vulnerabilities – use curated catalogs; include misuse/abuse cases.
 - Risk Evaluation – impact (safety, regulatory, operational, privacy) × feasibility.
 - Treatment Selection – preventive/detective/corrective; defense-in-depth.
 - Requirements & Design – derive and allocate security requirements.
 - Verification & Validation – plan tests proportional to risk; capture evidence.
 - Operational Feedback – vuln intake, incident learnings, telemetry → re-assess.
 
TARA Alignment (ISO/SAE 21434)
A Threat Analysis and Risk Assessment (TARA) provides the structure for risk decisions. Typical elements include:
- Assets & Attack Paths (e.g., OBD, telematics, BLE, Wi-Fi, V2X, service tools).
 - Threat scenarios (remote compromise, privilege escalation, spoofing, tampering, DoS).
 - Vulnerabilities (design flaws, misconfig, weak crypto, supply chain gaps).
 - Impact categories (safety, legal/regulatory, operational, financial, reputation).
 - Feasibility factors (time, expertise, knowledge of item, opportunity, equipment).
 - Risk rating and treatment decision with acceptance criteria.
 
Risk Treatment & Control Strategy
- Preventive – hardening, authN/Z, secure boot, partitioning, rate limiting.
 - Detective – logging, on-board IDS, anomaly detection, integrity monitoring.
 - Corrective – secure update/rollback plans (coordinate with R156/ISO 24089).
 - Assurance – testing depth tied to risk (static/dynamic, fuzzing, pentest, fault-injection).
 - Defense-in-depth – layered controls across ECUs, networks, and backends.
 
Risk Acceptance & Escalation
Define organization-wide acceptance criteria and escalation paths:
- Document residual risk and rationale when accepting risk.
 - Use governance bodies (e.g., CSMS board) for exceptions and waivers.
 - Link accepted risks to monitoring triggers and revisit periodically.
 
Traceability & Evidence
Maintain end-to-end traceability so auditors can follow the chain:
- Threat scenario ⇄ asset ⇄ requirement ⇄ design element ⇄ test case ⇄ result ⇄ operational control.
 - Bidirectional links (IDs) and change history for all artifacts.
 - Coverage metrics (e.g., % high-risk scenarios with implemented/verified controls).
 
Operational Feedback Loop
- Vulnerability management – coordinated intake (PSIRT), triage, CVE/CVSS mapping where applicable.
 - Incident response – detect, contain, eradicate, recover; lessons learned into TARA.
 - Telemetry/health – define KPIs, thresholds; trigger re-assessment or campaigns.
 - Supplier coordination – propagate advisories, patches, evidence exchange.
 
Practical Do / Don’t
Do
- Use a single, versioned TARA method and train teams on it.
 - Quantify acceptance criteria and require documented approvals.
 - Map controls to threats (not just to components).
 - Tie test depth to risk (e.g., fuzzing for high-risk parsers).
 - Continuously sync with SUMS (R156) for corrective actions.
 
Don’t
- Retrofit controls late without revisiting TARA.
 - Accept residual risk without monitoring hooks.
 - Let supplier risks sit untracked or unaudited.
 - Confuse test coverage with risk reduction—show effectiveness.
 
Typical Outputs / Evidence
- Approved TARA method and templates; training/competence records.
 - TARAs per vehicle type with risk ratings, treatment decisions, residual risks.
 - Requirements & traceability matrices; verification/validation plans and reports.
 - Operational monitoring KPIs, vulnerability/incident records, re-assessment logs.
 - Supplier risk assessments and exchanged evidence packages.