the new assembly line: 3 best practices for building (secure) connected cars
TRANSCRIPT
![Page 1: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/1.jpg)
The New Assembly Line 3 BEST PRACTICES FOR BUILDING
(SECURE) CONNECTED CARS
![Page 2: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/2.jpg)
Connected cars are about to change the auto industry’s assembly line.
![Page 3: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/3.jpg)
Vehicles are becoming computers on wheels and now have more in common with your
laptop than they do the Model T.
![Page 4: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/4.jpg)
Just as smartphones have supplanted non-Internet-connected phones, connected cars will supplant non-Internet-connected cars.
![Page 5: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/5.jpg)
Auto manufacturers need to become software companies if they want to
survive into the 21st century.
![Page 6: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/6.jpg)
The auto industry must now consider cybersecurity as an integral part to how cars are built, just as
physical safety became a critical part of how cars were built in the late 20th century.
![Page 7: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/7.jpg)
When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.
![Page 8: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/8.jpg)
When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.
If there are clear security best practices, then most companies will (hopefully)
implement those best practices.
![Page 9: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/9.jpg)
When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.
If there are no clear best
practices, companies will likely make a lot of security mistakes, resulting in major cybersecurity
problems down the road.
![Page 10: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/10.jpg)
How do we make cars resilient in the face of
cyberattacks?
![Page 11: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/11.jpg)
How do we make cars resilient in the face of
cyberattacks?
In our research, we have found that if the auto industry is to build vehicles that are resistant to cyberattack, they must
implement three important measures.
![Page 12: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/12.jpg)
An over-the-air update process: Ideally without the owner having to subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny.
Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole.
1
![Page 13: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/13.jpg)
An over-the-air update process: Ideally without the owner having to subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny.
Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole.
2
![Page 14: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/14.jpg)
An over-the-air update process: Ideally without the owner having to subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny.
Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole.
3
![Page 15: The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars](https://reader031.vdocuments.site/reader031/viewer/2022030316/587917131a28abf13a8b4c47/html5/thumbnails/15.jpg)
Read Hacking a Tesla Model S: What we found and what we learned