Tier 1 and 2 Suppliers and Services Compliance | ISO/SAE 21434 and WP.29 CSMS

TEAM UPSTREAM

Both the WP 29 regulation and the ISO/SAE standard require securing the vehicle supply chain and connected vehicle compliant services. This means that Tier 1 and Tier 2 suppliers and also connected vehicle service providers need to have a cybersecurity monitoring system that will help them detect new threats throughout the lifecycle of the vehicle, from development through production, and in the post-production lifetime.

Upstream’s AutoThreat is the first-ever threat feed that is completely focused on vehicles, vehicle components, and connected vehicle services. This enables Tier 1 and Tier 2 suppliers, and also connected vehicle service providers, to have a feed of threats that are relevant to them. This enables them to detect risks in an ongoing manner for their components and services throughout the lifecycle of the vehicle.

Additionally, Upstream’s AutoThreat helps organizations build domain expertise and domain knowledge that can help them perform better TARA and thus develop better vehicles and components over time.

For connected vehicle service providers, Upstream C4 enables near real-time detection of cyber attacks against vehicles and against their services.

Newsletter Icon

Subscribe
to our newsletter

Sign up to receive updates delivered to your inbox

The Leading Managed Vehicle SOC: Actively Protecting Millions of Vehicles for OEMs Worldwide

Protect automotive cybersecurity with an automotive-specific Vehicle Security Operations Center (VSOCs) to address the complexity of cyberattacks targeting OT networks, such as connected vehicles and&

More Details

Beyond Cyber: Upstream Puts Data in Motion

Automotive data in the cloud breaks silos, allowing teams to analyze information in the pursuit of identifying exciting new revenue opportunities.

More Details

2022 グローバルモビリティ サイバーセキュリティ報告書

2022 グローバルモビリティ サイバーセキュリティ報告書2022年版のサイバーセキュリティ報告書では過去10年に実際に 起こったサイバー攻撃の脅威を

More Details

Leading the Charge: Securing Charging Station Infrastructures

Delivering driver confidence with robust charging networks has created new opportunities for hackers to penetrate OEM and Tier-1 networks by tampering with charging station data.

More Details

Protecting Electric Vehicles: Modern Cybersecurity Solutions and the Road to Revenue

There is much to enjoy in the performance of electric vehicles and advanced features of electric vehicles, yet each connected capability such as GPS, mobile…

More Details

Protecting Commercial Vehicles: Continuous Operation and Uptime Amidst Cybersecurity Threats

Read about how a multi-layered cloud-based approach can protect today’s commercial vehicles while streamlining data processes.

More Details