ARTICLE
1 August 2016

Automotive Industry Organization Releases Recommended Cybersecurity Best Practices

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Auto-ISAC is not alone in its efforts to address potential cybersecurity risks imposed by connected vehicles.
United States Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

Auto-ISAC is not alone in its efforts to address potential cybersecurity risks imposed by connected vehicles. As we have previously discussed, in 2015 legislators introduced the SPY Car Act, which requires automakers to meet certain vehicle data security standards to combat potential hacking threats. The U.S. Department of Transportation (DOT) notes that it has been researching and testing vehicle communications for over a decade. In addition, through the Intelligent Transportation Systems Joint Program Office, the DOT has worked to fund almost $25 million in cyber security research between 2012 and 2014. The National Highway Traffic Safety Administration (NHTSA) also published information relating to its comprehensive approach to vehicle cybersecurity.

The Best Practices continue these efforts by promoting a self-regulation framework within the industry for vehicle cybersecurity. The Best Practices outlined by Auto-ISAC include:

  • Governance: Organizations should consider appropriate oversight and processes to ensure accountability, compliance with regulations, internal policies and external commitments.
  • Risk Assessment and Management: Organizations should focus on processes for identifying, categorizing, prioritizing and treating cybersecurity risks that could lead to safety and data security issues.
  • Security by Design: Incorporating standards from the National Institute of Standards and Technology (NIST) and other established practices, organizations should integrate hardware and software cybersecurity features during the product development process for vehicles.
  • Threat Detection and Protection: By proactively anticipating threats, vulnerabilities and incidents, organizations can raise awareness for remediation and recovery.
  • Incident Response: If a cybersecurity incident does occur, organizations should have established processes, including an incident response plan, in place to identify the incident and ensure a timely response and recovery.
  • Training and Awareness: Organizations should seek to establish a culture of security and enforce vehicle cybersecurity responsibilities.
  • Collaboration and Engagement With Appropriate Third Parties: Organizations are encouraged to engage with third parties, including peer organizations, suppliers, cybersecurity researchers, government agencies and the Auto-ISAC, to collaborate on cybersecurity challenges.

Member organizations of the Auto-ISAC vary widely in size and current cybersecurity sophistication. Thus, the Best Practices are meant to be a set of industry guidelines for cybersecurity emerging concerns, for specific member organizations to adopt as applicable. While the Best Practices do not replace any current government regulations governing data security, they represent a comprehensive effort to address specific potential risks and vulnerabilities posed by increasingly connected vehicles.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More