SlideShare a Scribd company logo
1 of 22
Download to read offline
Automotive Cybersecurity
Best Practices
auto.bambooapps.eu
How to ensure the highest
possible degree of security
in the era of the intelligent
connected car.
Transforming Automotive
Experience
Bamboo Apps wants to be a part of automotive
revolution and by working closely with OEMs and mobility
companies Bamboo apps team is proud to be one of the
few who change the car now and forever.
design and software studio auto.bambooapps.eu
Main Hackable Attack Surface
Fifteen of the most hackable and exposed attack surfaces on
a next-generation car.
Smartphone Remote Link Type App
Airbag ECU
OBD ll
USB
Bluetooth
DSRC-Based server (V2X)
Passive Keyless Entryvvv
Vehicle Access System ECU
Steering and Braking ECU
Engine and Transmission
ECU
Lighting System ECU
ADAS System ECU
TPMS
Remote Key
design and software studio auto.bambooapps.eu
4 Layers of Security Architecture
Software securityNetwork security
Cloud security
Gateway
Hardware security
design and software studio auto.bambooapps.eu
Security Functions Overview
Core security functions to be implemented to deliver a high degree
of back-end and front-end security to connected car software.
Security logs
Communication protection
Control keys and access
User data protection
Identification, authentication, authorisation
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Secure Rest API Communication
Secure REST services must only provide HTTPS endpoints.
“Use mutually authenticated client-side certificates
to provide additional protection for highly privileged
web services.”
design and software studio auto.bambooapps.eu
Back-end Security Techniques
We opt for Virtual Private Networks (VPN) or a Transport Layer Security
model (TLS model).
TLS is mainly a defense against man-in-the-middle attacks. TLS
protocols are also effective in securing communications with external
entities including telematics service providers, consumer smart devices
and, in future, other vehicles and ITS infrastructure.
Architecture
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Establishing a certificate authority and managing certificates for
servers allows each entity within the infrastructure to validate the
members’ identity and encrypt their traffic.
Server certificate
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Server Protocol And Cipher Configuration Rules
Only Support Strong Protocols;
Prefer Ephemeral Key Exchanges;
Support TLS-PSK and TLS-SRP for Mutual Authentication;
Only Support Secure Renegotiations;
Disable Compression;
Update Crypto Libraries;
Only to support strong cryptographic ciphers.
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Access control is performed by REST services at each API endpoint.
Web services in monolithic applications implement this by means of
user authentication, authorisation logic and session management.
Access Control
design and software studio auto.bambooapps.eu
Back-end Security Techniques
API Keys
“Based on our experience, public REST services
without access control run the risk of being farmed
leading to excessive bills for bandwidth or compute
cycles. API keys can be used to mitigate this risk.”
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Other Security Practices
File extension checking;
Session tokens, credentials are only delivered over HTTPS;
Check password quality;
Check good and wrong attempts;
Multi-factor authentication;
Client-side and server-side validation rules;
design and software studio auto.bambooapps.eu
Back-end Security Techniques
Other Security Practices
Out-of-channel notification of account lockouts and
successful password changes;
Brute force protection;
Secure cookie session;
Restrict Injection: SQL, HTML, NoSQL etc;
Restrict Cross-Site Scripting
design and software studio auto.bambooapps.eu
Front-end Security Techniques
We recommend to use the following algorythms:
Confidentiality algorithms: AES-GCM-256 or ChaCha20-Poly1305;
Integrity algorithms: SHA-256, SHA-384, SHA-512, Blake2;
Digital signature algorithms: RSA (3072 bits and higher), ECDSA with
NIST P-384;
Key establishment algorithms: RSA (3072 bits and higher), ECDH with
NIST P-384.
Up-to-date Cryptographic Algorythms
design and software studio auto.bambooapps.eu
Front-end Security Techniques
Strong Random Number Generators
“In order to ensure the quality of the generated
numbers, our team supports SecureRandom
implementation on Android side and
SecureRandomBytes implementation on iOS.”
design and software studio auto.bambooapps.eu
Front-end Security Techniques
Requirements for password length:
Minimum password length (10 characters) should be enforced;
Maximum password length should not be too short
The typical maximum length is 128 characters.
Password Strength
design and software studio auto.bambooapps.eu
Front-end Security Techniques
Rules for password complexity:
At least one uppercase character (A-Z);
At least one lowercase character;
At least one digit (0-9);
At least one special character.
Password Strength
design and software studio auto.bambooapps.eu
Front-end Security Techniques
It is essential to rely on HTTP for communication with the
backend. HTTPS wraps HTTP in an encrypted
connection.TLS allows authentication of the backend
service and ensures confidentiality and integrity of the
network data.
Data Encryption on The Network
design and software studio auto.bambooapps.eu
Front-end Security Techniques
Certificate Pinning
“Bamboo Apps uses certificate pinning to verify that
a certificate comes from a trusted source and to
check whether the endpoint server presents the right
certificate.”
design and software studio auto.bambooapps.eu
Front-end Security Techniques
Protect sensitive data in the keyboard cash: auto correction, spell
checking
Protect sensitive data in backups: all backups are stored encrypted
Protect sensitive information on screenshots: a default screenshot
cached
Other Security Practices
design and software studio auto.bambooapps.eu
Layer 1 Layer 2
SolutionsVehicle
Encryption
Protected Data Storage
Detected & Prevention of Attacks
Secure Connectivity
Security Review
Security Testing
Wireless Car
AT&T Drive
Remoto
Mojito
In-depth approach to automotive
security
design and software studio auto.bambooapps.eu
About Bamboo Apps
Bamboo Apps is a Design & Software Studio with a proven background
in the automotive and mobility domains. We deliver the best user
experience possible guided by design-centric philosophy, product-first
thinking, and extensive tech expertise.
Address: 5th floor, Laeva 2, Tallinn, 10111, Estonia
Phone: + 372 69 803 35
Email: contact@bambooapps.eu
design and software studio auto.bambooapps.eu

More Related Content

What's hot

Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaEdureka!
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Priyanka Aash
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Concept of internet of vehicles
Concept of internet of vehiclesConcept of internet of vehicles
Concept of internet of vehiclesSarthak Pathak
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Dr. Anish Cheriyan (PhD)
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsAmazon Web Services
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metricsVladimir Jirasek
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Edureka!
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC FrameworkRishi Kant
 
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity EngineeringISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity EngineeringBryan Len
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 

What's hot (20)

Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Concept of internet of vehicles
Concept of internet of vehiclesConcept of internet of vehicles
Concept of internet of vehicles
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...
 
Securing Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOpsSecuring Systems at Cloud Scale with DevSecOps
Securing Systems at Cloud Scale with DevSecOps
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Software Defined Car
Software Defined CarSoftware Defined Car
Software Defined Car
 
Secure SDLC Framework
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
 
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity EngineeringISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 

Similar to Automotive Cybersecurity Best Practices

Designing A Market-Ready Digital Key Solution
Designing A Market-Ready Digital Key SolutionDesigning A Market-Ready Digital Key Solution
Designing A Market-Ready Digital Key SolutionBamboo Apps
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingTal Melamed
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...JAYAPRAKASH JPINFOTECH
 
Security Validation
Security ValidationSecurity Validation
Security ValidationPrancer Io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksPayPalX Developer Network
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsCloudflare
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC securityShiu-Fun Poon
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor AuthenticationKalyana Sundaram
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardConference Papers
 
Magento Application Security [EN]
Magento Application Security [EN]Magento Application Security [EN]
Magento Application Security [EN]Anna Völkl
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci complianceRitwik Das
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 

Similar to Automotive Cybersecurity Best Practices (20)

Designing A Market-Ready Digital Key Solution
Designing A Market-Ready Digital Key SolutionDesigning A Market-Ready Digital Key Solution
Designing A Market-Ready Digital Key Solution
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application Hacking
 
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Ne...
 
Security Validation
Security ValidationSecurity Validation
Security Validation
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of Things
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
Magento Application Security [EN]
Magento Application Security [EN]Magento Application Security [EN]
Magento Application Security [EN]
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 

Recently uploaded

Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Komal Khan
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERDineshKumar4165
 
GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024AHOhOops1
 
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样whjjkkk
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607dollysharma2066
 
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一F La
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsMihajloManjak
 
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 HybridHyundai Motor Group
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Nightssuser7cb4ff
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxDineshKumar4165
 
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCRsoniya singh
 
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一ypfy7p5ld
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一fjjwgk
 
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一fjjhfuubb
 
VDA 6.3 Process Approach in Automotive Industries
VDA 6.3 Process Approach in Automotive IndustriesVDA 6.3 Process Approach in Automotive Industries
VDA 6.3 Process Approach in Automotive IndustriesKannanDN
 
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一ga6c6bdl
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...shivangimorya083
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaMalviyaNagarCallGirl
 
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样umasea
 
办理埃默里大学毕业证Emory毕业证原版一比一
办理埃默里大学毕业证Emory毕业证原版一比一办理埃默里大学毕业证Emory毕业证原版一比一
办理埃默里大学毕业证Emory毕业证原版一比一mkfnjj
 

Recently uploaded (20)

Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000Dubai Call Girls Services Call 09900000000
Dubai Call Girls Services Call 09900000000
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
 
GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024
 
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样
(办理学位证)墨尔本大学毕业证(Unimelb毕业证书)成绩单留信学历认证原版一模一样
 
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
( Best ) Genuine Call Girls In Mandi House =DELHI-| 8377087607
 
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
办理(PITT毕业证书)美国匹兹堡大学毕业证成绩单原版一比一
 
Digamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and QualificationsDigamma - CertiCon Team Skills and Qualifications
Digamma - CertiCon Team Skills and Qualifications
 
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
2024 WRC Hyundai World Rally Team’s i20 N Rally1 Hybrid
 
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full NightCall Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
Call Girls Vastrapur 7397865700 Ridhima Hire Me Full Night
 
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptxUNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
UNIT-IV-STEERING, BRAKES AND SUSPENSION SYSTEMS.pptx
 
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Shaheen Bagh 🔝 Delhi NCR
 
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
如何办理(Flinders毕业证)查理斯特大学毕业证毕业证成绩单原版一比一
 
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
如何办理(UC毕业证书)堪培拉大学毕业证毕业证成绩单原版一比一
 
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一
定制昆士兰大学毕业证(本硕)UQ学位证书原版一比一
 
VDA 6.3 Process Approach in Automotive Industries
VDA 6.3 Process Approach in Automotive IndustriesVDA 6.3 Process Approach in Automotive Industries
VDA 6.3 Process Approach in Automotive Industries
 
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一
如何办理迈阿密大学毕业证(UM毕业证)成绩单留信学历认证原版一比一
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
 
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | NoidaFULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
FULL ENJOY - 9953040155 Call Girls in Sector 61 | Noida
 
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样
办理学位证(MLU文凭证书)哈勒 维滕贝格大学毕业证成绩单原版一模一样
 
办理埃默里大学毕业证Emory毕业证原版一比一
办理埃默里大学毕业证Emory毕业证原版一比一办理埃默里大学毕业证Emory毕业证原版一比一
办理埃默里大学毕业证Emory毕业证原版一比一
 

Automotive Cybersecurity Best Practices

  • 1. Automotive Cybersecurity Best Practices auto.bambooapps.eu How to ensure the highest possible degree of security in the era of the intelligent connected car.
  • 2. Transforming Automotive Experience Bamboo Apps wants to be a part of automotive revolution and by working closely with OEMs and mobility companies Bamboo apps team is proud to be one of the few who change the car now and forever. design and software studio auto.bambooapps.eu
  • 3. Main Hackable Attack Surface Fifteen of the most hackable and exposed attack surfaces on a next-generation car. Smartphone Remote Link Type App Airbag ECU OBD ll USB Bluetooth DSRC-Based server (V2X) Passive Keyless Entryvvv Vehicle Access System ECU Steering and Braking ECU Engine and Transmission ECU Lighting System ECU ADAS System ECU TPMS Remote Key design and software studio auto.bambooapps.eu
  • 4. 4 Layers of Security Architecture Software securityNetwork security Cloud security Gateway Hardware security design and software studio auto.bambooapps.eu
  • 5. Security Functions Overview Core security functions to be implemented to deliver a high degree of back-end and front-end security to connected car software. Security logs Communication protection Control keys and access User data protection Identification, authentication, authorisation design and software studio auto.bambooapps.eu
  • 6. Back-end Security Techniques Secure Rest API Communication Secure REST services must only provide HTTPS endpoints. “Use mutually authenticated client-side certificates to provide additional protection for highly privileged web services.” design and software studio auto.bambooapps.eu
  • 7. Back-end Security Techniques We opt for Virtual Private Networks (VPN) or a Transport Layer Security model (TLS model). TLS is mainly a defense against man-in-the-middle attacks. TLS protocols are also effective in securing communications with external entities including telematics service providers, consumer smart devices and, in future, other vehicles and ITS infrastructure. Architecture design and software studio auto.bambooapps.eu
  • 8. Back-end Security Techniques Establishing a certificate authority and managing certificates for servers allows each entity within the infrastructure to validate the members’ identity and encrypt their traffic. Server certificate design and software studio auto.bambooapps.eu
  • 9. Back-end Security Techniques Server Protocol And Cipher Configuration Rules Only Support Strong Protocols; Prefer Ephemeral Key Exchanges; Support TLS-PSK and TLS-SRP for Mutual Authentication; Only Support Secure Renegotiations; Disable Compression; Update Crypto Libraries; Only to support strong cryptographic ciphers. design and software studio auto.bambooapps.eu
  • 10. Back-end Security Techniques Access control is performed by REST services at each API endpoint. Web services in monolithic applications implement this by means of user authentication, authorisation logic and session management. Access Control design and software studio auto.bambooapps.eu
  • 11. Back-end Security Techniques API Keys “Based on our experience, public REST services without access control run the risk of being farmed leading to excessive bills for bandwidth or compute cycles. API keys can be used to mitigate this risk.” design and software studio auto.bambooapps.eu
  • 12. Back-end Security Techniques Other Security Practices File extension checking; Session tokens, credentials are only delivered over HTTPS; Check password quality; Check good and wrong attempts; Multi-factor authentication; Client-side and server-side validation rules; design and software studio auto.bambooapps.eu
  • 13. Back-end Security Techniques Other Security Practices Out-of-channel notification of account lockouts and successful password changes; Brute force protection; Secure cookie session; Restrict Injection: SQL, HTML, NoSQL etc; Restrict Cross-Site Scripting design and software studio auto.bambooapps.eu
  • 14. Front-end Security Techniques We recommend to use the following algorythms: Confidentiality algorithms: AES-GCM-256 or ChaCha20-Poly1305; Integrity algorithms: SHA-256, SHA-384, SHA-512, Blake2; Digital signature algorithms: RSA (3072 bits and higher), ECDSA with NIST P-384; Key establishment algorithms: RSA (3072 bits and higher), ECDH with NIST P-384. Up-to-date Cryptographic Algorythms design and software studio auto.bambooapps.eu
  • 15. Front-end Security Techniques Strong Random Number Generators “In order to ensure the quality of the generated numbers, our team supports SecureRandom implementation on Android side and SecureRandomBytes implementation on iOS.” design and software studio auto.bambooapps.eu
  • 16. Front-end Security Techniques Requirements for password length: Minimum password length (10 characters) should be enforced; Maximum password length should not be too short The typical maximum length is 128 characters. Password Strength design and software studio auto.bambooapps.eu
  • 17. Front-end Security Techniques Rules for password complexity: At least one uppercase character (A-Z); At least one lowercase character; At least one digit (0-9); At least one special character. Password Strength design and software studio auto.bambooapps.eu
  • 18. Front-end Security Techniques It is essential to rely on HTTP for communication with the backend. HTTPS wraps HTTP in an encrypted connection.TLS allows authentication of the backend service and ensures confidentiality and integrity of the network data. Data Encryption on The Network design and software studio auto.bambooapps.eu
  • 19. Front-end Security Techniques Certificate Pinning “Bamboo Apps uses certificate pinning to verify that a certificate comes from a trusted source and to check whether the endpoint server presents the right certificate.” design and software studio auto.bambooapps.eu
  • 20. Front-end Security Techniques Protect sensitive data in the keyboard cash: auto correction, spell checking Protect sensitive data in backups: all backups are stored encrypted Protect sensitive information on screenshots: a default screenshot cached Other Security Practices design and software studio auto.bambooapps.eu
  • 21. Layer 1 Layer 2 SolutionsVehicle Encryption Protected Data Storage Detected & Prevention of Attacks Secure Connectivity Security Review Security Testing Wireless Car AT&T Drive Remoto Mojito In-depth approach to automotive security design and software studio auto.bambooapps.eu
  • 22. About Bamboo Apps Bamboo Apps is a Design & Software Studio with a proven background in the automotive and mobility domains. We deliver the best user experience possible guided by design-centric philosophy, product-first thinking, and extensive tech expertise. Address: 5th floor, Laeva 2, Tallinn, 10111, Estonia Phone: + 372 69 803 35 Email: contact@bambooapps.eu design and software studio auto.bambooapps.eu