Automotive Cybersecurity

  1. Security Engineering and Development Lifecycle
    1. Security by Design Principles
      1. Defense in Depth
        1. Least Privilege
          1. Secure Defaults
            1. Fail-Safe Design
              1. Economy of Mechanism
                1. Complete Mediation
                  1. Open Design
                    1. Separation of Privilege
                    2. Threat Analysis and Risk Assessment (TARA)
                      1. Threat Modeling Methodologies
                        1. STRIDE Framework
                          1. EVITA Methodology
                            1. HEAVENS Methodology
                              1. PASTA Framework
                              2. Asset Identification and Classification
                                1. Critical Assets
                                  1. Sensitive Data
                                    1. System Components
                                    2. Threat Identification
                                      1. Threat Actors
                                        1. Attack Vectors
                                          1. Attack Scenarios
                                          2. Vulnerability Assessment
                                            1. Technical Vulnerabilities
                                              1. Process Vulnerabilities
                                                1. Human Factor Vulnerabilities
                                                2. Risk Evaluation and Prioritization
                                                  1. Risk Scoring
                                                    1. Impact Assessment
                                                      1. Likelihood Assessment
                                                        1. Risk Treatment Options
                                                      2. Secure Software Development Lifecycle (SSDLC)
                                                        1. Security Requirements Engineering
                                                          1. Security Requirement Elicitation
                                                            1. Security Requirement Specification
                                                              1. Requirement Traceability
                                                              2. Secure Design and Architecture
                                                                1. Security Architecture Design
                                                                  1. Threat Modeling Integration
                                                                    1. Security Pattern Application
                                                                    2. Secure Coding Practices
                                                                      1. Coding Standards
                                                                        1. MISRA C Guidelines
                                                                          1. CERT C Secure Coding Standard
                                                                          2. Input Validation
                                                                            1. Error Handling
                                                                              1. Memory Management
                                                                              2. Security Testing
                                                                                1. Static Application Security Testing (SAST)
                                                                                  1. Dynamic Application Security Testing (DAST)
                                                                                    1. Interactive Application Security Testing (IAST)
                                                                                      1. Software Composition Analysis (SCA)
                                                                                      2. Vulnerability Management
                                                                                        1. Vulnerability Discovery
                                                                                          1. Vulnerability Assessment
                                                                                            1. Patch Management
                                                                                              1. Security Update Distribution
                                                                                            2. Security Validation and Testing
                                                                                              1. Penetration Testing
                                                                                                1. Black Box Testing
                                                                                                  1. White Box Testing
                                                                                                    1. Gray Box Testing
                                                                                                      1. Red Team Exercises
                                                                                                      2. Fuzz Testing
                                                                                                        1. Protocol Fuzzing
                                                                                                          1. Interface Fuzzing
                                                                                                            1. File Format Fuzzing
                                                                                                              1. Network Fuzzing
                                                                                                              2. Hardware Security Testing
                                                                                                                1. Side-Channel Analysis
                                                                                                                  1. Fault Injection Testing
                                                                                                                    1. Physical Tampering Tests
                                                                                                                      1. Electromagnetic Analysis
                                                                                                                      2. Security Regression Testing
                                                                                                                        1. Automated Security Testing
                                                                                                                          1. Continuous Security Validation
                                                                                                                            1. Security Test Case Management