CSMS must cover the entire vehicle lifecycle: Development Phase: ├── TARA (Threat Analysis & Risk Assessment) per ISO/SAE 21434 Clause 15 ├── Cybersecurity requirements derived from TARA ├── Security controls implemented and verified └── Penetration testing of production hardware Production Phase: ├── Key injection procedures (PKI, symmetric keys) ├── Secure manufacturing environment controls └── Software signing and distribution security Post-Production Phase: ├── Vulnerability monitoring (CVE tracking, bug bounty) ├── Incident response process (48h notification to authority) ├── Field update capability (UNECE R156 OTA) └── Annual CSMS re-assessment by type approval authority CSMS Certification: OEM submits CSMS documentation → national type approval authority (KBA Germany, DVSA UK, RDW Netherlands) → approves CSMS → Vehicle model type approval references CSMS certificate
| CSMS Element | ISO/SAE 21434 Reference | Evidence Required |
|---|---|---|
| TARA methodology | Clause 15 (Threat Analysis & Risk Assessment) | TARA report per vehicle model; threat catalogue |
| Security requirements | Clause 10 (Cybersecurity Goals) | Security goal list with rationale from TARA |
| Security controls implementation | Clause 10 + 11 | Security specification, code review, test results |
| Penetration testing | Clause 10.4.5 | Pen test scope, methodology, findings, mitigations |
| Incident response | Clause 8.5 (Monitoring & Triage) | Incident response SOP, monitoring tool evidence |
| Vulnerability management | Clause 8.5 | CVE watch process, patch timeline SLA, closure records |