What is asset identification in automotive? Video course

Understand the process for asset identification using the CIA model and recommended approaches

Learn what asset identification for vehicle cybersecurity is, its purpose during the Threat Analysis and Risk Assessment process and the steps involved. Moreover, we will also explain how the CIA model helps identify cybersecurity relevant properties. You will also get recommendations on approaches to identify assets depending on the development phase.

Watch video course
asset-identification-videoc-course

Learn How to Perform Asset Identification Based on Recommended Practices

In order to define if an item requires security and is cybersecurity relevant, the asset identification is performed as the first step in the Threat Analysis and Risk Assessment process. In the “Asset Identification” video course, you will learn how to identify assets with the functional and technical approach, as well as how to define cybersecurity properties with the CIA model.

First, you will get an overview of the TARA process, where you will learn why exactly the asset identification is needed for further TARA activities. Then, we will define what the asset identification process according to ISO/SAE 21434 and what a cybersecurity asset is.

Next, we will introduce the functional and technical approaches to identify assets and explain for which development stage and scenarios they are recommended for. Additionally, we will also provide a suggested process and sources for asset identification for each approach based on previous project experience and best practices.

Then, we will define what a cybersecurity property is and how the CIA model is used to determine them and their role in asset identification. Here, we will also indicate if other attributes may be needed.

Finally, you will learn how the determination of assets is done and which considerations must be taken into account for the decision making involved.

Who the Asset Identification video course is made for

For professionals in sales and purchase

In asset identification it is important to understand the impact of stakeholders in cybersecurity relevant components. Therefore, with this video course, you will get a thorough understanding on the asset identification process and its impact on you as a stakeholder, if relevant.

For software and system engineers

This video course is useful for software and system engineers involved in automotive cybersecurity as it explains the first step in the Threat Analysis and Risk Assessment. You will also learn how the CIA model determines cybersecurity properties and which approach to use for asset identification.

Asset Identification – Video course content

I. Intro to Asset Identification

In this part, we will introduce the asset identification in the context of the Threat Analysis and Risk Assessment process and the importance of learning objectives in this video course.

II. ISO/SAE 21434 Risk Assessment Process

In a quick visual overview of the TARA process, you will learn where the asset identification takes place and where it is further needed.

III. Asset Identification & Cybersecurity Asset

Get a thorough explanation of what the asset identification a cybersecurity asset are, to enable a common understanding of the key terms. 

IV. Functional safety vs technical approach for identifying assets

During this section, you will get a thorough explanation about the recommended approaches to identify assets, being the functional safety and technical approach.

V. Suggested practice for asset identification

Here, we will present the CYRES Consulting suggested process and sources for asset identification for both the functional and technical approach.

VI. Determination of Security Properties

Understand what the cybersecurity property is and CIA model, which is used for defining attributes worth protecting. We will also define what a cybersecurity asset is and illustrate when additional attributes might be needed with v2x vehicle communication. 

VII. Determination of Impact on Security Attributes Loss

Following up on the previous section, here we will dive into how the determination of assets process looks like.

VIII. Asset Identification Outro

Lastly, we will recapitulate on the main lessons learned on this video course.

More video courses related to Asset Identification

Popup

Error: Contact form not found.



 

Essential Guide

The Essential Guide to ISO/SAE 21434

How to manage the challenges of the new automotive cybersecurity standards and regulations

Essential Guide

The Essential Guide to ISO/SAE 21434

How to manage the challenges of the new automotive cybersecurity standards and regulations

X