{"id":36596,"date":"2023-08-26T03:03:58","date_gmt":"2023-08-26T07:03:58","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=36596"},"modified":"2023-10-20T05:48:40","modified_gmt":"2023-10-20T09:48:40","slug":"vehicle-security-operations-center","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/vehicle-security-operations-center\/36596\/","title":{"rendered":"This will defend your automotive business against next-gen cyberattacks"},"content":{"rendered":"<p>Cars are more connected than ever before: Onboard music streaming, GPS maps beamed to vehicles via the internet of things (IoT) \u2013 they\u2019re computers on wheels becoming more digitized. Traditional automotive manufacturers are transforming their business models to reflect this, with technologies like <a href=\"https:\/\/www.prnewswire.com\/news-releases\/global-automotive-e-commerce-and-marketplaces-report-2021-featuring-top-50-largest-automotive-marketplaces--top-10-highest-revenue-automotive-marketplaces-301422108.html\" target=\"_blank\" rel=\"noopener nofollow\">in-vehicle online marketplaces<\/a>.<\/p>\n<p>As the automotive industry evolves towards fully autonomous vehicles, security becomes harder to control. But security must be active throughout the car\u2019s lifecycle. Make no mistake, security breaches can be fatal and costly. If you\u2019re manufacturing vehicles with connected capacity, a Vehicle Security Operations Center (VSOC) can increase protection for your business, fleet and customers against cyberattacks. First, let\u2019s explore the changing landscape and its risks.<\/p>\n<h2>Connected cars are easy targets for remote hackers and terrorists<\/h2>\n<p>Operating systems in connected vehicles aren\u2019t just a personal data goldmine \u2013 with audio files recorded by in-car microphones to stored bank details and even Netflix and Spotify credentials <a href=\"https:\/\/insideevs.com\/news\/419525\/tesla-data-leak-personal-info-ebay\/\" target=\"_blank\" rel=\"noopener nofollow\">leaked on eBay<\/a> \u2013 but they can also control vehicle movement. If a hacker remotely hijacks the operating system of one of your vehicles or even your whole fleet, the consequences could be devastating.<br>\n<img decoding=\"async\" class=\"aligncenter wp-image-36602 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/07\/29105758\/111_vehicle_security_operations_center-inline-1024x640.jpg\" alt=\"vehicle security operations center, transport, automated vehicle \nData streams being broadcast through wifi\" width=\"1024\" height=\"640\">Whether it\u2019s <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/sep\/20\/tesla-model-s-chinese-hack-remote-control-brakes\" target=\"_blank\" rel=\"noopener nofollow\">taking control of a Tesla\u2019s brakes, door locks and other electronics<\/a>, or exposing personal data like <a href=\"https:\/\/techcrunch.com\/2019\/10\/19\/mercedes-benz-app-glitch-exposed\/\" target=\"_blank\" rel=\"noopener nofollow\">Mercedes-Benz<\/a> \u2013 hackers do and will find vulnerabilities in connected vehicles. But why?<\/p>\n<p>Terrorists looking to cause fatal chaos. Hackers out for financial gain (they may shut the engine down and demand payment to start it again.) Even mercenaries spying on executives \u2013 think how valuable audio files of confidential merger plans would be to rivals.<\/p>\n<blockquote><p>Connected cars are a big target for malicious actors. So it\u2019s up to you as the manufacturer to make sure you tighten up security. <\/p>\n<\/blockquote>\n<h2>What is a Vehicle Security Operations Center?<\/h2>\n<p>A <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-operations-center-sme\/28070\/\" target=\"_blank\" rel=\"noopener nofollow\">Security Operations Center<\/a> (SOC) is a team that deals with security issues at an organizational or technical level. In most cases, the team uses a platform dedicated to constant monitoring of the organization\u2019s IT infrastructure.<\/p>\n<p>A Vehicle Security Operations Center (VSOC) is the same, but as well as protecting computers and servers, it also protects assets like connected vehicle cloud and fleet management system (which send and receive messages to and from vehicle\u2019s telematics control unit) and the vehicles themselves, mobility servers (phones connected to vehicles) and vehicle internal components like sensors and radars. Two audiences need VSOCs: Automotive manufacturers (like Mercedes or Tesla) and large fleet owners (like logistics companies or taxi firms.)<\/p>\n\t\t\t<div class=\"c-promo-product\">\n\t\t\t\t\t\t<article class=\"c-card c-card--link c-card--medium@sm c-card--aside-hor@lg\">\n\t\t\t\t<div class=\"c-card__body  \">\n\t\t\t\t\t<header class=\"c-card__header\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"c-card__headline\">Secure Futures<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"c-card__title \"><span>What's coming next?<\/span><\/h3>\n\t\t\t\t\t\t\t\t\t\t\t<\/header>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"c-card__desc \">\n\t\t\t\t\t\t\t<p>Be first to find out what\u2019s happening in tech, leadership and cybersecurity.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"c-card__aside\">\n\t\t\t\t\t<a href=\"#modal_newsletter\" class=\"c-button c-card__link\" target=\"_blank\" rel=\"noopener\">Stay ahead<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/article>\n\t\t<\/div>\n\t\n<p>It minimizes the risks of cyberattacks and, in the event of a breach, triages and treats the cyber-wound. It can also give unwavering diagnostics of your entire fleet (great for ongoing and predictive maintenance) and a wealth of information on how your cars are used, like time and distance traveled, Wi-Fi strength or errors in the engine performance. Perfect for R&amp;D for new models. But how do you implement a VSOC?<\/p>\n<h2>VSOC: To in-house or outsource?<\/h2>\n<p>There are two ways to create your VSOC: In-house or outsource. In-house means integrating the unit into your current operations, either within your cybersecurity operations, quality assurance or the vehicle software R&amp;D team. On the other hand, you could outsource part or all of the VSOC to a third-party provider. In some instances, this may be helpful to start with, as you may not yet have the cybersecurity infrastructure and expertise.<\/p>\n<p>A full VSOC may be out of scope for a small fleet owner, but if you run a large fleet or you\u2019re an automotive manufacturer, in the long term, it will be most beneficial to your business to establish your VSOC internally.<\/p>\n<h2>How to launch your VSOC<\/h2>\n<p>Here are some tips to get started:<\/p>\n<h3>Create a playbook<\/h3>\n<p>Security experts should create incident response <a href=\"https:\/\/www.dflabs.com\/resources\/blog\/the-difference-between-playbooks-and-runbooks-in-incident-response\/\" target=\"_blank\" rel=\"noopener nofollow\">playbooks<\/a> (guidelines) to show how you would respond to specific cyber-threats and how to <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cyber-incidence-communication-response\/32379\/\" target=\"_blank\" rel=\"noopener nofollow\">manage incident communications<\/a>.<\/p>\n<h3>Expand your team\u2019s knowledge<\/h3>\n<p>Many cybersecurity teams focus on server infrastructure, not connected vehicles. Implement advanced cybersecurity training to develop the skills of your current team. For example, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/cyber-security-training\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Training<\/a> covers malware analysis, digital forensics and incident response to help a specialist enterprise-level team better face these threats.<\/p>\n<h3>Funnel issues straight to your VSOC<\/h3>\n<p>Establish a system to escalate vehicle monitoring and diagnostics when needed, so in the event of a breach, it\u2019s sent straight to the cybersecurity teams.<\/p>\n<h3>Regular security assessments<\/h3>\n<p>Periodically conduct security assessments of your connected car\u2019s infrastructure, both the separate modules (like TCU and mobile apps) and also test how the complete system works together. Share these results with your VSOC team.<\/p>\n<h3>Maximize data capture<\/h3>\n<p>Investing in onboard vehicle software, like intrusion detection systems, will feed your VSOC with vital information to detect anomalies and other signs that could lead to data breaches. Enrich your VSOC with threat data feeds from at least two security vendors. There are public feeds available, but licensed feeds are typically better quality.<\/p>\n<h3>Use white-hat hackers<\/h3>\n<p>Make use of the global community of <a href=\"https:\/\/www.kaspersky.co.uk\/resource-center\/definitions\/white-hat-hackers\" target=\"_blank\" rel=\"noopener\">white-hat hackers<\/a>. These are friendly hackers, trained professionals who find vulnerabilities and make sure your systems are bulletproof. And if they\u2019re not, they\u2019ll give you the diagnosis to fix them. You could also join the likes of BMW and Tesla and launch a Bug Bounty program, <a href=\"https:\/\/www.kaspersky.com\/blog\/bug-bounty-boost-2018\/21477\/\" target=\"_blank\" rel=\"noopener nofollow\">which pays people (professional and amateur) for any bugs they find. <\/a><\/p>\n<h3>Work towards the latest regulatory standards<\/h3>\n<p>Future proof to upcoming vehicle regulation laws like <a href=\"https:\/\/www.unece.org\/trans\/main\/welcwp29.html\" target=\"_blank\" rel=\"noopener nofollow\">Transport UNECE WP.29<\/a>, and <a href=\"https:\/\/www.upstream.auto\/blog\/setting-the-standard-for-automotive-cybersecurity\/\" target=\"_blank\" rel=\"noopener nofollow\">ISO\/SAE 21434<\/a>.<\/p>\n<p>As connected cars and autonomous vehicles speed towards making our roads safer and giving people a more comfortable driving experience, automotive businesses must ensure they\u2019re doing everything they can to protect their products from cyberattacks. A VSOC minimizes the chances of a cybersecurity breach in your plant, on the road and for your customers, so you can focus on building the future of transport.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Vehicle Security Operations Center is crucial to protect your automotive business from costly and fatal cyberattacks. Here\u2019s how to get started.<\/p>\n","protected":false},"author":2590,"featured_media":36598,"template":"","coauthors":[3848,3918],"class_list":{"0":"post-36596","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-enterprise-cybersecurity","7":"emagazine-category-future-tech","8":"emagazine-category-internet-of-things","9":"emagazine-tag-automotive","10":"emagazine-tag-autonomous-vehicles","11":"emagazine-tag-security-operations-center","12":"emagazine-tag-transport-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/vehicle-security-operations-center\/36596\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/36596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36598"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=36596"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=36596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}