© ISO SAE 21434 – All rights reserved 
ISO	SAE	21434:2018(X)	
ISO TC 22/SC 32/WG 11 
SAE 
Secretariat: ISO SAE 
Road	vehicles	–	Cybersecurity	engineering		
CD stage 
1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
 
 
 
 
This document is not an ISO International Standard. It is distributed for review and comment. It is subject to 
change without notice and may not be referred to as an International Standard. 
Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of 
which they are aware and to provide supporting documentation. 
Warning	for	WDs	and	CDs	
To	help	you,	this	guide	on	writing	standards	was	produced	by	the	ISO/TMB	and	is	available	at	
https://www.iso.org/iso/how‐to‐write‐standards.pdf	
A	model	manuscript	of	a	draft	International	Standard	(known	as	“The	Rice	Model”)	is	available	at	
https://www.iso.org/iso/model_document‐rice_model.pdf	
20 
21 
22 
23 
24 
25 
26 
27 
28 
29 
30 
31 
32 
ISO	SAE	21434:2018(X)	
© ISO SAE 2018 
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this 
publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, 
including photocopying, or posting on the internet or an intranet, without prior written permission. Permission 
can be requested from either ISO at the address below or ISO’s member body in the country of the requester. 
ISO copyright office 
CP 401 • Ch. de Blandonnet 8 
CH-1214 Vernier, Geneva 
Phone: +41 22 749 01 11 
Fax: +41 22 749 09 47 
Email: copyright@iso.org 
Website: www.iso.org 
Published in Switzerland 
ii 
© ISO SAE 21434 – All rights reserved 
33 
34 
35 
36 
37 
38 
39 
40 
41 
42 
43 
44 
45 
46 
47 
48 
49 
50 
51 
52 
53 
54 
55 
56 
57 
58 
59 
60 
61 
62 
63 
64 
65 
66 
67 
68 
69 
70 
71 
72 
73 
74 
75 
76 
77 
78 
79 
80 
81 
82 
Contents	
ISO	SAE	21434:2018(X)	
Foreword	.......................................................................................................................................................................	vii 
Introduction.................................................................................................................................................................	viii 
1  Scope	..........................................................................................................................................................................	1 
2  Normative	references	..........................................................................................................................................	1 
3  Terms	and	abbreviations	....................................................................................................................................	1 
  Terms	and	definitions	..........................................................................................................................................	1 
3.1
3.2
  Abbreviated	terms	................................................................................................................................................	6 
4  General	considerations	(informative)	...........................................................................................................	6 
4.1
  The	vehicle	ecosystem	.........................................................................................................................................	6 
4.2
  Organizational	overview	of	cybersecurity	management	........................................................................	8 
4.3
  Lifecycle	.....................................................................................................................................................................	8 
4.4
  Stages	of	the	post‐production	phase	...............................................................................................................	9 
5  Management	of	Cybersecurity	.......................................................................................................................	10 
5.1
  Overall	Cybersecurity	Management	............................................................................................................	10 
5.1.1  Objectives	........................................................................................................................................................	10 
5.1.2  General	.............................................................................................................................................................	11 
5.1.3 
Inputs	................................................................................................................................................................	11 
5.1.4  Requirements	and	recommendations	..................................................................................................	11 
5.1.5  Work	products	...............................................................................................................................................	16 
5.2
  Cybersecurity	management	during	the	concept	phase	and	product	development	....................	16 
5.2.1  Objectives	........................................................................................................................................................	16 
5.2.2  General	.............................................................................................................................................................	16 
5.2.3 
Inputs	................................................................................................................................................................	17 
5.2.4  Requirements	and	recommendations	..................................................................................................	17 
5.2.5  Work	products	...............................................................................................................................................	24 
5.3
  Cybersecurity	management	during	production,	operations	and	maintenance	...........................	24 
5.3.1  Objectives	........................................................................................................................................................	24 
5.3.2  General	.............................................................................................................................................................	24 
5.3.3 
Inputs	................................................................................................................................................................	24 
5.3.4  Requirements	and	recommendations	..................................................................................................	25 
5.4
  Information	Collection	and	Retention	........................................................................................................	26 
5.4.1  Objective	..........................................................................................................................................................	26 
5.4.2  General	.............................................................................................................................................................	26 
5.4.3 
Inputs	................................................................................................................................................................	26 
5.4.4  Requirements	and	recommendations	..................................................................................................	26 
6  Risk	assessment	methods	................................................................................................................................	27 
6.1
  Risk	assessment	methods	introduction	(informative)	.........................................................................	27 
6.2
  Asset	identification	............................................................................................................................................	29 
6.2.1  Objectives	........................................................................................................................................................	29 
6.2.2  General	.............................................................................................................................................................	29 
6.2.3 
Inputs	................................................................................................................................................................	30 
6.2.4  Requirements	and	Recommendations	.................................................................................................	31 
6.2.5  Work	Products	...............................................................................................................................................	31 
6.3
  Threat	Analysis	....................................................................................................................................................	32 
6.3.1  Objectives	........................................................................................................................................................	32 
6.3.2  General	.............................................................................................................................................................	32 
6.3.3 
Inputs	................................................................................................................................................................	32 
6.3.4  Requirements	and	recommendations	..................................................................................................	33 
6.3.5  Work	products	...............................................................................................................................................	33 
© ISO SAE 21434 – All rights reserved 
iii 
83 
84 
85 
86 
87 
88 
89 
90 
91 
92 
93 
94 
95 
96 
97 
98 
99 
100 
101 
102 
103 
104 
105 
106 
107 
108 
109 
110 
111 
112 
113 
114 
115 
116 
117 
118 
119 
120 
121 
122 
123 
124 
125 
126 
127 
128 
129 
130 
131 
132 
133 
134 
135 
136 
ISO	SAE	21434:2018(X)	
  Impact	Assessment	.............................................................................................................................................	33 
6.4
6.4.1  Objectives	........................................................................................................................................................	33 
6.4.2  General	.............................................................................................................................................................	33 
6.4.3 
Inputs	................................................................................................................................................................	34 
6.4.4  Requirements	and	Recommendations	.................................................................................................	34 
6.4.5  Work	products	...............................................................................................................................................	36 
6.5
  Vulnerability	analysis	.......................................................................................................................................	36 
6.5.1  Objectives	........................................................................................................................................................	36 
6.5.2  General	.............................................................................................................................................................	36 
6.5.3 
Inputs	................................................................................................................................................................	38 
6.5.4  Requirements	and	Recommendations	.................................................................................................	39 
6.5.5  Work	products	...............................................................................................................................................	40 
6.6
  Attack	analysis	.....................................................................................................................................................	40 
6.6.1  Objectives	........................................................................................................................................................	40 
6.6.2  General	.............................................................................................................................................................	40 
6.6.3 
Inputs	................................................................................................................................................................	40 
6.6.4  Requirements	and	recommendations	..................................................................................................	41 
6.6.5  Work	products	...............................................................................................................................................	42 
6.7
  Attack	Feasibility	Assessment	........................................................................................................................	42 
6.7.1  Objectives	........................................................................................................................................................	42 
6.7.2  General	.............................................................................................................................................................	42 
6.7.3 
Inputs	................................................................................................................................................................	42 
6.7.4  Requirements	and	recommendations	..................................................................................................	42 
6.7.5  Work	products	...............................................................................................................................................	44 
6.8
  Risk	assessment	..................................................................................................................................................	44 
6.8.1  Objectives	........................................................................................................................................................	44 
6.8.2  General	.............................................................................................................................................................	44 
6.8.3 
Inputs	................................................................................................................................................................	45 
6.8.4  Requirements	and	Recommendations	.................................................................................................	45 
6.8.5  Work	products	...............................................................................................................................................	45 
6.9
  Risk	Treatment	....................................................................................................................................................	45 
6.9.1  Objectives	........................................................................................................................................................	45 
6.9.2  General	.............................................................................................................................................................	45 
6.9.3 
Inputs	................................................................................................................................................................	46 
6.9.4  Requirements	and	Recommendations	.................................................................................................	47 
6.9.5  Work	products	...............................................................................................................................................	47 
7  Concept	Phase	......................................................................................................................................................	47 
7.1
  Cybersecurity	Relevance	..................................................................................................................................	47 
7.1.1  Objectives	........................................................................................................................................................	47 
7.1.2  General	.............................................................................................................................................................	48 
7.1.3 
Inputs	................................................................................................................................................................	48 
7.1.4  Requirements	and	Recommendations	.................................................................................................	48 
7.1.5  Work	products	...............................................................................................................................................	48 
7.2
  Item	Definition	.....................................................................................................................................................	48 
7.2.1  Objectives	........................................................................................................................................................	48 
7.2.2  General	.............................................................................................................................................................	48 
7.2.3 
Inputs	................................................................................................................................................................	49 
7.2.4  Requirements	and	Recommendations	.................................................................................................	49 
7.2.5  Work	products	...............................................................................................................................................	50 
7.3
  Initiation	of	product	development	at	the	concept	phase	.....................................................................	50 
7.3.1  Objectives	........................................................................................................................................................	50 
7.3.2  General	.............................................................................................................................................................	50 
7.3.3 
Inputs	................................................................................................................................................................	50 
7.3.4  Requirements	and	recommendations	..................................................................................................	50 
© ISO SAE 21434 – All rights reserved 
iv 
137 
138 
139 
140 
141 
142 
143 
144 
145 
146 
147 
148 
149 
150 
151 
152 
153 
154 
155 
156 
157 
158 
159 
160 
161 
162 
163 
164 
165 
166 
167 
168 
169 
170 
171 
172 
173 
174 
175 
176 
177 
178 
179 
180 
181 
182 
183 
184 
185 
186 
187 
188 
189 
190 
ISO	SAE	21434:2018(X)	
7.3.5  Work	Products	...............................................................................................................................................	51 
7.4
  Cybersecurity	goals	............................................................................................................................................	51 
7.4.1  Objectives	........................................................................................................................................................	51 
7.4.2  General	.............................................................................................................................................................	51 
7.4.3 
Inputs	................................................................................................................................................................	51 
7.4.4  Requirements	and	recommendations	..................................................................................................	51 
7.4.5  Work	Products	...............................................................................................................................................	53 
7.5
  Cybersecurity	concept	......................................................................................................................................	53 
7.5.1  Objectives	........................................................................................................................................................	53 
7.5.2  General	.............................................................................................................................................................	53 
7.5.3 
Inputs	................................................................................................................................................................	53 
7.5.4  Requirements	and	recommendations	..................................................................................................	54 
7.5.5  Work	Products	...............................................................................................................................................	55 
8  Product	development	........................................................................................................................................	55 
8.1
  System	development	phase	.............................................................................................................................	55 
8.1.1  Objectives	........................................................................................................................................................	55 
8.1.2  General	.............................................................................................................................................................	55 
8.1.3 
Inputs	................................................................................................................................................................	56 
8.1.4  Requirements	and	recommendations	..................................................................................................	57 
8.1.5  Work	products	...............................................................................................................................................	63 
8.2
  Hardware	development	phase	.......................................................................................................................	63 
8.2.1  Objectives	........................................................................................................................................................	63 
8.2.2  General	.............................................................................................................................................................	64 
8.2.3 
Inputs	................................................................................................................................................................	64 
8.2.4  Requirements	and	recommendations	..................................................................................................	65 
8.2.5  Work	products	...............................................................................................................................................	68 
8.3
  Software	development	phase	.........................................................................................................................	68 
8.3.1  Objectives	........................................................................................................................................................	68 
8.3.2  General	.............................................................................................................................................................	69 
8.3.3 
Inputs	................................................................................................................................................................	69 
8.3.4  Requirements	and	recommendations	..................................................................................................	70 
8.3.5  Work	products	...............................................................................................................................................	82 
8.4
  Verification	and	validation	.............................................................................................................................	83 
8.4.1  Objective	..........................................................................................................................................................	83 
8.4.2  General	.............................................................................................................................................................	83 
8.4.3 
Inputs	................................................................................................................................................................	84 
8.4.4  Requirements	and	recommendations	..................................................................................................	84 
8.4.5  Work	products	...............................................................................................................................................	87 
8.5
  Release	for	post‐development	.......................................................................................................................	87 
8.5.1  Objective	..........................................................................................................................................................	87 
8.5.2  General	.............................................................................................................................................................	87 
8.5.3 
Inputs	................................................................................................................................................................	88 
8.5.4  Requirements	and	recommendations	..................................................................................................	88 
8.5.5  Work	products	...............................................................................................................................................	89 
9  Production,	operations	and	maintenance	.................................................................................................	89 
9.1
  Production	.............................................................................................................................................................	89 
9.1.1  Objectives	........................................................................................................................................................	89 
9.1.2  General	.............................................................................................................................................................	89 
9.1.3 
Inputs	................................................................................................................................................................	89 
9.1.4  Requirements	and	recommendations	..................................................................................................	89 
9.1.5  Work	products	...............................................................................................................................................	91 
9.2
  Cybersecurity	Monitoring	................................................................................................................................	91 
9.2.1  Objectives	........................................................................................................................................................	91 
9.2.2  General	.............................................................................................................................................................	91 
© ISO SAE 21434 – All rights reserved 
v 
191 
192 
193 
194 
195 
196 
197 
198 
199 
200 
201 
202 
203 
204 
205 
206 
207 
208 
209 
210 
211 
212 
213 
214 
215 
216 
217 
218 
219 
220 
221 
222 
223 
224 
225 
226 
227 
228 
ISO	SAE	21434:2018(X)	
9.2.3 
Inputs	................................................................................................................................................................	92 
9.2.4  Requirements	and	recommendations	..................................................................................................	92 
9.2.5  Work	Products	...............................................................................................................................................	94 
9.3
  Vulnerability	handling	and	incident	response	........................................................................................	94 
9.3.1  Objectives	........................................................................................................................................................	94 
9.3.2  General	.............................................................................................................................................................	94 
9.3.3 
Inputs	to	this	clause	.....................................................................................................................................	94 
9.3.4  Requirements	and	recommendations	..................................................................................................	94 
9.3.5  Work	products	...............................................................................................................................................	98 
9.4
  Updates	...................................................................................................................................................................	98 
9.4.1  Objectives	........................................................................................................................................................	98 
9.4.2  General	.............................................................................................................................................................	99 
9.4.3 
Inputs	................................................................................................................................................................	99 
9.4.4  Requirements	and	recommendations	..................................................................................................	99 
9.4.5  Work	products	.............................................................................................................................................	102 
10  Supporting	processes	......................................................................................................................................	102 
10.1
  Objectives	......................................................................................................................................................	102 
10.2
  Management	Systems................................................................................................................................	102 
10.3
  Distributed	cybersecurity	activities	....................................................................................................	103 
10.3.1  General	...........................................................................................................................................................	103 
10.3.2  Requirements	and	recommendations	................................................................................................	103 
10.4
  Tool	Management	.......................................................................................................................................	106 
10.4.1  General	...........................................................................................................................................................	106 
10.4.2  Input	to	this	subclause	.............................................................................................................................	106 
10.4.3  Requirements	and	recommendations	................................................................................................	107 
10.5
  Work	products	.............................................................................................................................................	109 
Annex	A	(informative)		Summary	of	cybersecurity	activities	..................................................................	110 
Annex	B	(informative)		Examples	of	a	cybersecurity	culture	...................................................................	113 
Annex	C	(informative)		DIA	Template	Example	.............................................................................................	115 
Annex	D	(informative)		Cybersecurity	Relevance	Assessment:	Methodology	and	Examples	.......	117 
Annex	E	(informative)		Cybersecurity	Assurance	Levels	...........................................................................	121 
Annex	F	(informative)		Methods	for	Verification	and	Validation	............................................................	130 
Annex	G	(informative)		Artefacts	needed	for	production	and	post‐production	phase	...................	132 
Annex	H	(informative)		Example	Use	Cases	and	Work	Products:	Head	Lamp	System	.....................	134 
Annex	I	(informative)		Information	to	reader	about	terms	with	Oxford	dictionary	definition	...	139 
Annex	J	(informative)		Methods	for	testing	cybersecurity	vulnerabilities	in	the	
cybersecurity	event	assessment	...........................................................................................................	140 
		
vi 
© ISO SAE 21434 – All rights reserved 
Foreword	
ISO	SAE	21434:2018(X)	
229 
230 
ISO (the International Organization for Standardization) is a worldwide federation of national 
231 
standards bodies (ISO member bodies). The work of preparing International Standards is normally 
232 
carried out through ISO technical committees. Each member body interested in a subject for which a 
233 
technical committee has been established has the right to be represented on that committee. 
234 
International organizations, governmental and non-governmental, in liaison with ISO, also take part in 
235  matters of electrotechnical standardization. 
the work. ISO collaborates closely with the International Electrotechnical Commission (IEC) on all 
236 
237 
The procedures used to develop this document and those intended for its further maintenance are 
238 
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the 
239 
different types of ISO documents should be noted. This document was drafted in accordance with the 
240 
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives). 
241 
Attention is drawn to the possibility that some of the elements of this document may be the subject of 
242 
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of 
any patent rights identified during the development of the document will be in the Introduction and/or 
243 
244 
on the ISO list of patent declarations received (see www.iso.org/patents). 
245 
Any trade name used in this document is information given for the convenience of users and does not 
constitute an endorsement. 
246 
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and 
247 
expressions related to conformity assessment, as well as information about ISO's adherence to the 
248  World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see 
249  www.iso.org/iso/foreword.html. 
250 
251 
This document was prepared by Technical Committee [or	Project	Committee] ISO/TC [or	ISO/PC] ###, 
[name	of	committee], Subcommittee SC ##, [name	of	subcommittee]. 
252 
This second/third/… edition cancels and replaces the first/second/… edition (ISO #####:####), which 
253 
254 
has been technically revised. 
255  —  xxx xxxxxxx xxx xxxx 
The main changes compared to the previous edition are as follows: 
256 
A list of all parts in the ISO ##### series can be found on the ISO website. 
257 
258 
Any feedback or questions on this document should be directed to the user’s national standards body. A 
259 
complete listing of these bodies can be found at www.iso.org/members.html. 
© ISO SAE 21434 – All rights reserved 
vii 
Introduction	
Purpose	
ISO	SAE	21434:2018(X)	
260 
261 
Electrical and Electronic systems are subject to threats stemming from reliance on computer and 
262 
communication technologies.  This document is intended to manage such threats. 
263 
It provides vocabulary, processes, requirements and guiding principles to found a common 
264 
understanding between stakeholders. 
265 
266  — foster a cybersecurity culture; 
This document provides a framework to ensure a consistent, well defined and robust approach to: 
267  — manage cybersecurity risk; 
268  — allow adaptation to a continually changing threat landscape; 
269  — institute a cybersecurity management system. 
270 
271 
Figure 1 and the text below provide an overview of the contents covered. 
272 
Organisation	of	this	document	
Figure	1	‐	ISO/SAE	21434	Overview	
273 
 
274  Management of Cybersecurity includes the organizational cybersecurity strategy, policy and objectives. 
275 
276 
Risk Management includes a plan and method to determine the extent to which the road user is 
277 
threatened by a potential circumstance or event. 
278 
The concept phase defines cybersecurity goals, resulting from a threat analysis and risk assessment. 
279 
Subsequently, cybersecurity requirements are specified to achieve the cybersecurity goals. 
viii 
© ISO SAE 21434 – All rights reserved