{"id":44911,"date":"2023-09-20T12:35:01","date_gmt":"2023-09-20T10:35:01","guid":{"rendered":"https:\/\/www.usd.de\/?p=44911"},"modified":"2023-09-20T12:35:03","modified_gmt":"2023-09-20T10:35:03","slug":"top-3-aspects-pentests-automotive-cyber-security","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/top-3-aspects-pentests-automotive-cyber-security\/","title":{"rendered":"The Top 3 Security Aspects of Pentests in Automotive Cyber Security"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Connected Vehicles: Infotainment. Autonomous Driving. Cloud Backend.<\/h3>\n\n\n\n<p>Amidst these developments, new opportunities are emerging for businesses, but also entirely new attack paths for cybercriminals. At the same time, they pose new challenges for cybersecurity assessments.<br>A significant tool in this context is penetration testing, or <a href=\"https:\/\/www.usd.de\/en\/pentest\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentest <\/a>for short.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>To take a closer look at this important topic, <strong>Tim Kranz<\/strong>, responsible for usd pentests, took the online stage for the <a href=\"https:\/\/www.bayern-innovativ.de\/de\/veranstaltung\/cyber-sicherheitstest\" target=\"_blank\" rel=\"noreferrer noopener\">webinar<\/a> \"Cyber Security Testing for Product and Company: Pentesting, Code Analysis and Other Methods.\" This event is part of the <a href=\"https:\/\/www.bayern-innovativ.de\/en\/page\/webinar-series-of-the-topic-platform-cybersecurity-and-cluster-automotive\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.bayern-innovativ.de\/en\/page\/webinar-series-of-the-topic-platform-cybersecurity-and-cluster-automotive\" rel=\"noreferrer noopener\">webinar series<\/a> \"Secure Connected Vehicles - Challenge, Opportunities and Risks for the Industry in Bayern\" organized by <a href=\"https:\/\/www.bayern-innovativ.de\/en\/about-us\/about-bayern-innovativ\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.bayern-innovativ.de\/en\/about-us\/about-bayern-innovativ\" rel=\"noreferrer noopener\">bayern innovativ<\/a>. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/Tim-Kranz_rund-1024x992.png\" alt=\"\" class=\"wp-image-44024\" style=\"width:161px;height:156px\" width=\"161\" height=\"156\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>This event series focuses on cybersecurity questions in the automotive, commercial vehicle and supplier industries. In his presentation, <strong>Kranz <\/strong>provided insights into security assessment through penetration testing and now shares his three key findings from the event.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1) Car2Car, Car2X, Car2Cloud: Networking creates attack vectors<\/h2>\n\n\n\n<p>Modern vehicles are equipped with integrated computer systems that communicate with each other, their environment and the traffic infrastructure through interfaces. These enables functions such as infotainment systems, on-board computers and autonomous driving, while also providing remote access via the cloud and backend systems.<\/p>\n\n\n\n<p>This networking poses security risks, as hackers could exploit vulnerabilities in these components to infiltrate vehicles or even take control of them remotely. Therefore, a thorough security review of these interfaces is essential.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2) Pentests and technology-specific analyses enhance automotive industry security<\/h2>\n\n\n\n<p>The IT environment of connected vehicles consists of conventional software and IT components as well as tailored solutions.<\/p>\n\n\n\n<p>For security assessment of conventional components in the automotive industry, traditional pentests are suitable. For example, the back-end system can be examined for vulnerabilities through a classic <a href=\"https:\/\/www.usd.de\/en\/pentest\/pentest-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">system pentest<\/a> or the environment can be examined with a <a href=\"https:\/\/www.usd.de\/en\/security-audits\/cloud-security-audit\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud security audit<\/a> or <a href=\"https:\/\/www.usd.de\/en\/pentest\/pentest-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud pentest<\/a>. The smartphone app for managing one's own vehicle can be analyzed with a classic <a href=\"https:\/\/www.usd.de\/en\/pentest\/pentest-mobile-applications\/\" target=\"_blank\" rel=\"noreferrer noopener\">mobile pentestration test<\/a>.<\/p>\n\n\n\n<p>On the other hand, to check a wireless car key for security vulnerabilities, a technology-specific analysis is advisable, involving an inspection of the cryptography and protocols used.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3.) Tailored security testing: Aligned with individual protection needs<\/h2>\n\n\n\n<p>An important aspect is adapting the security assessments to the individual protection needs of each vehicle component. Not all components require the same intensity of security testing. It is crucial to concentrate resources on the most vulnerable areas and adjust the depth of testing accordingly.<br>For example, it is particularly important to subject critical components that have a direct or indirect impact on traffic safety or vehicle control to intensive security assessment. This is of utmost importance due to the potential impact on road traffic.<\/p>\n\n\n\n<p>Depending on the type of component to be tested, addressing vulnerabilities can become a major challenge. If vulnerabilities are found in components that may be installed thousands of times in the vehicle and cannot be remedied through over-the-air updates, replacement can be costly for the manufacturer. For this reason, we recommend considering security assessments early in the production cycle.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Would you like to learn more about our <a href=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/\" target=\"_blank\" rel=\"noreferrer noopener\">security solutions<\/a>? <a href=\"https:\/\/www.usd.de\/en\/contact-form-analysis-pentests\/\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us<\/a>. We are happy to assist you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Connected Vehicles: Infotainment. Autonomous Driving. Cloud Backend. Amidst these developments, new opportunities are emerging for businesses, but also entirely new attack paths for cybercriminals. At the same time, they pose new challenges for cybersecurity assessments.A significant tool in this context is penetration testing, or pentest for short. To take a closer look at this important [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":44902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,426,374],"tags":[6727,6748,6728,6729,6730,6752,413,6749,6731,6732,6751,6733,2606,445,377,378,6750,6734],"class_list":["post-44911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-events-community-en","category-pentests-security-analyses-en","tag-automotive-cyber-security-en","tag-automotive-penetration-test","tag-automotive-penetrationstest-en","tag-automotive-pentest-en","tag-automotive-security-en","tag-connected-vehicles","tag-cyber-security-en","tag-cyber-security-automotive-industry","tag-cybersicherheit-automobilindustrie-en","tag-fahrzeug-sicherheit-en","tag-hacking-test-car","tag-hacking-tests-fuer-autos-en","tag-it-security-3","tag-it-sicherheit-en","tag-penetrationstest-en","tag-pentest-en","tag-vehicle-security","tag-vernetzte-fahrzeuge-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/44911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=44911"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/44911\/revisions"}],"predecessor-version":[{"id":44984,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/44911\/revisions\/44984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/44902"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=44911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=44911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=44911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}