Site icon Sophos News

New guidelines: cybersecurity, privacy and your self-driving car

The US Department of Transportation (USDOT) has just issued its eagerly-awaited “guidance” for self-driving and “highly automated” vehicles – and you sense its as pumped about these technologies as any Tesloid, Uberite, or Googler.

The government’s stated goal is: to “accelerate the revolution,” ensuring that “these technologies are safely introduced… provide safety benefits today, and achieve their full safety potential in the future.”

If they succeed, millions of people will be placing their lives in the “hands” of some stunningly data- and software-intensive devices: their own, the vehicles they use for on-demand transportation, and the cars and trucks they’ll share the roads with. So it’s worth considering what the Policy has to say about information security and privacy.

To begin, the government wants automated vehicles to collect a lot of data:

Manufacturers and other entities should have a documented process for testing, validation, and collection of event, incident, and crash data, for… recording the occurrence of malfunctions, degradations, or failures in a way that can be used to establish the cause of any such issues.

[To] …develop new safety metrics, [they] should collect, store and analyze data regarding positive outcomes… in which the HAV system correctly detects a safety-relevant situation, and successfully avoids an incident.

All of this data should be kept “strictly in accordance with the manufacturer’s consumer privacy and security agreements and notices.” What’s more, the government would like those to be fairly robust, at least for the US.

For example:

Next, there’s vehicle cybersecurity – already a plenty-big issue with human-driven cars (as we’ve been telling you here and here and here and here).

Here, USDOT serves up a lot of best-practice language:

Manufacturers and other entities should follow a robust product development process based on a systems-engineering approach to minimize risks to safety, including those due to cybersecurity threats and vulnerabilities…

The identification, protection, detection, response, and recovery functions should be used to enable risk management decisions, address risks and threats, and enable quick response to and learning from cybersecurity events…

All good, if done well! To that end, USDOT exhorts automakers to “consider and incorporate guidance, best practices, and design principles” from multiple leading sources, throughout industry and government.

Meanwhile, everything security-related:

…should be fully documented and all actions, changes, design choices, analyses, associated testing and data should be traceable within a robust document version control environment.

When vulnerabilities are discovered, the industry should share knowledge:

Each industry member should not have to experience the same cyber vulnerabilities in order to learn from them.

For the moment, pretty much all of this is voluntary. Doing it that way was a lot faster than creating formal requirements. Those might come later, as the industry matures and it’s clearer what’s needed.

Presumably some other federal agency will get to worry about the four million Americans who currently drive for a living.

Exit mobile version