Skip to main content

Engineering Consulting

UNECE Regulations in Effect - Are You "Prepared for Cybersecurity"?

From July 2024, cybersecurity is mandatory for all new type-approved vehicles.
Address everything from ISO/SAE 21434-based CSMS development to TARA and security verification at once.

From July 2024, cybersecurity is mandatory for all new type-approved vehicles. Address everything from ISO/SAE 21434-based CSMS development to TARA and security verification at once.

Why You Need This

Vehicle Cybersecurity -
No Longer Optional,
Now Mandatory

Does your product fall under UNECE WP.29 regulations?
From July 2024, vehicles that don't meet cybersecurity requirements cannot receive type approval in major markets including EU, Korea, and Japan. Tier1/Tier2 suppliers to OEMs must also meet cybersecurity requirements.
Cybersecurity is different from functional safety - not sure how to approach it?
Cybersecurity requires a systematic approach similar to functional safety, but demands entirely different expertise such as threat analysis, penetration testing, and secure coding. Existing organizations often struggle to respond.
Are you receiving cybersecurity requirements from OEMs?
Global OEMs are requiring Tier1 suppliers to establish CSMS (Cybersecurity Management System) and provide evidence of product-specific cybersecurity activities. Failure to respond leads to disadvantages in new orders.

Service Introduction

SeonENS Cybersecurity Consulting

At SeonENS, experts who understand both ISO/SAE 21434 standards and UNECE regulations perform consulting.
We provide solutions tailored to your situation, from minimum requirements for regulatory compliance to systematic security process development.

CSMS Development Support
We build organization-level Cybersecurity Management Systems (CSMS). We secure organizational capabilities required for type approval including policies, processes, roles/responsibilities, and competency management.
TARA Execution Support
We systematically perform Threat Analysis and Risk Assessment (TARA). We provide product-specific analysis from asset identification, threat scenario derivation, attack path analysis, to risk treatment measures.
Secure Coding and Verification
We apply CERT and CWE-based secure coding rules to prevent code-level security vulnerabilities. We support static analysis tool utilization and security testing.
Penetration Testing Coordination
When needed, we coordinate with external security specialist organizations to perform penetration testing. We strengthen product security through vulnerability verification based on real attack scenarios.

Service Areas

ISO/SAE 21434-Based Activities

Organization Level (CSMS)
  • Cybersecurity policy and regulation establishment
  • Role/responsibility/authority definition
  • Cybersecurity competency management system
  • Supply chain security management
  • Information sharing and monitoring system
Project Level (Product Development)
  • Cybersecurity planning
  • TARA (Threat Analysis and Risk Assessment)
  • Cybersecurity concept development
  • Cybersecurity requirements derivation
  • Design and implementation verification
  • Cybersecurity verification and validation
Production and Operations
  • Production security activities (security key management, etc.)
  • Vulnerability monitoring and response
  • Cybersecurity incident response system

UNECE WP.29 Regulation Response

Requirement SeonENS Support
CSMS Certification (R155) Organization CSMS development and audit response support
Type Approval Cybersecurity Product-specific cybersecurity activity support
Security Update Management SUMS (SW Update Management System) integration
Supply Chain Management Tier2 and below supplier management system establishment

Secure Coding Support

Standard Application
CERT C/C++ Memory management, input validation, error handling, etc.
CWE Top 25 Response to 25 most dangerous SW vulnerabilities
MISRA C Safety/security related coding rules
AUTOSAR C++ AUTOSAR environment secure coding

Consulting Process

Phase 1: Current State Diagnosis
  • Evaluate current organization/product cybersecurity maturity
  • ISO 21434 / UNECE regulation gap analysis
  • Response roadmap and priority setting
Phase 2: CSMS Development
  • Cybersecurity policy/process establishment
  • Role/responsibility definition and organization setup
  • Template and guideline development
Phase 3: Product Application
  • Target product TARA execution
  • Cybersecurity concept and requirements development
  • Security design and implementation review
  • Security verification (code analysis, testing)
Phase 4: Audit Response
  • CSMS certification audit response
  • Type approval cybersecurity evidence preparation
  • OEM requirement response support

Expected Benefits

Practical Benefits

  • Internal Security Capability Enhancement
  • Along with CSMS certification, we support building cybersecurity systems within your organization. You'll have a system capable of continuous threat response and security improvement.
  • Regulatory Response Foundation
  • We build a foundation to respond to UNECE regulations and OEM requirements. We create sustainable systems, not just short-term responses.
  • Integration with Development Process
  • Cybersecurity activities become part of development, not a separate burden. We create a culture where security is naturally considered from early design stages.
  • Security Awareness Improvement
  • You'll understand cybersecurity as "an essential process for product protection" rather than "activities for regulatory compliance." In the SDV era, security is core to competitiveness.
  • Continuous Improvement System
  • Cyber threats continue to evolve. We create systems for continuous monitoring and response, not one-time implementation.

Start Cybersecurity Response Now

Start Cybersecurity
Response Now

UNECE regulatory requirements are imminent. Work with experts to establish a response strategy suited to your situation.
Start with a free consultation for current situation diagnosis.

UNECE regulatory requirements are imminent. Work with experts to establish a response strategy suited to your situation. Start with a free consultation for current situation diagnosis.