

The Motivation.
Safety vs. Cybersecurity.
The key takeaway is that an assessment initializes the process, from there, cybersecurity can be tied in systematically along the product lifecycle.
Getting Started With J3061.
The first step in developing a “J3061 approach” is understanding the potential of your system. Conceptualize the attack scenarios and attack surfaces that come with the features and how they will evolve over time. The best way to orchestrate this is to organize a high-level meeting between the parties involved, this is the precursor to developing the Cybersecurity Process.

Cybersecurity Process
- What data is exposed in parts of the vehicle? What type of PII, PHI, or sensitive information is it?
- How is this data stored?
- How is this data exposed and written?
- Who are the players of your system and how do they interact with it?
- What are safety-critical functions of this device and how does it interact with other systems?
- If breached, what mechanisms of safety and cybersecurity will it expose?
- How does your system communicate to all other parts of the system?
- When breached, how far can someone pivot in your system?
Concept Phase
One of the most important phases in the lifecycle as it lays a foundation and direction for the following phases. This phase should result with a Threat Assessment and Risk Analysis (TARA), generation of a cybersecurity model, and cybersecurity goals which all come together to form your cybersecurity concept.
Product Development Phase
The encapsulation of software, hardware, and system development. This phase covers planning, specification, and design when the product will be assessed, tested, validated and released. It is a collaboration between system engineers and cybersecurity professionals to ensure that the right security controls are being developed and baked in.
Gate Reviews
Up Next.
Deep dive into the cybersecurity processes and breaking down the concept phase.