{"id":112394,"date":"2023-10-31T09:00:00","date_gmt":"2023-10-31T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?p=112394"},"modified":"2023-10-31T08:29:29","modified_gmt":"2023-10-31T15:29:29","slug":"the-security-cultural-transformation-of-the-automotive-industry","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/","title":{"rendered":"The security cultural transformation of the automotive industry"},"content":{"rendered":"\n<p>For the last few years, the automotive industry has been going through a renaissance with cars becoming software-driven, adding new functionalities and &#8220;apps&#8221; to every new model year. Like the evolution from mainframe computers to sophisticated cloud-connected graphics processing unit-driven desktops, the automotive industry is evolving from traditional hardware-centric cars to software-driven computers on wheels. There are parallel tracks regarding the functionality of the vehicles of the future that our industry is focused on right now: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Those dealing with the &#8220;robot&#8221; under the hood moving the car of the future.<\/li>\n\n\n\n<li>All user-related functions, apps, and cabin-related experiences.<\/li>\n<\/ul>\n\n\n\n<p>The underpinning of the technological development for cars in both categories is safe and secure transportation. When I say safe, I am referring to ISO 26262. When I say secure, I am referring to the new (as of the last two to three years) cybersecurity regulations such as ISO\/SAE 21434,<sup>1<\/sup> ISO\/DIS 24089,<sup>2<\/sup> and the United Nations Economic Commission for Europe (UNECE) WP.29<sup>3<\/sup> focused on keeping these secure for their entire useful life. Yes, going forward, cars need the lifecycle of their cybersecurity managed for the 15 to 20 years they are on the road.<\/p>\n\n\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n\t<div class=\"card d-block mx-ng mx-md-0\">\n\t\t<div class=\"row no-gutters material-color-brand-light bg-fabric-white\">\n\n\t\t\t\n\t\t\t<div class=\"d-flex col-md\">\n\t\t\t\t<div class=\"card-body align-self-center p-4 p-md-5\">\n\t\t\t\t\t\n\t\t\t\t\t<h2>Microsoft Security<\/h2>\n\n\t\t\t\t\t<div class=\"mb-3\">\n\t\t\t\t\t\t<p>Help protect people and data against cyberthreats to give you peace of mind<\/p>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"link-group\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/\" class=\"btn btn-link text-decoration-none p-0\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<span>Explore Security <\/span>\n\t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span>\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"col-md-4\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-1024x683.webp\" class=\"card-img img-object-cover\" alt=\"Forward facing view of two men working on a Microsoft Surface Studio with a larger blurred screen\/display behind them.\" srcset=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-1024x683.webp 1024w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-300x200.webp 300w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-768x512.webp 768w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-800x533.webp 800w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200-400x267.webp 400w, https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/07\/SEC20_Security_023_1200.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Unique complexities of the automotive industry<\/h2>\n\n\n\n<p>Considering the complexities of these cars and the automotive industry, this is a very tall order. Here are some of the challenges:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Complex supply chain<\/strong>: There are thousands of suppliers globally contributing to the making of a car and the start of production.<\/li>\n\n\n\n<li><strong>Volume of code<\/strong>: Cars are now the most significant threat surface in the world, with a typical midsize car containing more than 150 million lines of code from hundreds of suppliers in thousands of files, mostly in binary format.<\/li>\n\n\n\n<li><strong>Product lifecycle<\/strong>: Cars have a long useful life of 15 to 20 years in active use versus two to three years for consumer products.<\/li>\n\n\n\n<li><strong>Regulations<\/strong>: Functional safety and new cybersecurity mandates for managing the life cycle of security.<\/li>\n<\/ul>\n\n\n\n<p>As cars become more connected, the risk of cyberattacks increases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Functional safety and cybersecurity<\/h2>\n\n\n<div class=\"wp-block-msxcm-kicker-container\">\n\t<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n\t\t<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\">\n\t\t\tWhat is cybersecurity?\t\t<\/p>\n\t\t<a\n\t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\"\n\t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-cybersecurity\"\n\t\t\ttarget=\"_blank\"\t\t>\n\t\t\t<span>Learn more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n<p>Functional safety is the discipline that deals with designing and manufacturing systems to reduce the risk of harm to people. Cybersecurity deals with protecting information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The automotive industry needs to combine functional safety and cybersecurity to ensure that the safety and security of the driver, passengers, and other road users are not compromised.<\/p>\n\n\n\n<p>Incorporating cybersecurity into the design and manufacturing process of cars is essential. While connected cars open a whole host of new opportunities to the industry and passengers of the vehicles, this connectivity and visibility is a double-edged sword as it also makes them susceptible to bad actors trying to hack them to obtain data or even functional control of the vehicle itself remotely. The implications of a more than 3,000-pound vehicle being directly controlled by an unintended user is of utmost concern. Again, safety is the focus.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Standards and regulations<\/h2>\n\n\n\n<p>The automotive industry has several standards and regulations that address functional safety and cybersecurity. Developed by the International Organization for Standardization (ISO), one such standard is ISO 26262, which outlines the safety requirements for road vehicles, which aims to reduce the probability of hazards in automotive applications where the machine operation can impact the life of the passenger.\u00a0\u00a0<\/p>\n\n\n\n<p>The ISO\/SAE 21434 vehicle cybersecurity engineering standard is focused on the entire automotive product lifecycle and integrates safety and security measures that ensure vehicles have been designed, manufactured, and deployed with the rigorous security requirements in mind. It also, defines the responsibilities for various groups involved during different stages of automotive product development. The final version of ISO\/SAE 21434 standard, also includes a Threat Analysis and Risk Assessment (TARA), focusing on possible threat scenarios within a vehicle operation, with relevant posture scoring factors. It also defines the \u201cshift left\u201d aspect of security aligned with automotive systems engineering V-model, to approach the products functionality and cybersecurity requirements simultaneously.\u00a0<\/p>\n\n\n\n<p>ISO\/DIS 24089 is another standard that provides guidelines for managing software updates in a consistent and systematic way. The United Nations Economic Commission for Europe (UNECE) as a part of WP.29 standard has put a new regulation R156 in place which regulates the software update management system. ISO 24089 provides the guidelines on how to systematically manage software updates compliant with the UNECE R156. The UNECE WP.29 has also developed regulation R155 focused on the cybersecurity lifecycle management of road vehicles.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Securing the car of the future<\/h2>\n\n\n\n<p>Securing the car of the future involves several technical details, such as securing the vehicle&#8217;s electronic architecture, managing the software lifecycle, and managing the cybersecurity lifecycle using software updates. The car&#8217;s electronic architecture is moving from domain controllers to zonal architecture with an eye on the ultimate cloud-connected central computer. Managing the lifecycle of software and cybersecurity using software updates ensures that the car remains secure and protected against any new threats that emerge. This requires dedicated Vehicle Security Operations Centers that manage this process and automate as much of the process as possible.<\/p>\n\n\n\n<p>The UNECE WP.29 regulation mandates four concrete areas of cybersecurity:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Manage vehicle cyber risks<\/li>\n\n\n\n<li>Secure vehicles by design<\/li>\n\n\n\n<li>Detect and respond to security incidents<\/li>\n\n\n\n<li>Provide safe and secure software updates<\/li>\n<\/ol>\n\n\n\n<p>Three lifecycle phases of development, production, and post-production are called out, with post-production to include monitoring, detecting, and responding to cyberattacks. Cars need to be built securely, and that security posture needs to be maintained as they go through the manufacturing process. Finally, once they go out the door on day zero in the lot, they need to stay secure for the life of that car. This means every aspect of the car&#8217;s design, development, manufacturing, and operations will be affected and need to change. As of January 2021, WP.29 applies to passenger cars, vans, trucks, buses, and other light vehicles are subject to the regulation as of January 2021.<\/p>\n\n\n\n<p><strong>The big-compelling-event<\/strong>: In the European Union (EU), WP.29 regulations R155 and R156 will be mandatory for all new vehicle types from July 2022 and will become compulsory for all new vehicles produced from July 2024. That means starting July 2024, all vehicle manufacturers need to manage the life cycle of the security of the cars they build and operate for the life of that vehicle on the road (15 to 20 years).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Compliance<\/h2>\n\n\n\n<p>WP.29 covers 54 countries, including the EU, the United Kingdom, Japan, and South Korea. WP.29 regulations in these countries are legally enforceable, and proof of compliance is required for a car manufacturer to obtain the needed type-approval and sell into the above markets. That means even the automotive original equipment manufacturers in countries not covered by WP.29 will be affected if they want to sell cars in the above countries. Like the existing homologation process for ISO 26262, type approval provides mutual compliance recognition across the EU without further tests. Approval can be obtained from technical services auditing companies such as <a href=\"https:\/\/www.tuvsud.com\/en-us\/about-us\" target=\"_blank\" rel=\"noreferrer noopener\">TUV SUD<\/a>. Development, manufacturing, and finally operations of the car will be affected and will need to change. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack surfaces<\/h2>\n\n\n\n<p>Cars have become the world&#8217;s largest and most complex threat surface, with millions of lines of code running on several computers and many attack points and tactics that bad actors can exploit. On a per-car basis, this is significantly more complex than most IT systems worldwide. Nowadays, most industry news is dominated by the word of IT hacks and exploitation of IT systems. To be clear, the IT industry has dealt with security issues for decades, whereas cars were not connected until recently, hence car security meant something completely different. So, a sector that has not been dealing for long with cybersecurity is now supposed to secure the most complex and sophisticated entities and threat surfaces in the world, where every car is a mission-critical system, where the operation of the machine impacts the life of the passengers.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide2.webp\" alt=\"timeline\" class=\"wp-image-112556 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide2.webp\"><\/figure>\n\n\n\n<p>In IT, over 80 percent of incidents are caused by company employees, primarily because of inadequate security hygiene (for example, lack of rigorous security culture).<sup>4<\/sup> To meet the security requirements of the three lifecycle phases of development, production, and post-production of cars, a holistic approach to security cultural transformation at every car manufacturing company is needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cultural transformation<\/h2>\n\n\n\n<p>Cultural transformation starts with educating everyone about security, regardless of role or job title. This means everyone from software and hardware designers and developers to the C-suite.<\/p>\n\n\n<div class=\"wp-block-msxcm-kicker-container\">\n\t<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n\t\t<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\">\n\t\t\tMicrosoft security documentation \t\t<\/p>\n\t\t<a\n\t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\"\n\t\t\thref=\"https:\/\/learn.microsoft.com\/en-us\/security\/\"\n\t\t\ttarget=\"_blank\"\t\t>\n\t\t\t<span>Read more<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n<p>Sharing a common language to discuss security is the best place to start. That means educating everyone on the risks involved, expectations from each other and the whole team, and using security best practices regardless of the task, and in many cases, regardless of the cost associated with a &#8220;security-first&#8221; culture. When the team is educated on security, they become empowered to make better decisions, resulting in positive security outcomes.<\/p>\n\n\n\n<p>Building a security-first culture aligns knowledge with behaviors so that, as an example, developers think about securing before writing a line of code, and C-suite decision-makers think about security risks impacts on the bottom line and consider proper investment in security as business-critical.<\/p>\n\n\n\n<p>Unfortunately, the security industry is currently challenged with a need for more qualified resources, so attracting and retaining the best talent from diverse backgrounds and developing security leaders is more critical than ever.&nbsp;<\/p>\n\n\n\n<p>Shifting left, which means embedding security as early as possible in the product development life cycle and automating as much as possible leveraging AI and machine learning, also helps developers focus on solving high-value problems.<\/p>\n\n\n<div class=\"wp-block-msxcm-kicker-container\">\n\t<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-left\" data-bi-an=\"Kicker Left\">\n\t\t<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\">\n\t\t\tEmpower your team with cybersecurity awareness\t\t<\/p>\n\t\t<a\n\t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\"\n\t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/cybersecurity-awareness\"\n\t\t\ttarget=\"_blank\"\t\t>\n\t\t\t<span>Explore resources<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n<p>Automotive manufacturers can improve their security posture by focusing on people and the culture of &#8220;security-first&#8221; within their teams, followed by using the best security tooling focusing on minimal gaps and overlaps to build a strong foundation for security operations.<\/p>\n\n\n\n<p>The only way to secure the cars of the future is to take a holistic approach to cultural transformation that institutionalizes a &#8220;security-first&#8221; mindset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Start your security transformation with Microsoft<\/h2>\n\n\n\n<p>At Microsoft, along with our partners, we have curated a broad portfolio of products and services for a comprehensive support of automotive and manufacturing industries during the three lifecycle phases of development, production, and post-production, and all the associated homologation processes. For the design and development phase along with our partners, we offer a comprehensive set of tools and services, focused on compliance as well as managing the lifecycle of cybersecurity for the automotive market. We can also help our customers with their security cultural transformation journey.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide3.webp\" alt=\"graphical user interface, text, application\" class=\"wp-image-112557 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide3.webp\"><\/figure>\n\n\n\n<p>For managing the every day lifecycle of the vehicle on the road, we have curated key partners who are leveraging the Microsoft Cloud and our security products, along with products and services, to provide comprehensive Vehicle Security Operations Center (VSOC) services, as well as converged SOCs covering IT and manufacturing operational technology security as well.\u00a0<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide4.webp\" alt=\"\" class=\"wp-image-112558 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/Slide4.webp\"><\/figure>\n\n\n\n<p>Customers who have switched to <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/\">Microsoft Security<\/a> not only have significantly reduced their cost, but they have also drastically improved their cybersecurity posture. The ultimate in doing more with less.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-black-background-color has-background wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/automotive\">Learn more about Microsoft in automotive and mobility<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><sup>1<\/sup><a href=\"https:\/\/www.iso.org\/standard\/70918.html\" target=\"_blank\" rel=\"noreferrer noopener\">ISO\/SAE 21434:2021, Road Vehicles, Cybersecurity engineering, ISO<\/a>.<\/p>\n\n\n\n<p><sup>2<\/sup><a href=\"https:\/\/www.iso.org\/standard\/77796.html\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 24089:2023, Road Vehicles, Software update engineering, ISO<\/a>.<\/p>\n\n\n\n<p><sup>3<\/sup><a href=\"https:\/\/unece.org\/wp29-introduction\" target=\"_blank\" rel=\"noreferrer noopener\">WP.29 &#8211; Introduction, UNECE<\/a>. <\/p>\n\n\n\n<p><sup>4<\/sup><a href=\"https:\/\/blog.knowbe4.com\/88-percent-of-data-breaches-are-caused-by-human-error#:~:text=Researchers%20from%20Stanford%20University%20and,caused%20by%20an%20employee%20mistake\" target=\"_blank\" rel=\"noreferrer noopener\">Stanford Research: 88% Of Data Breaches Are Caused By Human Error, KnowBe4<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the last few years, the automotive industry has been going through a renaissance with cars becoming software-driven, adding new functionalities and &#8220;apps&#8221; to every new model year. Like the evolution from mainframe computers to sophisticated cloud-connected graphics processing unit-driven desktops, the automotive industry is evolving from traditional hardware-centric cars to software-driven computers on wheels.<\/p>\n","protected":false},"author":765,"featured_media":112397,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[4263,1496],"post_tag":[4290],"content-type":[1483],"coauthors":[4401],"class_list":["post-112394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-automotive","category-manufacturing-and-mobility","tag-automation","content-type-thought-leadership","review-flag-1593580429-205","review-flag-1-1593580433-637","review-flag-2-1593580438-395","review-flag-3-1593580443-547","review-flag-4-1593580449-167","review-flag-new-1593580249-279"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The security transformation of the automotive industry - Microsoft Industry Blogs<\/title>\n<meta name=\"description\" content=\"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The security transformation of the automotive industry - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730-3.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kaivan Karimi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730-3.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaivan Karimi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/kaivan-karimi\/\",\"@type\":\"Person\",\"@name\":\"Kaivan Karimi\"}],\"headline\":\"The security cultural transformation of the automotive industry\",\"datePublished\":\"2023-10-31T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\"},\"wordCount\":1843,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg\",\"keywords\":[\"Automation\"],\"articleSection\":[\"Automotive\",\"Manufacturing and mobility\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\",\"name\":\"The security transformation of the automotive industry - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg\",\"datePublished\":\"2023-10-31T16:00:00+00:00\",\"description\":\"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg\",\"width\":800,\"height\":347,\"caption\":\"iot smart automotive Driverless car with artificial intelligence combine with deep learning technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The security cultural transformation of the automotive industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The security transformation of the automotive industry - Microsoft Industry Blogs","description":"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/","og_locale":"en_US","og_type":"article","og_title":"The security transformation of the automotive industry - Microsoft Industry Blogs","og_description":"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.","og_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2023-10-31T16:00:00+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730-3.jpeg","type":"image\/jpeg"}],"author":"Kaivan Karimi","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730-3.jpeg","twitter_misc":{"Written by":"Kaivan Karimi","Est. reading time":"7 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/kaivan-karimi\/","@type":"Person","@name":"Kaivan Karimi"}],"headline":"The security cultural transformation of the automotive industry","datePublished":"2023-10-31T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/"},"wordCount":1843,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg","keywords":["Automation"],"articleSection":["Automotive","Manufacturing and mobility"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/","name":"The security transformation of the automotive industry - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg","datePublished":"2023-10-31T16:00:00+00:00","description":"Discover why incorporating cybersecurity into the design and manufacturing process of cars is essential. Learn more.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2023\/10\/AdobeStock_256553730.jpeg","width":800,"height":347,"caption":"iot smart automotive Driverless car with artificial intelligence combine with deep learning technology."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/manufacturing-and-mobility\/automotive\/2023\/10\/31\/the-security-cultural-transformation-of-the-automotive-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"The security cultural transformation of the automotive industry"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/112394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/765"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=112394"}],"version-history":[{"count":51,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/112394\/revisions"}],"predecessor-version":[{"id":112565,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/112394\/revisions\/112565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/112397"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=112394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=112394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=112394"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=112394"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=112394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}