Cybersecurity Best Practices for the Safety of Modern Vehicles, 55459-55465 [2022-19507]

Download as PDF Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration [Docket No. NHTSA–2020–0087] Cybersecurity Best Practices for the Safety of Modern Vehicles National Highway Traffic Safety Administration (NHTSA), Department of Transportation (DOT). ACTION: Notice of federal guidelines. AGENCY: On January 12, 2021, NHTSA released its draft Cybersecurity Best Practices for the Safety of Modern Vehicles guidance (‘‘Draft Best Practices’’ or ‘‘guidance’’) in an effort to support industry-led efforts to improve the industry’s cybersecurity posture as well as provide NHTSA’s views on how the automotive industry can develop and apply sound, risk-based cybersecurity management processes during the vehicle’s entire lifecycle. These guidelines are intended to be applicable to all individuals and organizations involved in the design, development, manufacture and assembly of a motor vehicle and its electronic systems and software. These entities include, but are not limited to, small and large-volume motor vehicle and motor vehicle equipment designers, suppliers, manufacturers, and modifiers. This document summarizes comments received in response to the draft guidance, responds to those comments, and describes changes made to the draft guidance in response to those comments. This document also announces the issuance of the final version of the Cybersecurity Best Practices for the Safety of Modern Vehicles guidance. While this is the final version of this iteration of the Best Practices, NHTSA routinely assesses cybersecurity risks as well as emerging best practices and will consider future updates as motor vehicles and their cybersecurity evolve. DATES: The changes made in this document are effective upon publication. SUMMARY: For technical issues, please contact Mr. John I. Martin of NHTSA’s Office of Vehicle Safety Research at 937–366–3246 or john.martin@dot.gov. For legal issues, contact Ms. Sara R. Bennett of NHTSA’s Office of Chief Counsel at 202–366– 2992 or sara.bennett@dot.gov. SUPPLEMENTARY INFORMATION: This final version of the Cybersecurity Best Practices for the Safety of Modern Vehicles does not have the force and effect of law and is not a regulation. jspears on DSK121TN23PROD with NOTICES FOR FURTHER INFORMATION CONTACT: VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 This guidance document will not be published in the Code of Federal Regulations but will be posted on NHTSA’s website, www.nhtsa.gov. I. Introduction In January 2021, NHTSA released its draft Cybersecurity Best Practices for the Safety of Modern Vehicles guidance document (‘‘Draft Best Practices’’ or ‘‘guidance’’) with the goal of supporting industry-led efforts to improve the industry’s cybersecurity posture and provide the Agency’s views on how the automotive industry can develop and apply sound, risk-based cybersecurity management processes during the vehicle’s entire lifecycle. As background, the Draft Best Practices document is an update to NHTSA’s first cybersecurity best practices document, Cybersecurity Best Practices for Modern Vehicles (‘‘2016 Best Practices’’). NHTSA requested comment on the Draft Best Practices in an accompanying Federal Register notice.1 The Draft Best Practices builds upon agency research and industry progress since 2016, including emerging voluntary industry standards, such as the International Organization for Standardization (ISO)/SAE International (SAE) Draft International Standard (DIS) 21434, ‘‘Road Vehicles—Cybersecurity Engineering.’’ 2 In addition, the Draft Best Practices references a series of industry best practice documents developed by the Automotive Information Sharing and Analysis Center (Auto-ISAC) through its members. The Draft Best Practices also reflects findings from NHTSA’s continued research in motor vehicle cybersecurity, including over-the-air updates, formal verification, static code analysis, new learnings obtained through researchers and stakeholder engagement as well as continued building of our capability in cybersecurity testing and diagnostics. The updates included in the Draft Best Practices incorporate insights gained from public comments received in response to the 2016 guidance and from information obtained during the annual SAE/NHTSA Vehicle Cybersecurity Workshops. The Draft Best Practices touches on a wide array of issues associated with safety-related cybersecurity practices, and provides recommendations to industry on the following topics: • General Cybersecurity Best Practices • Education 1 86 FR 2481 (Jan. 12, 2021). 21434:2021 Road Vehicles— Cybersecurity Engineering, available at: https:// www.iso.org/standard/70918.html. 2 ISO/SAE PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 55459 • Aftermarket/User-Owned Devices • Serviceability • Technical Vehicle Cybersecurity Best Practices The first topic in the list, ‘‘General Cybersecurity Best Practices,’’ is the largest topic and discusses cybersecurity practices with respect to industry stakeholders. There are a variety of practices in this category. For example, one practice suggests that manufacturers should evaluate all commercial off-theshelf and open-source software components used in vehicle Electronic Control Units (ECUs) against known vulnerabilities.3 The second topic, ‘‘Education,’’ discusses the role and responsibilities of industry and academia in supporting an educated cybersecurity workforce. The third topic, ‘‘Aftermarket/UserOwned Devices,’’ discusses the issues associated with connecting aftermarket devices to vehicle systems. For instance, the guidance suggests that any connection to a third-party device should be authenticated and provided with appropriate, limited access.4 The fourth topic, ‘‘Serviceability,’’ touches on industry’s obligation to simultaneously provide for both cybersecurity and third-party serviceability. The last topic, ‘‘Technical Vehicle Cybersecurity Best Practices,’’ discusses cybersecurity practices with respect to the vehicle. As an example, one of the 25 technical vehicle cybersecurity best practices suggests that network segmentation and isolation techniques should be used to limit connections between wireless-connected ECUs and low-level vehicle control systems, particularly those controlling safety critical functions, such as braking, steering, propulsion, and power management. This notice summarizes the comments received, NHTSA’s responses to those comments, and finalizes the Draft Best Practices document. The final Best Practices document continues to use the numbering scheme introduced in the Draft Best Practices document. For example, it uses [G.1] through [G.45] for general cybersecurity best practices and [T.1] through [T.25] for technical vehicle cybersecurity best practices. Additions to the Draft Best Practices mean that there are some numbering differences between the draft and final versions of the Best Practices. This Federal Register notice exclusively refers to the final Best Practices 3 G.12 in NHTSA’s Cybersecurity Best Practices for the Safety of Modern Vehicles. 4 G.42 in NHTSA’s Cybersecurity Best Practices for the Safety of Modern Vehicles. E:\FR\FM\09SEN1.SGM 09SEN1 55460 Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices jspears on DSK121TN23PROD with NOTICES numbering scheme, rather than the draft version. Cases where there are differences between the draft and final numbering scheme are noted with a footnote. Finally, the agency stresses that the final Best Practices remain voluntary and non-binding, as has been the case with this guidance beginning with its initial 2016 edition. II. Summary of Differences Between the Draft and Final Cybersecurity Best Practices for the Safety of Modern Vehicles The purpose of this section is to provide a summary of the differences between the draft and final Cybersecurity Best Practices for the Safety of Modern Vehicles. The next section of this document, ‘‘Summary of Public Comments Received in Response to Draft Cybersecurity Best Practices,’’ will discuss the comments received and the reasons why these changes were made. The following provides a high-level summary of changes made in the final version. First, in response to a comment, NHTSA clarified, with a minor edit, that the scope of the Best Practices includes all individuals and organizations involved in the maintenance of a motor vehicle. Second, the Agency updated all references to the ISO/SAE 21434 standard to reflect the finalized version of the subject industry standard, which occurred after the Draft Best Practices were published for comments. Third, in the General Cybersecurity Best Practices section, several headings were retitled in response to comments, and the new changes clarified terms, and altered the order of mention of the Auto-ISAC and standards development organizations (SDO) in some places to avoid unintended potential referencing to Auto-ISAC as an SDO. Additionally, NHTSA added a new general cybersecurity best practice to address future risks and bifurcated an existing one into two separate practices based on well-supported comments. Fourth, in the Technical Cybersecurity Best Practices section, NHTSA added mention of current cryptographic techniques and their implementation and made wording changes to clarify protections from unauthorized disclosure and accessibility to other vehicles. The Agency also added a new technical practice to limit firmware version rollback attacks and rewrote a technical practice [T.11].5 The new practice now reads ‘‘[T.11] 6 Employ best practices for communication of critical information over shared and 5 In 6 In the draft version, this was T.10. the draft version, this was T.10. VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 possibly insecure channels. Limit the possibility of replay, integrity compromise, and spoofing. Physical and logical access should also be highly restricted.’’ Fifth, NHTSA added definitions of ‘‘global symmetric keys’’ and ‘‘recovery’’ to the appendix’s Terms and Descriptions section. Finally, NHTSA updated and added minor wording changes and references throughout, including addressing clerical errors. III. Summary of Public Comments Received in Response to Draft Cybersecurity Best Practices NHTSA received comments from a total of 38 entities in response to the Draft Best Practices, published in January 2021. These comments came from government entities,7 industry associations,8 standards development organizations,9 automotive and equipment manufacturers,10 consumer and safety advocacy organizations,11 university and research organizations,12 and individuals.13 The comments represent an evolution of vehicle cybersecurity opinion among stakeholders and the general public. Comments to the 2016 guidance tended to be general and higher-level (i.e., bigger-picture). In contrast, comments received in response to the Draft Best Practices focused on discrete issues important to commenters. This evolution is also likely due to the introduction of vehicle-specific cybersecurity standards and best practices in the automotive sector. Overall, most commenters seemed supportive of NHTSA’s efforts to encourage continual progress in the automotive sector through the issuance of best practices, though there was some divergence as to the details of what 7 California Highway Patrol. for Automotive Innovation, American Alliance for Vehicle Owner’s Rights, American Trucking Association, Auto Care Association, Automotive Aftermarket Suppliers Association, Automotive Recyclers Association, Specialty Equipment Market Association, National Motor Freight Traffic Association, National Automobile Dealers Association, Motor Equipment Manufacturers Association and Consumer Technology Association. 9 SAE and Institute of Electrical and Electronics Engineers. 10 General Motors LLC, Toyota Motor Corporation, Continental Automotive Systems, Denso Corporation, ZF North America, Robert Bosch GmbH, Amazon Web Services, Blackberry Corporation, AT&T, GeoTab, Nuro, Arilou Automotive Cybersecurity and LKQ Corporation. 11 Center for Auto Safety, Privacy4Cars, SecuRepairs and Digital Right to Repair Coalition. 12 Carnegie Mellon Software Engineering Institute, Sandia National Laboratories, Underwriters Laboratories LLC. 13 Norman Field, Rik Farrow,Ryan Moss and Howard Hoffman. 8 Alliance PO 00000 Frm 00073 Fmt 4703 Sfmt 4703 those best practices should contain, the level of detail necessary to fulfill the agency’s goals, and other specific topics commenters stated NHTSA should address. The aggregated comments presented several high-level themes, and thus, this document presents comments organized by the following categories of request: • More specifics in the guidance; • Industry collaboration; • Minor editorial amendments; • Additional references to ISO/SAE 21434; • Additional references to other standards; • Clarification of entity designations; • Changes in scope; and • Right to repair. In the sections that follow, NHTSA summarizes each category of major comments received in response to the Draft Best Practices and the agency’s response. a. Commenter Requested More Specifics in the Guidance Several commenters requested that NHTSA make certain language in the guidance more specific to address issues important to the commenter. As background, NHTSA intends to maintain wide applicability in the Draft Best Practices, so that it can encompass the many industry stakeholders, variety of business models, and vehicle and equipment architectures available on the market. This guidance is also intended to be flexible enough to encompass future business models and vehicle and equipment designs, to help ensure that this guidance remains helpful and relevant beyond a single point in time. Even so, NHTSA found it possible to integrate several suggestions from commenters in response to requests for more specificity. As such, NHTSA added two definitions to the document’s glossary, and made the changes described below. The two definitions that NHTSA added in response to comments are for the terms, ‘‘recovery,’’ and ‘‘global symmetric keys.’’ The Institute of Electrical and Electronics Engineers (IEEE), a standards setting professional organization, suggested defining the term ‘‘recovery’’ in the context of referencing the National Institute of Standards and Technology (NIST) Cybersecurity Framework’s five principal functions ‘‘Identify, Protect, Detect, Respond and Recover.’’ IEEE suggested that the document did not describe what was meant by ‘‘recovery.’’ Toyota Motor Corporation (Toyota) and Geotab suggested defining the specific term ‘‘global symmetric keys’’ because, in their opinion, the meaning may not E:\FR\FM\09SEN1.SGM 09SEN1 jspears on DSK121TN23PROD with NOTICES Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices be obvious. NHTSA considered the merits of adding these new definitions for improving clarity and agreed that their addition would be beneficial for public understanding, and thus, added them to the final Best Practice’s appendix in ‘‘Terms and Definitions’’. In section 8.2 of the Draft Best Practices, ‘‘Cryptographic Credentials,’’ Sandia National Laboratories (Sandia) and DENSO Corporation (Denso) suggested additional specific discussion of cryptographic techniques and standards. In response, NHTSA has modified section 8.2 with additional text and a slight title change that reflects section 8.2’s new focus on techniques. Sandia also expressed the comment that, ‘‘The claim that Public key cryptography techniques are more secure than symmetric key systems should be caveated with ‘properly implemented techniques’ are ‘generally’ more secure. . . .’’.14 While Sandia made this comment with respect to section 8.3 of the Draft Best Practices, ‘‘Vehicle Diagnostic Functionality,’’ NHTSA responded to Sandia’s comment by incorporating the text ‘‘While the selection of appropriate cryptographic techniques is an important design criterion, it should be noted that implementation issues often determine any system’s security’’ into section 8.2. NHTSA considered Sandia’s assertion to be correct, and NHTSA agrees that implementation issues are very important. NHTSA also incorporated a comment from SAE that asked for technical guidance that would limit firmware version rollback attacks where an attacker may use software update mechanisms to place older, more vulnerable software on a targeted device. NHTSA agrees that the practice of manufacturers allowing the installation of older, potentially vulnerable versions of firmware in vehicles and vehicle equipment should be avoided whenever possible. In response, NHTSA added practice [T.23]. Because of NHTSA’s desire for the document to remain broadly applicable, many comments asking for additional specifics were not incorporated into the guidance. For instance, NHTSA did not accept comments suggesting that the agency explicitly define terms such as ‘‘lifecycle,’’ ‘‘end-of-life,’’ and ‘‘state of the art,’’ among others. NHTSA acknowledges that many of these terms may have different meanings to different companies and stakeholders, but NHTSA did not believe it would be 14 See Comment ID ‘‘NHTSA–2020–0087–0009’’ for Document ‘‘NHTSA–2020–0087–0002’’ on the regulations.gov website. VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 appropriate to define these terms in such a way that might inadvertently suggest limitations to or conflicts with company responsibilities, such as manufacturers’ responsibility to notify NHTSA of any safety defect in its motor vehicles or motor vehicle equipment.15 Similarly, while NHTSA encourages companies to pay close attention to cybersecurity throughout its corporate structures and supply chain, NHTSA does not view this guidance as a mechanism to suggest how corporate responsibilities among companies should be distributed. This guidance does not attempt to provide any particular view of the automotive supply chain, and NHTSA recognizes that many of these considerations may be handled via contract. Although ISO/ SAE 21434 does address supply chain responsibilities to some extent, NHTSA’s Best Practices purposefully does not provide such details. In other cases of requested specificity, NHTSA determined that some commenters’ requests inadvertently resulted in limiting the applicability of the document. As stated before, one of NHTSA’s underlying goals of this document was to ensure it remains accessible to a wide audience and all of NHTSA’s regulated entities. NHTSA also tries to maintain the document’s generality by limiting language specific to a particular corporate process, perhaps even specific to a particular corporation. Comments that make suggestions encompassing specific corporate processes have not been incorporated into the updated document. In addition, a comment asked NHTSA to address forensic data retrieval. NHTSA recognizes the importance of forensic data retrieval but has determined that the subject is out-ofscope for this document. b. Commenter Encourages Industry Collaboration Many commenters expressed the sentiment that industry collaborative efforts are a good idea, including the Alliance for Automotive Innovation (Alliance) and Amazon Web Services (Amazon), both of which provided specific comments encouraging collaboration. The Alliance suggested that NHTSA create a new section on emerging risks where there may not be established best practices developed to manage those risks. The Alliance suggested that this new section should include high-level recommendations to encourage industry-wide collaboration to establish best practices to treat those 15 49 PO 00000 U.S.C. 30118(c). Frm 00074 Fmt 4703 Sfmt 4703 55461 risks. Amazon suggested NHTSA should encourage industry collaboration to identify attempted and successful exploitations and attacks not previously considered in the design and assessment phases. NHTSA agrees with the importance of industry collaboration, especially within the automotive cybersecurity realm. Therefore, NHTSA has encouraged membership and active participation in the Auto-ISAC and collaboration through its annual cybersecurity forum that the agency holds with SAE. In response to these commenters, NHTSA added a new general practice [G.24] that states: ‘‘As future risks emerge; industry should collaborate to expediently develop mitigation measures and best practices to address new risks.’’ NHTSA believes that this addition and the rest of the guidance covers both commenters’ suggestions. c. Commenter Requested Minor Editorial Amendments Many commenters provided a wealth of suggested additional word choices, terminology changes, and phrasing modifications. NHTSA appreciates these suggestions and adopted these changes wherever possible and is grateful for the improvements these suggestions provide. Multiple comments 16 pointed out a typographical error in section 4.5 where ‘‘[G.27[a]–[c]]’’ 17 should have been ‘‘[G.28[a]–[c].’’ 18 NHTSA adopted the suggested change. Other editorial amendments include modifying the word ‘‘standards’’ in [G.9] to ‘‘expectations.’’ In the draft Best Practices, [G.9] stated ‘‘Clear cybersecurity standards should be specified and communicated to the suppliers that support the intended protections.’’ NHTSA adopted the change to the word ‘‘expectations’’ because commenters suggested they needed additional clarification as to what word ‘‘standards’’ means in that particular practice. NHTSA believes ‘‘expectations’’ would maintain the agency’s intended breadth while also clarifying any ambiguity for stakeholders. Another commenter suggested that NHTSA remove ‘‘that’’ from ‘‘NHTSA recommends that:’’ in section 4.3 of the Draft Best Practices. NHTSA adopted this edit accordingly. Some commenters suggested changes to section titles to add additional clarity 16 ZF North America, Arilou Automotive Cybersecurity, National Motor Freight Traffic Administration. 17 In the draft version, this was G.26. 18 In the draft version, this was G.27. E:\FR\FM\09SEN1.SGM 09SEN1 jspears on DSK121TN23PROD with NOTICES 55462 Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices for stakeholders. In two instances, NHTSA adopted those suggestions to change section titles. Section 4.2.7 was originally titled ‘‘Penetration Testing and Documentation’’ in the draft guidance and is now titled ‘‘Cybersecurity Testing and Vulnerability Identification’’ in the final guidance. NHTSA felt that the new title was appropriately general. Similarly, section 4.2.4 was originally titled ‘‘Unnecessary Risk Removal’’ and is now ‘‘Removal or Mitigation of SafetyCritical Risks.’’ The new title better describes the section. SAE suggested changes to [T.4] 19 that changed the existing text to ‘‘Cryptographic credentials that provide an authorized, elevated level of access to vehicle computing platforms should be protected from unauthorized disclosure or modification’’. NHTSA welcomes this change because it additionally emphasizes the consequences of modifying platform credentials. Several commenters recommended minor amendments to [T.5] 20 ‘‘Any credential obtained from a single vehicle’s computing platform should not provide access to multiple vehicles.’’ The technical guidance now reads ‘‘other vehicles’’ rather than ‘‘multiple vehicles’’ as was included in the draft guidance. NHTSA feels that the use of the word ‘‘other’’ more clearly focuses the issues involved in using universally applicable credentials. National Motor Freight Traffic Association (NMFTA) recommended minor amendments to general practice [G.6] ‘‘Manufacturers should consider the risks associated with sensor vulnerabilities and potential sensor signal manipulation efforts such as GPS spoofing, road sign modification, Lidar/ Radar jamming and spoofing, camera blinding, or excitation of machine learning false positives.’’ The general guidance now reads ‘‘. . . camera blinding, and excitation . . .’’ rather than ‘‘. . . camera blinding, or excitation. . . .’’ NHTSA agrees with NMFTA’s comment that the use of ‘‘or’’ rather than ‘‘and’’ incorrectly suggests that manufacturers could focus on any one of the presented spoofing issues rather than considering all the spoofing issues. SAE suggested that [G.10] needed to focus on hardware and software rather than just software. In the Draft Best Practices, general practice [G.10] stated ‘‘Manufacturers should maintain a database of operational software components used in each automotive 19 In 20 In the draft version, this was T.3. the draft version, this was T.4. VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 ECU, each assembled vehicle, and a history log of version updates applied over the vehicle’s lifetime.’’ NHTSA agrees that software inventory management alone is not sufficient and made changes to [G.10] to include a discussion of inventory management of both hardware and software. Robert Bosch GmbH (Bosch) additionally suggested that the subject of [G.10] needed to be ‘‘Suppliers and vehicle manufacturers’’ rather than ‘‘Manufacturers.’’ NHTSA agrees with the change because it maintains the desired generality while directing the reader to specific entities. In the Draft Best Practices, general practice [G.30] 21 stated ‘‘Organizations should document the details of each identified and reported vulnerability, exploit, or incident applicable to their products. These documents should include information from onset to disposition with sufficient granularity to support response assessment.’’ Underwriters Laboratories (UL) suggested rephrasing the second sentence as: ‘‘The nature of the vulnerability and the rationale for how the vulnerability is managed should also be documented.’’ NHTSA agrees that UL’s suggested wording is an improvement. NHTSA also felt that [G.30] 22 could be better expressed as two separate general practices and made a new general practice to reflect UL’s wording. SAE suggested changes to [G.41] 23 in the Draft Best Practices, which stated ‘‘The automotive industry should consider the incremental risks that could be presented by these devices when connected with vehicle systems and provide reasonable protections.’’ The commenter suggested removing the word ‘‘incremental,’’ changing ‘‘automotive industry’’ to ‘‘automotive manufacturers,’’ and changing ‘‘these devices’’ to ‘‘user owned or aftermarket devices.’’ NHTSA declines to change ‘‘automotive industry’’ to ‘‘automotive manufacturers’’ because the goal of this guidance document is to retain broad utility for the entire automotive industry, not just manufacturers. NHTSA agreed to remove the word ‘‘incremental’’ from the general practice and to replace the term ‘‘these devices’’ with a more accurate phrase, ‘‘user owned or aftermarket devices.’’ In the Draft Best Practices, [T.11] 24 stated ‘‘Critical safety messages, particularly those passed across nonsegmented communication buses, 21 In the draft version, this was G.29. 22 In the draft version, this was G.29. 23 In the draft version, this was G.39. 24 In the draft version, this was T.10. PO 00000 Frm 00075 Fmt 4703 Sfmt 4703 should employ a message authentication method to limit the possibility of message spoofing.’’ SAE felt that [T.11] 25 needed to be reworded as: ‘‘Employ best practices for communication of critical information over shared and possibly insecure channels. Limit the possibility of replay, integrity compromise, and spoofing. Physical and logical access should also be highly restricted.’’ NHTSA adopted SAE’s suggested language for technical practice because the new wording expresses more general guidance than the draft version while encompassing the draft version’s meaning. There were many other suggestions for minor wording or phrasing changes that NHTSA considered. NHTSA adopted those that would not change the underlying intent of that particular section of the guidance document, but many suggestions from commenters would have worked to either limit or narrow the scope of the guidance. As such, those suggestions were not adopted since they would be contrary to the intent and goals of this document. d. Commenter Requested Additional References to ISO/SAE 21434 ISO/SAE 21434 is a newly developed standard titled ‘‘Road Vehicles— Cybersecurity Engineering.’’ 26 This standard serves as an overarching industry consensus standard for vehicle cybersecurity, and it is extensively referenced in NHTSA’s ‘‘Cybersecurity Best Practices for the Safety of Modern Vehicles.’’ Many commenters pointed out that NHTSA referenced the earlier Draft International Standard (DIS) version of ISO/SAE 21434, and suggested that NHTSA needed to update the references in the final Best Practices to the final ISO/SAE 21434 version, which was due to be released in Fall 2021. NHTSA followed this advice. In the final Best Practices, NHTSA has changed the latest the guidance to reflect the content of the latest ‘‘FDIS’’ or ‘‘Final Draft International Standard’’ version of ISO/SAE 21434. While NHTSA extensively referenced ISO/SAE 21434, the commenters pointed out areas where NHTSA could have included a reference to a relevant section of ISO/SAE 21434 and did not. As an example, commenters pointed out that [G.12] and [G.37] 27 could refer to the relevant clauses of ISO/SAE 21434. NHTSA adopted these suggestions and added a reference to ISO/SAE 21434 25 In the draft version, this was T.10. 21434:2021 Road vehicles— Cybersecurity engineering, available at: https:// www.iso.org/standard/70918.html and https:// www.saemobilius.sae.org. 27 In the draft version, this was G.35. 26 ISO/SAE E:\FR\FM\09SEN1.SGM 09SEN1 Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices clause 6 in [G.12]. General practice [G.37] 28 now references requirements in clauses 5 and 6 of ISO/SAE 21434. Another commenter corrected NHTSA’s reference to ISO/SAE 21434 in a footnote to general practice [G.16]. NHTSA accepted that correction. NHTSA also included the website https://www.saemobilius.sae.org as a source for ISO/SAE 21434 in addition to the previously referenced https:// www.iso.org. jspears on DSK121TN23PROD with NOTICES e. Commenter Requested Additional References to Other Standards Another category of comments requested that NHTSA provide new references to additional source material that were favored by the commenter. In many cases, NHTSA was able to incorporate these suggestions. NHTSA added only those references and referenced materials that the agency found were: (1) Sufficiently high level; (2) Specific to automotive industry or could be obviously applied to the automotive industry; (3) Not under development; and/or (4) Not duplicative of information or references already included in the Draft Best Practices. For example, one commenter stated that NHTSA should add references to the NIST cryptography standards to supplement technical practice [T.4],29 dealing with cryptographic credentials. NHTSA decided that this modification met the criteria described above, and the agency adopted this suggestion by adding a technical practice [T.3] and a reference to NIST’s Federal Information Processing Standards (FIPS) 140 Series. The FIPS 140 series is a set of documents updated by NIST that describes minimum standards for cryptography. Another commenter stated that NHTSA should reference ISO 24089 ‘‘Road vehicles—Software update engineering’’ in the Best Practices. NHTSA did not incorporate this comment because ISO 24089 is under development at this time. NHTSA may revisit this decision in future iterations of its cybersecurity best practices after ISO 24089 is finalized. NMFTA requested that NHTSA reference the Cybersecurity and Infrastructure Security Agency’s (CISA’s) binding operational directive 20–01 in general practice [G.27]’s 30 discussion of vulnerability reporting. NHTSA agreed with this change and felt that it provided support for the guidance. 28 In the draft version, this was G.35. the draft version, this was T.3. 30 In the draft version, this was G.26. 29 In VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 In response to a comment from SAE, NHTSA also added a reference to a NIST white paper titled ‘‘Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF)’’ for general practice [G.22], dealing with best practices for secure software development. Responding to a comment from NMFTA, NHTSA added a footnote reference to the SAE CyberAuto Challenge and the Cyber Truck Challenge as examples for general practice [G.40],31 dealing with educational efforts targeted at workforce development in the field of automotive cybersecurity. NHTSA also used this additional footnote to call out NHTSA’s efforts to fund and develop cybersecurity curricula. Other commenters requested that NHTSA add in references to the World Forum for Harmonization of Vehicle Regulation’s (WP.29) United Nations (UN) Regulation 155—‘‘Cyber security and cyber security management system.’’ In most cases, the public comments recommended high-level alignment, without further specifying the sources of potential misalignment that may have been a concern. UN ECE 155 is a type-approval regulation 32 that establishes not only recommended practices but also sufficiency standards for approval. Standards for type approval are well beyond the scope and intent of NHTSA’s Best Practices document. Therefore, NHTSA did not explicitly reference the UN ECE 155. NHTSA could revisit this topic in future iterations based on more specific public feedback. f. Commenter Requested Clarification of Entity Designations Several comments pointed out that the NHTSA’s Cybersecurity Best Practices seemed to falsely suggest that the Auto-ISAC is a standard setting organization (SSO). NHTSA has modified general practices [G.18] and [G.23] in an effort to correct this impression. Even so, these modifications should not be 31 In the draft version, this was G.38. ECE 155 is a regulation established under the United Nations Economic Commission for Europe (UNECE) 1958 Agreement concerning the Adoption of Uniform Technical Prescriptions for Wheeled Vehicles, Equipment and Parts which can be Fitted and/or be Used on Wheeled Vehicles and the Conditions for Reciprocal Recognition of Approvals Granted on the Basis of these Prescriptions (Available at https://unece.org/trans/ main/wp29/wp29regs), and the United States is not party to this agreement. Further, UN Regulation 155 is a regulation for type approving authorities, and the United States is not a country that engages in type approval of motor vehicles or motor vehicle equipment. 32 UN PO 00000 Frm 00076 Fmt 4703 Sfmt 4703 55463 interpretated as anything more than textual clarifications. The modifications do not represent any change in NHTSA’s position that guidance to industry, whether from a SSO or not, can be valuable to encourage progress in cybersecurity practices of the automotive industry. g. Commenters Requested Changes in Scope Many commenters requested a variety of changes in scope for the Draft Best Practices. Commenters diverged in their requests for changes to the scope. NHTSA did not incorporate most of the requested scope changes because NHTSA carefully considered the scope of the Draft Best Practices document at the development and drafting stages, and NHTSA believes that the existing scope of the document is most compatible with its mission and goals for this document. For example, narrowing the scope might imply inaccurately that NHTSA does not intend this guidance to be useful to all its regulated entities, and broadening the scope might exceed the agency’s intended audience. While most comments concerning the document’s scope were not incorporated, NHTSA responded to the National Automobile Dealers Association’s comments concerning the critical role of automotive dealers by adding the word ‘‘maintenance’’ to the following text of the Scope, which was an explicit clarification that scope includes that function: ‘‘Importantly, all individuals and organizations involved in the design, manufacturing, assembly and maintenance of a motor vehicle have a critical role to play with respect to vehicle cybersecurity.’’ Many commenters felt that NHTSA needed to address heavy trucks more explicitly and directly, but NHTSA believes this would be unnecessary since the scope of the Draft Best Practices already includes heavy trucks. Other commenters felt that NHTSA needed to more explicitly address vehicles equipped with Automated Driving Systems (ADS), asserting that these vehicles would have cybersecurity needs much different from modern vehicles. NHTSA believes that the underlying technical sources of cybersecurity vulnerabilities as well as risk-based approaches and toolsets to address them are unlikely to be substantially different for vehicles equipped with ADS. Therefore, at the levels of guidance included, the Draft Best Practices already covers vehicles equipped with ADS, and NHTSA believes that any more specificity for ADS is unnecessary at this time. E:\FR\FM\09SEN1.SGM 09SEN1 jspears on DSK121TN23PROD with NOTICES 55464 Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices However, the Agency believes that the societal risk tolerance associated with cybersecurity risks for vehicles equipped with ADS may be significantly lower than for traditional vehicles, and, thus, the Agency will continue to monitor factors around these recommendations with incoming research results and consider them in future updates. Some commenters stated that NHTSA should explicitly address enterprise information technology (IT) issues. While NHTSA agrees that enterprise IT security is an important topic, NHTSA specifically avoided making suggestions regarding internet infrastructure that do not directly touch vehicles. NHTSA recognizes that a hypothetical situation, such as the theft of vehicle code signing keys from a poorly secured, internetconnected server, could be an example of an enterprise IT security issue that could impact a vehicle. However, as part of this document’s scope, NHTSA focuses primarily on those cybersecurity issues that directly impact vehicles, and thus occupant and road user, safety. In addition to cybersecurity safety issues, NHTSA is invested in vehicle theft prevention and engages in activities to reduce motor vehicle theft through its Vehicle Theft Prevention Program. Another set of commenters requested that NHTSA expand the scope of the Draft Best Practices to address a variety of consumer privacy issues. Many of these commenters indicated that they believed that a substantial part of cybersecurity implicates privacy and privacy cannot be separated from cybersecurity. In this vein, some comments suggested that NHTSA needed to address a concept called the confidentiality, integrity, and availability triad, aka ‘‘CIA triad.’’ 33 While NHTSA agrees about the general importance of the topic of consumer confidentiality, NHTSA’s Best Practices retains its intended focus on cybersecurity, particularly those cybersecurity issues that could impact the safety of the vehicle or equipment safety. NHTSA believes this focus most closely aligns with its safety mission. We believe privacy issues can and should be addressed elsewhere. Finally, many commenters expressed concern that NHTSA’s Cybersecurity Best Practices focused on the automotive industry at the expense of advising the consumer. NHTSA’s intended audience for the Best Practices is the regulated industry. The primary responsibility for vehicle and equipment safety, including that of 33 https://en.wikipedia.org/wiki/Information_ security. VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 vehicle software and any cybersecurity protections applied, is industry, and NHTSA retains this focus in the final version. NHTSA is interested in consumer education topics, but the agency believes that an educated consumer provides an additional layer of protection that does not change the best practices recommendations to the automotive industry. h. Right To Repair Many comments discussed right-torepair issues. Some of the right-to-repair comments suggested that NHTSA assign software rights to various parties. As stated in the Draft Best Practices and elsewhere,34 NHTSA considers serviceability to be so important that in the Best Practices retain a separate section on the issue that includes the general practice [G.45]: 35 ‘‘The automotive industry should provide strong vehicle cybersecurity protections that do not unduly restrict access by alternative third-party repair services authorized by the vehicle owner.’’ Providing any party with a particular access or right to vehicle software is outside the scope and intent of this document, even though NHTSA’s interest in facilitating serviceability without undue restrictions remains the same. The Best Practices do not hinder industry’s ability to facilitate appropriate levels of access to any party while achieving cybersecurity goals. IV. Economic Analysis for Cybersecurity Best Practices for the Safety of Modern Vehicles NHTSA is finalizing its Cybersecurity Best Practices for the Safety of Modern Vehicles, which is non-binding (i.e., voluntary) guidance provided to serve as a resource for industry on safetyrelated cybersecurity issues for motor vehicles and motor vehicle equipment. As guidance, the document touches on a wide array of issues related to safetyrelated cybersecurity practices, and provides recommendations to industry on the following topics: (1) General Cybersecurity Best Practices, (2) Education, (3) Aftermarket/User Owned Devices, (4) Serviceability, and (5) Technical Vehicle Cybersecurity Best Practices. NHTSA considered the potential benefits and costs that may occur if companies in the automotive industry decide to integrate the recommendations in the Best Practices into their business practices. The 34 https://www.nhtsa.gov/sites/nhtsa.gov/files/ documents/nhtsa_testimony_in_response_to_ma_ committee_letter_july_20_2020.pdf. 35 In the draft version, this was G.43. PO 00000 Frm 00077 Fmt 4703 Sfmt 4703 following is a summary of the considerations that NHTSA evaluated for purposes of this section. First, although as guidance the Best Practices is voluntary, NHTSA expects that many entities will conform their practices to the recommendations endorsed by NHTSA. NHTSA believes that the Cybersecurity Best Practices for the Safety of Modern Vehicles serve as means of facilitating common understanding across industry regarding best practices for cybersecurity. Second, the diversity among the entities to which the Best Practices apply is vast. The recommendations found in Cybersecurity Best Practices for the Safety of Modern Vehicles are necessarily general and flexible enough to be applied to any industry entity, regardless of size or staffing. The recommendations contained within the best practices are intended to be applicable to all individuals and organizations involved in the design, development, manufacture, and assembly of a motor vehicle and its electronic systems and software. These entities include, but are not limited to, small and large volume motor vehicle and motor vehicle equipment designers, suppliers, manufacturers, modifiers, and alterers. NHTSA recognizes that there is a great deal of organizational diversity among the intended audience, resulting in a variety of approaches, organizational sizes, and staffing needs. NHTSA also expects that these entities have varying levels of organizational maturity related to cybersecurity, and varying levels of potential cybersecurity risks. These expectations, combined with NHTSA’s lack of detailed knowledge of the organizational maturity and implementation of any recommendations contained within the guidance, make it difficult for NHTSA to develop a reasonable quantification of the per-organization cost of implementing the recommendations. Third, any costs associated with applying the Best Practices would be limited to the incremental cost of applying the new recommendations included in the document (as opposed to those in the 2016 Best Practices). The updated Cybersecurity Best Practices for the Safety of Modern Vehicles document highlights a total of 70 enumerated best practices, 21 of which could be considered ‘‘new’’ relative to the first version published in 2016. Fourth, costs could be limited by organizations who have implemented some of the recommendations prior to this request for comment. NHTSA is unaware of the extent to which various entities have already implemented NHTSA’s recommendations, and E:\FR\FM\09SEN1.SGM 09SEN1 jspears on DSK121TN23PROD with NOTICES Federal Register / Vol. 87, No. 174 / Friday, September 9, 2022 / Notices determining the incremental costs associated with full implementation of the recommendations is effectively impossible without detailed insight into the organizational processes of every company. Fifth, many of NHTSA’s recommendations lean very heavily on industry standards, such as ISO/SAE 21434. Three of the 21 ‘‘new’’ best practices simply reference the ISO/SAE 21434 industry standard. Since many aspects of NHTSA’s recommendations are mapped to an industry standard, costs would also be limited for those companies who are adopting ISO/SAE 21434 already. Thus, it would be very difficult to parse whether a company implemented ISO/SAE 21434 or whether it had decided to adopt NHTSA’s voluntary recommendations. While the Best Practices have some recommendations 36 that cannot be mapped to an industry standards document at this time, most of those recommendations involve common vehicle engineering and sound business management practices, such as risk assessment and supply-chain management. For these recommendations, NHTSA’s inclusion in the Best Practices serve as a reminder. Regarding benefits, entities that do not implement appropriate cybersecurity measures, like those guided by these recommendations, or other sound controls, face a higher risk of cyberattack or increased exposure in the event of a cyberattack, potentially leading to safety concerns for the public. Implementation of the best practices can, therefore, facilitate ‘‘cost prevention’’ in the sense that failure to adopt appropriate cybersecurity practices could result in other direct or indirect costs to companies (i.e., personal injury, vehicle damage, warranty, recall, or voluntary repair/ updates). The best practices outlined in this document help organizations measure their residual risks better, particularly the safety risks associated with potential cybersecurity issues in motor vehicles and motor vehicle equipment that they design and manufacture. Further, the document provides a toolset of techniques organizations can utilize commensurate to their measured risks and take appropriate actions to reduce or eliminate them. Doing so could lower the future liabilities these risks 36 For example, G.6 in Section 4.2.3 recommends consideration of sensor vulnerabilities as part of risk assessment; and G.10 and G.11 in Section 4.2.6 recommend tracking software components on vehicles in a manner similar to hardware components. VerDate Sep<11>2014 18:57 Sep 08, 2022 Jkt 256001 represent in terms of safety risks to public and business costs associated with addressing them. In addition, quantitatively positive externalities have been shown to stem from vehicle safety and security measures (Ayres & Levitt, 1998). The high marginal cost of cybersecurity failures (crashes) extends to third parties. Widely accepted adoption of sound cybersecurity practices limits these potential costs and lessens incentives for attempts at market disruption (i.e., signal manipulation, Global Positioning System (GPS) spoofing, or reverse engineering). Issued in Washington, DC, under authority delegated in 49 CFR 1.95 and 501.8. Cem Hatipoglu, Associate Administrator, Vehicle Safety Research. [FR Doc. 2022–19507 Filed 9–8–22; 8:45 am] BILLING CODE 4910–59–P DEPARTMENT OF TRANSPORTATION [Docket No. NHTSA–2022–0074; Notice 1] Baby Trend, Inc., Receipt of Petition for Decision of Inconsequential Noncompliance National Highway Traffic Safety Administration (NHTSA), Department of Transportation (DOT). ACTION: Receipt of petition. AGENCY: Baby Trend, Inc., (BT), has determined that certain BT Hybrid 3-in1 Combination Booster Seat child restraint systems (CRSs) do not fully comply with Federal Motor Vehicle Safety Standard (FMVSS) No. 213, Child Restraint Systems. BT filed an original noncompliance report dated July 6, 2022. BT subsequently petitioned NHTSA on August 1, 2022, for a decision that the subject noncompliance is inconsequential as it relates to motor vehicle safety. This document announces receipt of BT’s petition. DATES: Send comments on or before October 11, 2022. ADDRESSES: Interested persons are invited to submit written data, views, and arguments on this petition. Comments must refer to the docket and notice number cited in the title of this notice and may be submitted by any of the following methods: • Mail: Send comments by mail addressed to the U.S. Department of Transportation, Docket Operations, M– 30, West Building Ground Floor, Room W12–140, 1200 New Jersey Avenue SE, Washington, DC 20590. • Hand Delivery: Deliver comments by hand to the U.S. Department of SUMMARY: PO 00000 Frm 00078 Fmt 4703 Sfmt 4703 55465 Transportation, Docket Operations, M– 30, West Building Ground Floor, Room W12–140, 1200 New Jersey Avenue SE, Washington, DC 20590. The Docket Section is open on weekdays from 10 a.m. to 5 p.m. except for Federal Holidays. • Electronically: Submit comments electronically by logging onto the Federal Docket Management System (FDMS) website at https:// www.regulations.gov/. Follow the online instructions for submitting comments. • Comments may also be faxed to (202) 493–2251. Comments must be written in the English language, and be no greater than 15 pages in length, although there is no limit to the length of necessary attachments to the comments. If comments are submitted in hard copy form, please ensure that two copies are provided. If you wish to receive confirmation that comments you have submitted by mail were received, please enclose a stamped, self-addressed postcard with the comments. Note that all comments received will be posted without change to https:// www.regulations.gov, including any personal information provided. All comments and supporting materials received before the close of business on the closing date indicated above will be filed in the docket and will be considered. All comments and supporting materials received after the closing date will also be filed and will be considered to the fullest extent possible. When the petition is granted or denied, notice of the decision will also be published in the Federal Register pursuant to the authority indicated at the end of this notice. All comments, background documentation, and supporting materials submitted to the docket may be viewed by anyone at the address and times given above. The documents may also be viewed on the internet at https:// www.regulations.gov by following the online instructions for accessing the dockets. The docket ID number for this petition is shown in the heading of this notice. DOT’s complete Privacy Act Statement is available for review in a Federal Register notice published on April 11, 2000 (65 FR 19477–78). FOR FURTHER INFORMATION CONTACT: Kelley Adams-Campos, Safety Compliance Engineer, NHTSA, Office of Vehicle Safety Compliance, kelley.adamscampos@dot.gov, (202) 366–7479. SUPPLEMENTARY INFORMATION: E:\FR\FM\09SEN1.SGM 09SEN1

Agencies

[Federal Register Volume 87, Number 174 (Friday, September 9, 2022)]
[Notices]
[Pages 55459-55465]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-19507]



[[Page 55459]]

-----------------------------------------------------------------------

DEPARTMENT OF TRANSPORTATION

National Highway Traffic Safety Administration

[Docket No. NHTSA-2020-0087]


Cybersecurity Best Practices for the Safety of Modern Vehicles

AGENCY: National Highway Traffic Safety Administration (NHTSA), 
Department of Transportation (DOT).

ACTION: Notice of federal guidelines.

-----------------------------------------------------------------------

SUMMARY: On January 12, 2021, NHTSA released its draft Cybersecurity 
Best Practices for the Safety of Modern Vehicles guidance (``Draft Best 
Practices'' or ``guidance'') in an effort to support industry-led 
efforts to improve the industry's cybersecurity posture as well as 
provide NHTSA's views on how the automotive industry can develop and 
apply sound, risk-based cybersecurity management processes during the 
vehicle's entire lifecycle. These guidelines are intended to be 
applicable to all individuals and organizations involved in the design, 
development, manufacture and assembly of a motor vehicle and its 
electronic systems and software. These entities include, but are not 
limited to, small and large-volume motor vehicle and motor vehicle 
equipment designers, suppliers, manufacturers, and modifiers. This 
document summarizes comments received in response to the draft 
guidance, responds to those comments, and describes changes made to the 
draft guidance in response to those comments. This document also 
announces the issuance of the final version of the Cybersecurity Best 
Practices for the Safety of Modern Vehicles guidance. While this is the 
final version of this iteration of the Best Practices, NHTSA routinely 
assesses cybersecurity risks as well as emerging best practices and 
will consider future updates as motor vehicles and their cybersecurity 
evolve.

DATES: The changes made in this document are effective upon 
publication.

FOR FURTHER INFORMATION CONTACT: For technical issues, please contact 
Mr. John I. Martin of NHTSA's Office of Vehicle Safety Research at 937-
366-3246 or [email protected]. For legal issues, contact Ms. Sara R. 
Bennett of NHTSA's Office of Chief Counsel at 202-366-2992 or 
[email protected].

SUPPLEMENTARY INFORMATION: This final version of the Cybersecurity Best 
Practices for the Safety of Modern Vehicles does not have the force and 
effect of law and is not a regulation. This guidance document will not 
be published in the Code of Federal Regulations but will be posted on 
NHTSA's website, www.nhtsa.gov.

I. Introduction

    In January 2021, NHTSA released its draft Cybersecurity Best 
Practices for the Safety of Modern Vehicles guidance document (``Draft 
Best Practices'' or ``guidance'') with the goal of supporting industry-
led efforts to improve the industry's cybersecurity posture and provide 
the Agency's views on how the automotive industry can develop and apply 
sound, risk-based cybersecurity management processes during the 
vehicle's entire lifecycle. As background, the Draft Best Practices 
document is an update to NHTSA's first cybersecurity best practices 
document, Cybersecurity Best Practices for Modern Vehicles (``2016 Best 
Practices''). NHTSA requested comment on the Draft Best Practices in an 
accompanying Federal Register notice.\1\
---------------------------------------------------------------------------

    \1\ 86 FR 2481 (Jan. 12, 2021).
---------------------------------------------------------------------------

    The Draft Best Practices builds upon agency research and industry 
progress since 2016, including emerging voluntary industry standards, 
such as the International Organization for Standardization (ISO)/SAE 
International (SAE) Draft International Standard (DIS) 21434, ``Road 
Vehicles--Cybersecurity Engineering.'' \2\ In addition, the Draft Best 
Practices references a series of industry best practice documents 
developed by the Automotive Information Sharing and Analysis Center 
(Auto-ISAC) through its members. The Draft Best Practices also reflects 
findings from NHTSA's continued research in motor vehicle 
cybersecurity, including over-the-air updates, formal verification, 
static code analysis, new learnings obtained through researchers and 
stakeholder engagement as well as continued building of our capability 
in cybersecurity testing and diagnostics. The updates included in the 
Draft Best Practices incorporate insights gained from public comments 
received in response to the 2016 guidance and from information obtained 
during the annual SAE/NHTSA Vehicle Cybersecurity Workshops.
---------------------------------------------------------------------------

    \2\ ISO/SAE 21434:2021 Road Vehicles--Cybersecurity Engineering, 
available at: https://www.iso.org/standard/70918.html.
---------------------------------------------------------------------------

    The Draft Best Practices touches on a wide array of issues 
associated with safety-related cybersecurity practices, and provides 
recommendations to industry on the following topics:

 General Cybersecurity Best Practices
 Education
 Aftermarket/User-Owned Devices
 Serviceability
 Technical Vehicle Cybersecurity Best Practices

    The first topic in the list, ``General Cybersecurity Best 
Practices,'' is the largest topic and discusses cybersecurity practices 
with respect to industry stakeholders. There are a variety of practices 
in this category. For example, one practice suggests that manufacturers 
should evaluate all commercial off-the-shelf and open-source software 
components used in vehicle Electronic Control Units (ECUs) against 
known vulnerabilities.\3\
---------------------------------------------------------------------------

    \3\ G.12 in NHTSA's Cybersecurity Best Practices for the Safety 
of Modern Vehicles.
---------------------------------------------------------------------------

    The second topic, ``Education,'' discusses the role and 
responsibilities of industry and academia in supporting an educated 
cybersecurity workforce.
    The third topic, ``Aftermarket/User-Owned Devices,'' discusses the 
issues associated with connecting aftermarket devices to vehicle 
systems. For instance, the guidance suggests that any connection to a 
third-party device should be authenticated and provided with 
appropriate, limited access.\4\
---------------------------------------------------------------------------

    \4\ G.42 in NHTSA's Cybersecurity Best Practices for the Safety 
of Modern Vehicles.
---------------------------------------------------------------------------

    The fourth topic, ``Serviceability,'' touches on industry's 
obligation to simultaneously provide for both cybersecurity and third-
party serviceability.
    The last topic, ``Technical Vehicle Cybersecurity Best Practices,'' 
discusses cybersecurity practices with respect to the vehicle. As an 
example, one of the 25 technical vehicle cybersecurity best practices 
suggests that network segmentation and isolation techniques should be 
used to limit connections between wireless-connected ECUs and low-level 
vehicle control systems, particularly those controlling safety critical 
functions, such as braking, steering, propulsion, and power management.
    This notice summarizes the comments received, NHTSA's responses to 
those comments, and finalizes the Draft Best Practices document. The 
final Best Practices document continues to use the numbering scheme 
introduced in the Draft Best Practices document. For example, it uses 
[G.1] through [G.45] for general cybersecurity best practices and [T.1] 
through [T.25] for technical vehicle cybersecurity best practices. 
Additions to the Draft Best Practices mean that there are some 
numbering differences between the draft and final versions of the Best 
Practices. This Federal Register notice exclusively refers to the final 
Best Practices

[[Page 55460]]

numbering scheme, rather than the draft version. Cases where there are 
differences between the draft and final numbering scheme are noted with 
a footnote. Finally, the agency stresses that the final Best Practices 
remain voluntary and non-binding, as has been the case with this 
guidance beginning with its initial 2016 edition.

II. Summary of Differences Between the Draft and Final Cybersecurity 
Best Practices for the Safety of Modern Vehicles

    The purpose of this section is to provide a summary of the 
differences between the draft and final Cybersecurity Best Practices 
for the Safety of Modern Vehicles. The next section of this document, 
``Summary of Public Comments Received in Response to Draft 
Cybersecurity Best Practices,'' will discuss the comments received and 
the reasons why these changes were made.
    The following provides a high-level summary of changes made in the 
final version. First, in response to a comment, NHTSA clarified, with a 
minor edit, that the scope of the Best Practices includes all 
individuals and organizations involved in the maintenance of a motor 
vehicle. Second, the Agency updated all references to the ISO/SAE 21434 
standard to reflect the finalized version of the subject industry 
standard, which occurred after the Draft Best Practices were published 
for comments. Third, in the General Cybersecurity Best Practices 
section, several headings were retitled in response to comments, and 
the new changes clarified terms, and altered the order of mention of 
the Auto-ISAC and standards development organizations (SDO) in some 
places to avoid unintended potential referencing to Auto-ISAC as an 
SDO. Additionally, NHTSA added a new general cybersecurity best 
practice to address future risks and bifurcated an existing one into 
two separate practices based on well-supported comments. Fourth, in the 
Technical Cybersecurity Best Practices section, NHTSA added mention of 
current cryptographic techniques and their implementation and made 
wording changes to clarify protections from unauthorized disclosure and 
accessibility to other vehicles. The Agency also added a new technical 
practice to limit firmware version rollback attacks and rewrote a 
technical practice [T.11].\5\ The new practice now reads ``[T.11] \6\ 
Employ best practices for communication of critical information over 
shared and possibly insecure channels. Limit the possibility of replay, 
integrity compromise, and spoofing. Physical and logical access should 
also be highly restricted.'' Fifth, NHTSA added definitions of ``global 
symmetric keys'' and ``recovery'' to the appendix's Terms and 
Descriptions section. Finally, NHTSA updated and added minor wording 
changes and references throughout, including addressing clerical 
errors.
---------------------------------------------------------------------------

    \5\ In the draft version, this was T.10.
    \6\ In the draft version, this was T.10.
---------------------------------------------------------------------------

III. Summary of Public Comments Received in Response to Draft 
Cybersecurity Best Practices

    NHTSA received comments from a total of 38 entities in response to 
the Draft Best Practices, published in January 2021. These comments 
came from government entities,\7\ industry associations,\8\ standards 
development organizations,\9\ automotive and equipment 
manufacturers,\10\ consumer and safety advocacy organizations,\11\ 
university and research organizations,\12\ and individuals.\13\ The 
comments represent an evolution of vehicle cybersecurity opinion among 
stakeholders and the general public. Comments to the 2016 guidance 
tended to be general and higher-level (i.e., bigger-picture). In 
contrast, comments received in response to the Draft Best Practices 
focused on discrete issues important to commenters. This evolution is 
also likely due to the introduction of vehicle-specific cybersecurity 
standards and best practices in the automotive sector. Overall, most 
commenters seemed supportive of NHTSA's efforts to encourage continual 
progress in the automotive sector through the issuance of best 
practices, though there was some divergence as to the details of what 
those best practices should contain, the level of detail necessary to 
fulfill the agency's goals, and other specific topics commenters stated 
NHTSA should address. The aggregated comments presented several high-
level themes, and thus, this document presents comments organized by 
the following categories of request:
---------------------------------------------------------------------------

    \7\ California Highway Patrol.
    \8\ Alliance for Automotive Innovation, American Alliance for 
Vehicle Owner's Rights, American Trucking Association, Auto Care 
Association, Automotive Aftermarket Suppliers Association, 
Automotive Recyclers Association, Specialty Equipment Market 
Association, National Motor Freight Traffic Association, National 
Automobile Dealers Association, Motor Equipment Manufacturers 
Association and Consumer Technology Association.
    \9\ SAE and Institute of Electrical and Electronics Engineers.
    \10\ General Motors LLC, Toyota Motor Corporation, Continental 
Automotive Systems, Denso Corporation, ZF North America, Robert 
Bosch GmbH, Amazon Web Services, Blackberry Corporation, AT&T, 
GeoTab, Nuro, Arilou Automotive Cybersecurity and LKQ Corporation.
    \11\ Center for Auto Safety, Privacy4Cars, SecuRepairs and 
Digital Right to Repair Coalition.
    \12\ Carnegie Mellon Software Engineering Institute, Sandia 
National Laboratories, Underwriters Laboratories LLC.
    \13\ Norman Field, Rik Farrow,Ryan Moss and Howard Hoffman.
---------------------------------------------------------------------------

     More specifics in the guidance;
     Industry collaboration;
     Minor editorial amendments;
     Additional references to ISO/SAE 21434;
     Additional references to other standards;
     Clarification of entity designations;
     Changes in scope; and
     Right to repair.
    In the sections that follow, NHTSA summarizes each category of 
major comments received in response to the Draft Best Practices and the 
agency's response.

a. Commenter Requested More Specifics in the Guidance

    Several commenters requested that NHTSA make certain language in 
the guidance more specific to address issues important to the 
commenter. As background, NHTSA intends to maintain wide applicability 
in the Draft Best Practices, so that it can encompass the many industry 
stakeholders, variety of business models, and vehicle and equipment 
architectures available on the market. This guidance is also intended 
to be flexible enough to encompass future business models and vehicle 
and equipment designs, to help ensure that this guidance remains 
helpful and relevant beyond a single point in time. Even so, NHTSA 
found it possible to integrate several suggestions from commenters in 
response to requests for more specificity. As such, NHTSA added two 
definitions to the document's glossary, and made the changes described 
below.
    The two definitions that NHTSA added in response to comments are 
for the terms, ``recovery,'' and ``global symmetric keys.'' The 
Institute of Electrical and Electronics Engineers (IEEE), a standards 
setting professional organization, suggested defining the term 
``recovery'' in the context of referencing the National Institute of 
Standards and Technology (NIST) Cybersecurity Framework's five 
principal functions ``Identify, Protect, Detect, Respond and Recover.'' 
IEEE suggested that the document did not describe what was meant by 
``recovery.'' Toyota Motor Corporation (Toyota) and Geotab suggested 
defining the specific term ``global symmetric keys'' because, in their 
opinion, the meaning may not

[[Page 55461]]

be obvious. NHTSA considered the merits of adding these new definitions 
for improving clarity and agreed that their addition would be 
beneficial for public understanding, and thus, added them to the final 
Best Practice's appendix in ``Terms and Definitions''.
    In section 8.2 of the Draft Best Practices, ``Cryptographic 
Credentials,'' Sandia National Laboratories (Sandia) and DENSO 
Corporation (Denso) suggested additional specific discussion of 
cryptographic techniques and standards. In response, NHTSA has modified 
section 8.2 with additional text and a slight title change that 
reflects section 8.2's new focus on techniques.
    Sandia also expressed the comment that, ``The claim that Public key 
cryptography techniques are more secure than symmetric key systems 
should be caveated with `properly implemented techniques' are 
`generally' more secure. . . .''.\14\ While Sandia made this comment 
with respect to section 8.3 of the Draft Best Practices, ``Vehicle 
Diagnostic Functionality,'' NHTSA responded to Sandia's comment by 
incorporating the text ``While the selection of appropriate 
cryptographic techniques is an important design criterion, it should be 
noted that implementation issues often determine any system's 
security'' into section 8.2. NHTSA considered Sandia's assertion to be 
correct, and NHTSA agrees that implementation issues are very 
important.
---------------------------------------------------------------------------

    \14\ See Comment ID ``NHTSA-2020-0087-0009'' for Document 
``NHTSA-2020-0087-0002'' on the regulations.gov website.
---------------------------------------------------------------------------

    NHTSA also incorporated a comment from SAE that asked for technical 
guidance that would limit firmware version rollback attacks where an 
attacker may use software update mechanisms to place older, more 
vulnerable software on a targeted device. NHTSA agrees that the 
practice of manufacturers allowing the installation of older, 
potentially vulnerable versions of firmware in vehicles and vehicle 
equipment should be avoided whenever possible. In response, NHTSA added 
practice [T.23].
    Because of NHTSA's desire for the document to remain broadly 
applicable, many comments asking for additional specifics were not 
incorporated into the guidance. For instance, NHTSA did not accept 
comments suggesting that the agency explicitly define terms such as 
``lifecycle,'' ``end-of-life,'' and ``state of the art,'' among others. 
NHTSA acknowledges that many of these terms may have different meanings 
to different companies and stakeholders, but NHTSA did not believe it 
would be appropriate to define these terms in such a way that might 
inadvertently suggest limitations to or conflicts with company 
responsibilities, such as manufacturers' responsibility to notify NHTSA 
of any safety defect in its motor vehicles or motor vehicle 
equipment.\15\
---------------------------------------------------------------------------

    \15\ 49 U.S.C. 30118(c).
---------------------------------------------------------------------------

    Similarly, while NHTSA encourages companies to pay close attention 
to cybersecurity throughout its corporate structures and supply chain, 
NHTSA does not view this guidance as a mechanism to suggest how 
corporate responsibilities among companies should be distributed. This 
guidance does not attempt to provide any particular view of the 
automotive supply chain, and NHTSA recognizes that many of these 
considerations may be handled via contract. Although ISO/SAE 21434 does 
address supply chain responsibilities to some extent, NHTSA's Best 
Practices purposefully does not provide such details.
    In other cases of requested specificity, NHTSA determined that some 
commenters' requests inadvertently resulted in limiting the 
applicability of the document. As stated before, one of NHTSA's 
underlying goals of this document was to ensure it remains accessible 
to a wide audience and all of NHTSA's regulated entities.
    NHTSA also tries to maintain the document's generality by limiting 
language specific to a particular corporate process, perhaps even 
specific to a particular corporation. Comments that make suggestions 
encompassing specific corporate processes have not been incorporated 
into the updated document.
    In addition, a comment asked NHTSA to address forensic data 
retrieval. NHTSA recognizes the importance of forensic data retrieval 
but has determined that the subject is out-of-scope for this document.

b. Commenter Encourages Industry Collaboration

    Many commenters expressed the sentiment that industry collaborative 
efforts are a good idea, including the Alliance for Automotive 
Innovation (Alliance) and Amazon Web Services (Amazon), both of which 
provided specific comments encouraging collaboration. The Alliance 
suggested that NHTSA create a new section on emerging risks where there 
may not be established best practices developed to manage those risks. 
The Alliance suggested that this new section should include high-level 
recommendations to encourage industry-wide collaboration to establish 
best practices to treat those risks. Amazon suggested NHTSA should 
encourage industry collaboration to identify attempted and successful 
exploitations and attacks not previously considered in the design and 
assessment phases.
    NHTSA agrees with the importance of industry collaboration, 
especially within the automotive cybersecurity realm. Therefore, NHTSA 
has encouraged membership and active participation in the Auto-ISAC and 
collaboration through its annual cybersecurity forum that the agency 
holds with SAE. In response to these commenters, NHTSA added a new 
general practice [G.24] that states: ``As future risks emerge; industry 
should collaborate to expediently develop mitigation measures and best 
practices to address new risks.'' NHTSA believes that this addition and 
the rest of the guidance covers both commenters' suggestions.

c. Commenter Requested Minor Editorial Amendments

    Many commenters provided a wealth of suggested additional word 
choices, terminology changes, and phrasing modifications. NHTSA 
appreciates these suggestions and adopted these changes wherever 
possible and is grateful for the improvements these suggestions 
provide.
    Multiple comments \16\ pointed out a typographical error in section 
4.5 where ``[G.27[a]-[c]]'' \17\ should have been ``[G.28[a]-[c].'' 
\18\ NHTSA adopted the suggested change. Other editorial amendments 
include modifying the word ``standards'' in [G.9] to ``expectations.'' 
In the draft Best Practices, [G.9] stated ``Clear cybersecurity 
standards should be specified and communicated to the suppliers that 
support the intended protections.'' NHTSA adopted the change to the 
word ``expectations'' because commenters suggested they needed 
additional clarification as to what word ``standards'' means in that 
particular practice. NHTSA believes ``expectations'' would maintain the 
agency's intended breadth while also clarifying any ambiguity for 
stakeholders.
---------------------------------------------------------------------------

    \16\ ZF North America, Arilou Automotive Cybersecurity, National 
Motor Freight Traffic Administration.
    \17\ In the draft version, this was G.26.
    \18\ In the draft version, this was G.27.
---------------------------------------------------------------------------

    Another commenter suggested that NHTSA remove ``that'' from ``NHTSA 
recommends that:'' in section 4.3 of the Draft Best Practices. NHTSA 
adopted this edit accordingly.
    Some commenters suggested changes to section titles to add 
additional clarity

[[Page 55462]]

for stakeholders. In two instances, NHTSA adopted those suggestions to 
change section titles. Section 4.2.7 was originally titled 
``Penetration Testing and Documentation'' in the draft guidance and is 
now titled ``Cybersecurity Testing and Vulnerability Identification'' 
in the final guidance. NHTSA felt that the new title was appropriately 
general. Similarly, section 4.2.4 was originally titled ``Unnecessary 
Risk Removal'' and is now ``Removal or Mitigation of Safety-Critical 
Risks.'' The new title better describes the section.
    SAE suggested changes to [T.4] \19\ that changed the existing text 
to ``Cryptographic credentials that provide an authorized, elevated 
level of access to vehicle computing platforms should be protected from 
unauthorized disclosure or modification''. NHTSA welcomes this change 
because it additionally emphasizes the consequences of modifying 
platform credentials.
---------------------------------------------------------------------------

    \19\ In the draft version, this was T.3.
---------------------------------------------------------------------------

    Several commenters recommended minor amendments to [T.5] \20\ ``Any 
credential obtained from a single vehicle's computing platform should 
not provide access to multiple vehicles.'' The technical guidance now 
reads ``other vehicles'' rather than ``multiple vehicles'' as was 
included in the draft guidance. NHTSA feels that the use of the word 
``other'' more clearly focuses the issues involved in using universally 
applicable credentials.
---------------------------------------------------------------------------

    \20\ In the draft version, this was T.4.
---------------------------------------------------------------------------

    National Motor Freight Traffic Association (NMFTA) recommended 
minor amendments to general practice [G.6] ``Manufacturers should 
consider the risks associated with sensor vulnerabilities and potential 
sensor signal manipulation efforts such as GPS spoofing, road sign 
modification, Lidar/Radar jamming and spoofing, camera blinding, or 
excitation of machine learning false positives.'' The general guidance 
now reads ``. . . camera blinding, and excitation . . .'' rather than 
``. . . camera blinding, or excitation. . . .'' NHTSA agrees with 
NMFTA's comment that the use of ``or'' rather than ``and'' incorrectly 
suggests that manufacturers could focus on any one of the presented 
spoofing issues rather than considering all the spoofing issues.
    SAE suggested that [G.10] needed to focus on hardware and software 
rather than just software. In the Draft Best Practices, general 
practice [G.10] stated ``Manufacturers should maintain a database of 
operational software components used in each automotive ECU, each 
assembled vehicle, and a history log of version updates applied over 
the vehicle's lifetime.'' NHTSA agrees that software inventory 
management alone is not sufficient and made changes to [G.10] to 
include a discussion of inventory management of both hardware and 
software. Robert Bosch GmbH (Bosch) additionally suggested that the 
subject of [G.10] needed to be ``Suppliers and vehicle manufacturers'' 
rather than ``Manufacturers.'' NHTSA agrees with the change because it 
maintains the desired generality while directing the reader to specific 
entities.
    In the Draft Best Practices, general practice [G.30] \21\ stated 
``Organizations should document the details of each identified and 
reported vulnerability, exploit, or incident applicable to their 
products. These documents should include information from onset to 
disposition with sufficient granularity to support response 
assessment.'' Underwriters Laboratories (UL) suggested rephrasing the 
second sentence as: ``The nature of the vulnerability and the rationale 
for how the vulnerability is managed should also be documented.'' NHTSA 
agrees that UL's suggested wording is an improvement. NHTSA also felt 
that [G.30] \22\ could be better expressed as two separate general 
practices and made a new general practice to reflect UL's wording.
---------------------------------------------------------------------------

    \21\ In the draft version, this was G.29.
    \22\ In the draft version, this was G.29.
---------------------------------------------------------------------------

    SAE suggested changes to [G.41] \23\ in the Draft Best Practices, 
which stated ``The automotive industry should consider the incremental 
risks that could be presented by these devices when connected with 
vehicle systems and provide reasonable protections.'' The commenter 
suggested removing the word ``incremental,'' changing ``automotive 
industry'' to ``automotive manufacturers,'' and changing ``these 
devices'' to ``user owned or aftermarket devices.'' NHTSA declines to 
change ``automotive industry'' to ``automotive manufacturers'' because 
the goal of this guidance document is to retain broad utility for the 
entire automotive industry, not just manufacturers. NHTSA agreed to 
remove the word ``incremental'' from the general practice and to 
replace the term ``these devices'' with a more accurate phrase, ``user 
owned or aftermarket devices.''
---------------------------------------------------------------------------

    \23\ In the draft version, this was G.39.
---------------------------------------------------------------------------

    In the Draft Best Practices, [T.11] \24\ stated ``Critical safety 
messages, particularly those passed across non-segmented communication 
buses, should employ a message authentication method to limit the 
possibility of message spoofing.'' SAE felt that [T.11] \25\ needed to 
be reworded as: ``Employ best practices for communication of critical 
information over shared and possibly insecure channels. Limit the 
possibility of replay, integrity compromise, and spoofing. Physical and 
logical access should also be highly restricted.'' NHTSA adopted SAE's 
suggested language for technical practice because the new wording 
expresses more general guidance than the draft version while 
encompassing the draft version's meaning.
---------------------------------------------------------------------------

    \24\ In the draft version, this was T.10.
    \25\ In the draft version, this was T.10.
---------------------------------------------------------------------------

    There were many other suggestions for minor wording or phrasing 
changes that NHTSA considered. NHTSA adopted those that would not 
change the underlying intent of that particular section of the guidance 
document, but many suggestions from commenters would have worked to 
either limit or narrow the scope of the guidance. As such, those 
suggestions were not adopted since they would be contrary to the intent 
and goals of this document.

d. Commenter Requested Additional References to ISO/SAE 21434

    ISO/SAE 21434 is a newly developed standard titled ``Road 
Vehicles--Cybersecurity Engineering.'' \26\ This standard serves as an 
overarching industry consensus standard for vehicle cybersecurity, and 
it is extensively referenced in NHTSA's ``Cybersecurity Best Practices 
for the Safety of Modern Vehicles.'' Many commenters pointed out that 
NHTSA referenced the earlier Draft International Standard (DIS) version 
of ISO/SAE 21434, and suggested that NHTSA needed to update the 
references in the final Best Practices to the final ISO/SAE 21434 
version, which was due to be released in Fall 2021. NHTSA followed this 
advice. In the final Best Practices, NHTSA has changed the latest the 
guidance to reflect the content of the latest ``FDIS'' or ``Final Draft 
International Standard'' version of ISO/SAE 21434.
---------------------------------------------------------------------------

    \26\ ISO/SAE 21434:2021 Road vehicles--Cybersecurity 
engineering, available at: https://www.iso.org/standard/70918.html 
and https://www.saemobilius.sae.org.
---------------------------------------------------------------------------

    While NHTSA extensively referenced ISO/SAE 21434, the commenters 
pointed out areas where NHTSA could have included a reference to a 
relevant section of ISO/SAE 21434 and did not. As an example, 
commenters pointed out that [G.12] and [G.37] \27\ could refer to the 
relevant clauses of ISO/SAE 21434. NHTSA adopted these suggestions and 
added a reference to ISO/SAE 21434

[[Page 55463]]

clause 6 in [G.12]. General practice [G.37] \28\ now references 
requirements in clauses 5 and 6 of ISO/SAE 21434. Another commenter 
corrected NHTSA's reference to ISO/SAE 21434 in a footnote to general 
practice [G.16]. NHTSA accepted that correction.
---------------------------------------------------------------------------

    \27\ In the draft version, this was G.35.
    \28\ In the draft version, this was G.35.
---------------------------------------------------------------------------

    NHTSA also included the website https://www.saemobilius.sae.org as 
a source for ISO/SAE 21434 in addition to the previously referenced 
https://www.iso.org.

e. Commenter Requested Additional References to Other Standards

    Another category of comments requested that NHTSA provide new 
references to additional source material that were favored by the 
commenter. In many cases, NHTSA was able to incorporate these 
suggestions. NHTSA added only those references and referenced materials 
that the agency found were: (1) Sufficiently high level; (2) Specific 
to automotive industry or could be obviously applied to the automotive 
industry; (3) Not under development; and/or (4) Not duplicative of 
information or references already included in the Draft Best Practices.
    For example, one commenter stated that NHTSA should add references 
to the NIST cryptography standards to supplement technical practice 
[T.4],\29\ dealing with cryptographic credentials. NHTSA decided that 
this modification met the criteria described above, and the agency 
adopted this suggestion by adding a technical practice [T.3] and a 
reference to NIST's Federal Information Processing Standards (FIPS) 140 
Series. The FIPS 140 series is a set of documents updated by NIST that 
describes minimum standards for cryptography.
---------------------------------------------------------------------------

    \29\ In the draft version, this was T.3.
---------------------------------------------------------------------------

    Another commenter stated that NHTSA should reference ISO 24089 
``Road vehicles--Software update engineering'' in the Best Practices. 
NHTSA did not incorporate this comment because ISO 24089 is under 
development at this time. NHTSA may revisit this decision in future 
iterations of its cybersecurity best practices after ISO 24089 is 
finalized.
    NMFTA requested that NHTSA reference the Cybersecurity and 
Infrastructure Security Agency's (CISA's) binding operational directive 
20-01 in general practice [G.27]'s \30\ discussion of vulnerability 
reporting. NHTSA agreed with this change and felt that it provided 
support for the guidance.
---------------------------------------------------------------------------

    \30\ In the draft version, this was G.26.
---------------------------------------------------------------------------

    In response to a comment from SAE, NHTSA also added a reference to 
a NIST white paper titled ``Mitigating the Risk of Software 
Vulnerabilities by Adopting a Secure Software Development Framework 
(SSDF)'' for general practice [G.22], dealing with best practices for 
secure software development.
    Responding to a comment from NMFTA, NHTSA added a footnote 
reference to the SAE CyberAuto Challenge and the Cyber Truck Challenge 
as examples for general practice [G.40],\31\ dealing with educational 
efforts targeted at workforce development in the field of automotive 
cybersecurity. NHTSA also used this additional footnote to call out 
NHTSA's efforts to fund and develop cybersecurity curricula.
---------------------------------------------------------------------------

    \31\ In the draft version, this was G.38.
---------------------------------------------------------------------------

    Other commenters requested that NHTSA add in references to the 
World Forum for Harmonization of Vehicle Regulation's (WP.29) United 
Nations (UN) Regulation 155--``Cyber security and cyber security 
management system.'' In most cases, the public comments recommended 
high-level alignment, without further specifying the sources of 
potential misalignment that may have been a concern. UN ECE 155 is a 
type-approval regulation \32\ that establishes not only recommended 
practices but also sufficiency standards for approval. Standards for 
type approval are well beyond the scope and intent of NHTSA's Best 
Practices document. Therefore, NHTSA did not explicitly reference the 
UN ECE 155. NHTSA could revisit this topic in future iterations based 
on more specific public feedback.
---------------------------------------------------------------------------

    \32\ UN ECE 155 is a regulation established under the United 
Nations Economic Commission for Europe (UNECE) 1958 Agreement 
concerning the Adoption of Uniform Technical Prescriptions for 
Wheeled Vehicles, Equipment and Parts which can be Fitted and/or be 
Used on Wheeled Vehicles and the Conditions for Reciprocal 
Recognition of Approvals Granted on the Basis of these Prescriptions 
(Available at https://unece.org/trans/main/wp29/wp29regs), and the 
United States is not party to this agreement. Further, UN Regulation 
155 is a regulation for type approving authorities, and the United 
States is not a country that engages in type approval of motor 
vehicles or motor vehicle equipment.
---------------------------------------------------------------------------

f. Commenter Requested Clarification of Entity Designations

    Several comments pointed out that the NHTSA's Cybersecurity Best 
Practices seemed to falsely suggest that the Auto-ISAC is a standard 
setting organization (SSO). NHTSA has modified general practices [G.18] 
and [G.23] in an effort to correct this impression. Even so, these 
modifications should not be interpretated as anything more than textual 
clarifications. The modifications do not represent any change in 
NHTSA's position that guidance to industry, whether from a SSO or not, 
can be valuable to encourage progress in cybersecurity practices of the 
automotive industry.

g. Commenters Requested Changes in Scope

    Many commenters requested a variety of changes in scope for the 
Draft Best Practices. Commenters diverged in their requests for changes 
to the scope. NHTSA did not incorporate most of the requested scope 
changes because NHTSA carefully considered the scope of the Draft Best 
Practices document at the development and drafting stages, and NHTSA 
believes that the existing scope of the document is most compatible 
with its mission and goals for this document. For example, narrowing 
the scope might imply inaccurately that NHTSA does not intend this 
guidance to be useful to all its regulated entities, and broadening the 
scope might exceed the agency's intended audience.
    While most comments concerning the document's scope were not 
incorporated, NHTSA responded to the National Automobile Dealers 
Association's comments concerning the critical role of automotive 
dealers by adding the word ``maintenance'' to the following text of the 
Scope, which was an explicit clarification that scope includes that 
function: ``Importantly, all individuals and organizations involved in 
the design, manufacturing, assembly and maintenance of a motor vehicle 
have a critical role to play with respect to vehicle cybersecurity.''
    Many commenters felt that NHTSA needed to address heavy trucks more 
explicitly and directly, but NHTSA believes this would be unnecessary 
since the scope of the Draft Best Practices already includes heavy 
trucks.
    Other commenters felt that NHTSA needed to more explicitly address 
vehicles equipped with Automated Driving Systems (ADS), asserting that 
these vehicles would have cybersecurity needs much different from 
modern vehicles. NHTSA believes that the underlying technical sources 
of cybersecurity vulnerabilities as well as risk-based approaches and 
toolsets to address them are unlikely to be substantially different for 
vehicles equipped with ADS. Therefore, at the levels of guidance 
included, the Draft Best Practices already covers vehicles equipped 
with ADS, and NHTSA believes that any more specificity for ADS is 
unnecessary at this time.

[[Page 55464]]

However, the Agency believes that the societal risk tolerance 
associated with cybersecurity risks for vehicles equipped with ADS may 
be significantly lower than for traditional vehicles, and, thus, the 
Agency will continue to monitor factors around these recommendations 
with incoming research results and consider them in future updates.
    Some commenters stated that NHTSA should explicitly address 
enterprise information technology (IT) issues. While NHTSA agrees that 
enterprise IT security is an important topic, NHTSA specifically 
avoided making suggestions regarding internet infrastructure that do 
not directly touch vehicles. NHTSA recognizes that a hypothetical 
situation, such as the theft of vehicle code signing keys from a poorly 
secured, internet-connected server, could be an example of an 
enterprise IT security issue that could impact a vehicle. However, as 
part of this document's scope, NHTSA focuses primarily on those 
cybersecurity issues that directly impact vehicles, and thus occupant 
and road user, safety. In addition to cybersecurity safety issues, 
NHTSA is invested in vehicle theft prevention and engages in activities 
to reduce motor vehicle theft through its Vehicle Theft Prevention 
Program.
    Another set of commenters requested that NHTSA expand the scope of 
the Draft Best Practices to address a variety of consumer privacy 
issues. Many of these commenters indicated that they believed that a 
substantial part of cybersecurity implicates privacy and privacy cannot 
be separated from cybersecurity. In this vein, some comments suggested 
that NHTSA needed to address a concept called the confidentiality, 
integrity, and availability triad, aka ``CIA triad.'' \33\ While NHTSA 
agrees about the general importance of the topic of consumer 
confidentiality, NHTSA's Best Practices retains its intended focus on 
cybersecurity, particularly those cybersecurity issues that could 
impact the safety of the vehicle or equipment safety. NHTSA believes 
this focus most closely aligns with its safety mission. We believe 
privacy issues can and should be addressed elsewhere.
---------------------------------------------------------------------------

    \33\ https://en.wikipedia.org/wiki/Information_security.
---------------------------------------------------------------------------

    Finally, many commenters expressed concern that NHTSA's 
Cybersecurity Best Practices focused on the automotive industry at the 
expense of advising the consumer. NHTSA's intended audience for the 
Best Practices is the regulated industry. The primary responsibility 
for vehicle and equipment safety, including that of vehicle software 
and any cybersecurity protections applied, is industry, and NHTSA 
retains this focus in the final version. NHTSA is interested in 
consumer education topics, but the agency believes that an educated 
consumer provides an additional layer of protection that does not 
change the best practices recommendations to the automotive industry.

h. Right To Repair

    Many comments discussed right-to-repair issues. Some of the right-
to-repair comments suggested that NHTSA assign software rights to 
various parties. As stated in the Draft Best Practices and 
elsewhere,\34\ NHTSA considers serviceability to be so important that 
in the Best Practices retain a separate section on the issue that 
includes the general practice [G.45]: \35\ ``The automotive industry 
should provide strong vehicle cybersecurity protections that do not 
unduly restrict access by alternative third-party repair services 
authorized by the vehicle owner.'' Providing any party with a 
particular access or right to vehicle software is outside the scope and 
intent of this document, even though NHTSA's interest in facilitating 
serviceability without undue restrictions remains the same. The Best 
Practices do not hinder industry's ability to facilitate appropriate 
levels of access to any party while achieving cybersecurity goals.
---------------------------------------------------------------------------

    \34\ https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/nhtsa_testimony_in_response_to_ma_committee_letter_july_20_2020.pdf.
    \35\ In the draft version, this was G.43.
---------------------------------------------------------------------------

IV. Economic Analysis for Cybersecurity Best Practices for the Safety 
of Modern Vehicles

    NHTSA is finalizing its Cybersecurity Best Practices for the Safety 
of Modern Vehicles, which is non-binding (i.e., voluntary) guidance 
provided to serve as a resource for industry on safety-related 
cybersecurity issues for motor vehicles and motor vehicle equipment. As 
guidance, the document touches on a wide array of issues related to 
safety-related cybersecurity practices, and provides recommendations to 
industry on the following topics: (1) General Cybersecurity Best 
Practices, (2) Education, (3) Aftermarket/User Owned Devices, (4) 
Serviceability, and (5) Technical Vehicle Cybersecurity Best Practices.
    NHTSA considered the potential benefits and costs that may occur if 
companies in the automotive industry decide to integrate the 
recommendations in the Best Practices into their business practices. 
The following is a summary of the considerations that NHTSA evaluated 
for purposes of this section.
    First, although as guidance the Best Practices is voluntary, NHTSA 
expects that many entities will conform their practices to the 
recommendations endorsed by NHTSA. NHTSA believes that the 
Cybersecurity Best Practices for the Safety of Modern Vehicles serve as 
means of facilitating common understanding across industry regarding 
best practices for cybersecurity.
    Second, the diversity among the entities to which the Best 
Practices apply is vast. The recommendations found in Cybersecurity 
Best Practices for the Safety of Modern Vehicles are necessarily 
general and flexible enough to be applied to any industry entity, 
regardless of size or staffing. The recommendations contained within 
the best practices are intended to be applicable to all individuals and 
organizations involved in the design, development, manufacture, and 
assembly of a motor vehicle and its electronic systems and software. 
These entities include, but are not limited to, small and large volume 
motor vehicle and motor vehicle equipment designers, suppliers, 
manufacturers, modifiers, and alterers. NHTSA recognizes that there is 
a great deal of organizational diversity among the intended audience, 
resulting in a variety of approaches, organizational sizes, and 
staffing needs. NHTSA also expects that these entities have varying 
levels of organizational maturity related to cybersecurity, and varying 
levels of potential cybersecurity risks. These expectations, combined 
with NHTSA's lack of detailed knowledge of the organizational maturity 
and implementation of any recommendations contained within the 
guidance, make it difficult for NHTSA to develop a reasonable 
quantification of the per-organization cost of implementing the 
recommendations.
    Third, any costs associated with applying the Best Practices would 
be limited to the incremental cost of applying the new recommendations 
included in the document (as opposed to those in the 2016 Best 
Practices). The updated Cybersecurity Best Practices for the Safety of 
Modern Vehicles document highlights a total of 70 enumerated best 
practices, 21 of which could be considered ``new'' relative to the 
first version published in 2016.
    Fourth, costs could be limited by organizations who have 
implemented some of the recommendations prior to this request for 
comment. NHTSA is unaware of the extent to which various entities have 
already implemented NHTSA's recommendations, and

[[Page 55465]]

determining the incremental costs associated with full implementation 
of the recommendations is effectively impossible without detailed 
insight into the organizational processes of every company.
    Fifth, many of NHTSA's recommendations lean very heavily on 
industry standards, such as ISO/SAE 21434. Three of the 21 ``new'' best 
practices simply reference the ISO/SAE 21434 industry standard. Since 
many aspects of NHTSA's recommendations are mapped to an industry 
standard, costs would also be limited for those companies who are 
adopting ISO/SAE 21434 already. Thus, it would be very difficult to 
parse whether a company implemented ISO/SAE 21434 or whether it had 
decided to adopt NHTSA's voluntary recommendations. While the Best 
Practices have some recommendations \36\ that cannot be mapped to an 
industry standards document at this time, most of those recommendations 
involve common vehicle engineering and sound business management 
practices, such as risk assessment and supply-chain management. For 
these recommendations, NHTSA's inclusion in the Best Practices serve as 
a reminder.
---------------------------------------------------------------------------

    \36\ For example, G.6 in Section 4.2.3 recommends consideration 
of sensor vulnerabilities as part of risk assessment; and G.10 and 
G.11 in Section 4.2.6 recommend tracking software components on 
vehicles in a manner similar to hardware components.
---------------------------------------------------------------------------

    Regarding benefits, entities that do not implement appropriate 
cybersecurity measures, like those guided by these recommendations, or 
other sound controls, face a higher risk of cyberattack or increased 
exposure in the event of a cyberattack, potentially leading to safety 
concerns for the public. Implementation of the best practices can, 
therefore, facilitate ``cost prevention'' in the sense that failure to 
adopt appropriate cybersecurity practices could result in other direct 
or indirect costs to companies (i.e., personal injury, vehicle damage, 
warranty, recall, or voluntary repair/updates).
    The best practices outlined in this document help organizations 
measure their residual risks better, particularly the safety risks 
associated with potential cybersecurity issues in motor vehicles and 
motor vehicle equipment that they design and manufacture. Further, the 
document provides a toolset of techniques organizations can utilize 
commensurate to their measured risks and take appropriate actions to 
reduce or eliminate them. Doing so could lower the future liabilities 
these risks represent in terms of safety risks to public and business 
costs associated with addressing them.
    In addition, quantitatively positive externalities have been shown 
to stem from vehicle safety and security measures (Ayres & Levitt, 
1998). The high marginal cost of cybersecurity failures (crashes) 
extends to third parties. Widely accepted adoption of sound 
cybersecurity practices limits these potential costs and lessens 
incentives for attempts at market disruption (i.e., signal 
manipulation, Global Positioning System (GPS) spoofing, or reverse 
engineering).

    Issued in Washington, DC, under authority delegated in 49 CFR 
1.95 and 501.8.
Cem Hatipoglu,
Associate Administrator, Vehicle Safety Research.
[FR Doc. 2022-19507 Filed 9-8-22; 8:45 am]
BILLING CODE 4910-59-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.