<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://blog.hermessol.com/en</link>
    <description>Explore the latest news, tech insights, and blog posts from HermesSol. We provide expert information on Functional Safety, Cybersecurity, and Automotive SPICE.</description>
    <language>en</language>
    <pubDate>Sat, 21 Feb 2026 15:33:10 GMT</pubDate>
    <dc:date>2026-02-21T15:33:10Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Practical Configuration Management 5-Step Process Guide for Engineering Teams</title>
      <link>https://blog.hermessol.com/en/2025/12/02/configuration-management-5-step-process-guide-for-engineers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/12/02/configuration-management-5-step-process-guide-for-engineers?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Practical-Configuration-Management-Process-Guide-for-Engineers.png" alt="Practical Configuration Management 5-Step Process Guide for Engineering Teams" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h1&gt;1. Start with the Most Common Questions from Practitioners&lt;/h1&gt; 
&lt;p&gt;In the previous Configuration Management Series 1, we covered the basic concepts and importance of configuration management.&lt;br&gt;Many readers shared a common question:&lt;/p&gt;</description>
      <content:encoded>&lt;h1&gt;1. Start with the Most Common Questions from Practitioners&lt;/h1&gt; 
&lt;p&gt;In the previous Configuration Management Series 1, we covered the basic concepts and importance of configuration management.&lt;br&gt;Many readers shared a common question:&lt;/p&gt; 
&lt;p&gt;"Now I understand the concept. So what do I actually do in real projects?"&lt;/p&gt; 
&lt;p&gt;In Series 2, we summarize a practical 5-step configuration management process that can be implemented immediately in engineering teams.&lt;br&gt;This includes key check points, checklists, and ready-to-use practical templates, all explained in one place.&lt;/p&gt; 
&lt;h1&gt;2. Why Do Organizations Fail in Execution Even with Perfect Documents?&lt;/h1&gt; 
&lt;p&gt;Even when companies possess configuration management documentation, execution often collapses due to the following reasons:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Process procedures exist, but engineering work is not performed according to the defined process.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Only the configuration manager understands the changes, while developers and test engineers are unaware of them.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Documents and real workflows operate independently and never synchronize.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;On the other hand, organizations that successfully build configuration management as an internal capability share these traits:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Start small and improve rapidly.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Maintain a structure that can be understood by all engineers after hearing it once.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Keep documents aligned with real project workflows and ensure full traceability, including past history.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1&gt;3. Practical 5-Step Configuration Management Framework for Real Engineering Work&lt;/h1&gt; 
&lt;p&gt; &lt;img width="928" height="1024" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/Shape-Management-Framework-928x1024.png?width=928&amp;amp;height=1024&amp;amp;name=Shape-Management-Framework-928x1024.png" alt=""&gt; &lt;/p&gt; 
&lt;h2&gt;Step 1 — Create the Configuration Management Plan (A Plan is More Than Documentation)&lt;/h2&gt; 
&lt;p&gt;The configuration management plan is defined as a mandatory requirement in ISO 26262 Part 8.&lt;br&gt;However, writing the document alone is not planning. The real purpose of planning is team-level agreement on how configuration work will actually operate inside the project.&lt;/p&gt; 
&lt;h3&gt;Core Elements of the Plan&lt;/h3&gt; 
&lt;p&gt;Scope Definition&lt;br&gt;Clearly classify:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Which projects apply configuration management&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Which work products must be managed&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Which artifacts are excluded from control&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Configuration Management Organization &amp;amp; Role Structure&lt;br&gt;Define organizational boundaries, responsibilities, and authority for configuration activities.&lt;/p&gt; 
&lt;p&gt;Naming &amp;amp; Version Identification Rules&lt;br&gt;A practical and widely-used engineering pattern:&lt;/p&gt; 
&lt;p&gt;[ProjectCode][ArtifactType][ModuleName]v[Version][Date].Extension&lt;/p&gt; 
&lt;p&gt;Example:&lt;br&gt;CM01_SRS_BrakeModule_v1.0_20251127.xlsx&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Baseline Definition&lt;br&gt;Specify baseline points through formal review and approval flows, marking a confirmed version as the reference baseline.&lt;/li&gt; 
 &lt;li&gt;Tools, Schedule, Status, and Change History Management Policies&lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Ensure tools are defined and compatible with project needs&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Set policies for scheduling, history logging, version status, and archiving&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Checklist for Step 1&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Has the artifact scope been shared with all project members?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Are all teams applying the same naming &amp;amp; identification rules?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Have document storage location, baselines, and approval rules been agreed upon?&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Step 2 — Identify What to Manage&lt;/h2&gt; 
&lt;p&gt;All major work products and engineering decision evidence created throughout the safety lifecycle must be configuration-managed.&lt;/p&gt; 
&lt;h3&gt;Example Artifacts to Control&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Requirements specifications&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Design descriptions&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Test cases and results&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Safety plan &amp;amp; safety case&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Decision meeting records&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Manuals &amp;amp; guidelines&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Release versions&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Change history logs&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Checklist for Step 2&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Are there missing artifacts?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Is ownership assigned for each work product update responsibility?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Are versions kept up-to-date regularly?&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;Step 3 — Control Change Flow&lt;/h2&gt; 
&lt;p&gt;Change itself is natural. But uncontrolled change becomes safety risk, failure risk, and certification risk.&lt;/p&gt; 
&lt;h3&gt;Typical Uncontrolled Change Failure Cases&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;A developer modifies code, but the team is unaware, leading to system failure after release.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Test teams repeat outdated test cases because they never received the update.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;A failure occurs after release, but root cause analysis is impossible due to lack of history tracking.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Safety Impact Analysis (Mandatory for Every Change)&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Does the failure mode change?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Is the safety goal impacted?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Are safety mechanisms affected?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Are additional safety measures required?&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Ready-to-Copy Change Request Template&lt;/h3&gt; 
&lt;table&gt; 
 &lt;thead&gt; 
  &lt;tr&gt; 
   &lt;th&gt;Item&lt;/th&gt; 
   &lt;th&gt;Description&lt;/th&gt; 
  &lt;/tr&gt; 
 &lt;/thead&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Change ID&lt;/td&gt; 
   &lt;td&gt;CR-YYYY-001&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Change Target&lt;/td&gt; 
   &lt;td&gt;documents / design / code / system&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Reason for Change&lt;/td&gt; 
   &lt;td&gt;background &amp;amp; issue description&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Change Description&lt;/td&gt; 
   &lt;td&gt;detailed modification&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Impact Analysis&lt;/td&gt; 
   &lt;td&gt;safety impact &amp;amp; risk impact&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Priority&lt;/td&gt; 
   &lt;td&gt;Critical / High / Medium / Low&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Owner&lt;/td&gt; 
   &lt;td&gt;execution responsible&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Schedule&lt;/td&gt; 
   &lt;td&gt;implementation closure&lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td&gt;Status&lt;/td&gt; 
   &lt;td&gt;Draft / Approved / Archived / etc&lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;Configuration work repeats the flow: Change Request → Review → Approval → Implementation → Re-verification → History Logging.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Step 4 — Build Traceability as a Core Capability&lt;/h2&gt; 
&lt;p&gt;Audit and certification assessments always include the question:&lt;/p&gt; 
&lt;p&gt;"How was this requirement designed, implemented in code, and validated in test?"&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Poor Responses When Traceability is Missing&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;"It should exist somewhere…"&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;"I think we tested it…"&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;"Let me check again…"&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Result: audit failure or assessment failure.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Strong Benchmark Response When Traceability Exists&lt;/strong&gt;&lt;br&gt;REQ-001 was designed in DES-005 → implemented in MOD-010 → validated in TC-025/026.&lt;br&gt;(And traceability matrix is presented immediately.)&lt;/p&gt; 
&lt;p&gt;The ability to retrieve and explain evidence instantly proves configuration success.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;Step 5 — Audit as a Maturity Gate&lt;/h2&gt; 
&lt;p&gt;Configuration maturity splits at audit execution:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Does the system satisfy safety requirements?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Is audit frequency defined?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Is audit ownership assigned?&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Is failure verification performed per module?&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1&gt;4. Three Core Operating Principles for Success&lt;/h1&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Execution fails if attempting perfection too early.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Configuration fails if owned by only one person.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Documents must update when reality updates.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Following these principles automatically prepares teams for version history control → traceability → ISO audit readiness.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1&gt;5. Why Organizations Trust Configuration Management from Hermes Solution&lt;/h1&gt; 
&lt;p&gt;Expertise from Hermes Solution comes from over 10+ years and 100+ successful ISO consulting and project experiences across multiple industries.&lt;/p&gt; 
&lt;p&gt;Industry-specific configuration strategies for:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Automotive (ISO 26262)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Aviation&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Semiconductor&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Industrial embedded systems&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;What Makes This Approach Different&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="919" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/Key-Elements-for-Effective-Project-Management-1-1024x919-1.png?width=1024&amp;amp;height=919&amp;amp;name=Key-Elements-for-Effective-Project-Management-1-1024x919-1.png" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Templates that can be applied instantly by practitioners&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;CCB process and configuration culture design included&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Document-driven trigger architecture&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Execution and documentation remain synchronized&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Supports baseline and change control flow design for real engineering teams&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Hermes Solution does not build document-only configuration.&lt;br&gt;It builds configuration where the document becomes the engineering trigger.&lt;/p&gt; 
&lt;h1&gt;6. Conclusion — Real Configuration Feels Different for Practitioners&lt;/h1&gt; 
&lt;p&gt;The 5-step method introduced here is not a theoretical document guide.&lt;br&gt;It is an execution-driven engineering reality guide.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Change immediately triggers request → safety impact analysis → agreement → implementation → verification → history.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Traceability originates from document architecture design.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Audits evaluate execution more than documentation review.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Success can be defined as:&lt;/p&gt; 
&lt;p&gt;Configuration that anyone can understand, apply, and trace back through history.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h1&gt;7. Ready to Start?&lt;/h1&gt; 
&lt;p&gt;Build configuration with a trigger-driven process structure together with Hermes Solution—not as separate document work and separate project execution work.&lt;/p&gt; 
&lt;p&gt;The next post will return with a document management process guide, following configuration management.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F12%2F02%2Fconfiguration-management-5-step-process-guide-for-engineers&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>change control board</category>
      <category>traceability matrix</category>
      <category>ISO 21434 safety</category>
      <category>baseline version control</category>
      <pubDate>Tue, 02 Dec 2025 03:01:33 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/12/02/configuration-management-5-step-process-guide-for-engineers</guid>
      <dc:date>2025-12-02T03:01:33Z</dc:date>
    </item>
    <item>
      <title>ISO Configuration Management Guide for Engineers: A Complete Roadmap</title>
      <link>https://blog.hermessol.com/en/2025/11/18/iso-configuration-management-roadmap</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/11/18/iso-configuration-management-roadmap?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/ISO-Configuration-Management-Roadmap-for-Engineers.png" alt="ISO Configuration Management Guide for Engineers: A Complete Roadmap" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h1&gt;ISO Configuration Management Guide for Engineers: A Complete Roadmap&lt;/h1&gt; 
&lt;p&gt;Hello, this is Hermes Solution.&lt;br&gt;Starting this week, we are launching a new series for engineers preparing for ISO certifications — a practical and easy-to-follow guide to Configuration Management (CM).&lt;/p&gt;</description>
      <content:encoded>&lt;h1&gt;ISO Configuration Management Guide for Engineers: A Complete Roadmap&lt;/h1&gt; 
&lt;p&gt;Hello, this is Hermes Solution.&lt;br&gt;Starting this week, we are launching a new series for engineers preparing for ISO certifications — a practical and easy-to-follow guide to Configuration Management (CM).&lt;/p&gt; 
&lt;p&gt;Configuration Management is a core requirement across major industry standards such as:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;ISO 26262 (Functional Safety)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ISO 42001 (AI Management System)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ISO/SAE 21434 (Automotive Cybersecurity)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ISO 9001 (Quality Management)&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;If you are new to ISO standards, you may often wonder:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;“What exactly is Configuration Management?”&lt;/em&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;“Isn’t it just version control using Git?”&lt;/em&gt;&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;This roadmap is designed to help beginners clearly understand Configuration Management from the ground up and apply it effectively in real engineering environments.&lt;/p&gt; 
&lt;h2&gt;1. Understanding the &lt;em&gt;Why&lt;/em&gt; Behind Configuration Management&lt;/h2&gt; 
&lt;p&gt;Configuration Management (CM) refers to the systematic control of changes to all components — including products, software, documents, and system elements.&lt;br&gt;Before learning the standards, it is crucial to understand &lt;em&gt;why&lt;/em&gt; such management is necessary.&lt;/p&gt; 
&lt;h3&gt;What Is Configuration Management?&lt;/h3&gt; 
&lt;p&gt;Let’s explain it with a simple analogy.&lt;/p&gt; 
&lt;p&gt;Imagine you are building a complex LEGO castle:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Recording which blocks are used → Configuration Identification&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Asking for approval before changing a block → Configuration Control&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Keeping track of who made what changes → Status Accounting&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Checking if the final castle matches the design → Configuration Audit&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Without CM, if 10 people freely modify the castle, the structure collapses — the same happens in software development.&lt;/p&gt; 
&lt;h3&gt;Real-World Software Example&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Developers modify files independently&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Testers use outdated versions&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;The team loses track of which version is deployed&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Such issues frequently lead to failures or safety incidents.&lt;br&gt;With proper CM, organizations maintain stability, traceability, and quality consistency.&lt;/p&gt; 
&lt;h2&gt;2. Configuration Management vs Version Control: Key Differences&lt;/h2&gt; 
&lt;p&gt;Many engineers assume CM and version control are the same, but they serve different purposes.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Category&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Version Control&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Configuration Management&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Scope&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Individual files&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Entire system configuration&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Focus&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Tracking change history&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Managing relationships among elements&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Tools&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Git, SVN&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Jira, Confluence, ALM systems&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Examples&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Document v1.0 → v1.1&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Requirement → Design → Code → Test traceability&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/p&gt; 
&lt;p&gt;Version control manages file revisions.&lt;br&gt;Configuration Management manages the entire lifecycle flow, including changes, approvals (CCB), baselines, and traceability.&lt;/p&gt; 
&lt;p&gt;In simple terms:&lt;br&gt;Version control is part of CM, while CM is a broader discipline that ensures product integrity across the entire development lifecycle.&lt;/p&gt; 
&lt;h2&gt;3. Essential Terminology in Configuration Management&lt;/h2&gt; 
&lt;p&gt;For beginners, these foundational CM terms are important:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Configuration Item (CI): Any managed artifact (documents, software, components)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Baseline: An approved reference version&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;CCB (Configuration Control Board): The group that reviews and approves changes&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Traceability: Linking requirements, design, code, and tests&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Change Request (CR): A formal request to update a configuration item&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h2&gt;4. Why Configuration Management Matters: The Toyota Recall Case&lt;/h2&gt; 
&lt;p&gt;A well-known example shows how CM failures lead to massive risks.&lt;/p&gt; 
&lt;h3&gt;Toyota Unintended Acceleration Incident&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Millions of vehicles recalled&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Severe financial losses and global brand damage&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;NASA’s investigation found software issues and a major lack of CM, including:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;No clear record of software versions installed in each vehicle&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;No ability to trace change history&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Difficulty identifying configuration of affected vehicles&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;If Proper CM Had Been Implemented:&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Faulty software version identified immediately&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Only affected vehicles would be recalled&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Costs could have dropped from trillions of won to mere billions&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Configuration Management is not “just documentation”—&lt;br&gt;it is essential for safety, risk management, and product reliability.&lt;/p&gt; 
&lt;h2&gt;5. The Four Core Activities of Configuration Management&lt;/h2&gt; 
&lt;p&gt;According to ISO 10007 and ISO 26262, CM consists of four main activities.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="731" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/Configuration-Management-Process-1024x731.png?width=1024&amp;amp;height=731&amp;amp;name=Configuration-Management-Process-1024x731.png" alt=""&gt; &lt;/p&gt; 
&lt;h3&gt;1) Configuration Identification&lt;/h3&gt; 
&lt;p&gt;Defines what needs to be managed&lt;br&gt;(including CI selection, naming rules, and baseline setup)&lt;/p&gt; 
&lt;h3&gt;2) Configuration Control&lt;/h3&gt; 
&lt;p&gt;Ensures only approved changes are applied&lt;br&gt;(Flow: CR → Impact Analysis → CCB Approval → Implementation → Verification → Baseline Update)&lt;/p&gt; 
&lt;h3&gt;3) Status Accounting&lt;/h3&gt; 
&lt;p&gt;Tracks real-time configuration status&lt;br&gt;(Which version is deployed? Where? When?)&lt;/p&gt; 
&lt;h3&gt;4) Configuration Audit&lt;/h3&gt; 
&lt;p&gt;Checks whether CM processes are followed and outputs match approved baselines&lt;/p&gt; 
&lt;h2&gt;6. Tools Used in Modern CM Practices&lt;/h2&gt; 
&lt;p&gt;Understanding CM tools is essential for practical implementation.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Git / SVN – version control&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Jira / Confluence – change management &amp;amp; documentation&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ALM tools (Polarion, Jama, DOORS) – requirements &amp;amp; traceability&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Notion – collaborative document management&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These tools help automate traceability, document control, and baseline management.&lt;/p&gt; 
&lt;h2&gt;7. Benefits of Strong Configuration Management&lt;/h2&gt; 
&lt;p&gt;Effective CM leads to:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Easier ISO certification&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Higher development efficiency&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Fewer defects and quality issues&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Improved team collaboration&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Greater customer trust&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Reduced risk exposure&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;More predictable product releases&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;As technologies evolve — autonomous driving, AI systems, smart factories — CM is becoming a mandatory capability, not an optional one.&lt;/p&gt; 
&lt;h2&gt;8. Configuration Management Roadmap Summary&lt;/h2&gt; 
&lt;p&gt; &lt;img width="1024" height="793" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/Achievement-of-AIMS-Certification-1024x793.png?width=1024&amp;amp;height=793&amp;amp;name=Achievement-of-AIMS-Certification-1024x793.png" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;Step 1: Understand core concepts&lt;br&gt;Step 2: Learn the four CM activities deeply&lt;br&gt;Step 3: Apply CM using tools and real workflows&lt;/p&gt; 
&lt;p&gt;Mastering CM makes ISO certification significantly easier.&lt;/p&gt; 
&lt;h2&gt;Why Choose Hermes Solution?&lt;/h2&gt; 
&lt;p&gt;Many companies provide ISO consulting — but Hermes Solution offers real, operational CM systems, not just documentation.&lt;/p&gt; 
&lt;h3&gt;1) We Build &lt;em&gt;Executable&lt;/em&gt;, Not Theoretical Systems&lt;/h3&gt; 
&lt;p&gt;Most consultants deliver documents that aren’t used.&lt;br&gt;We design processes that developers, QA engineers, and PMs can actually apply daily.&lt;/p&gt; 
&lt;h3&gt;2) Deep Experience Across Automotive, Semiconductor, and AI Industries&lt;/h3&gt; 
&lt;p&gt;Our team has real field experience in highly regulated industries,&lt;br&gt;so we provide solutions that work in real engineering environments.&lt;/p&gt; 
&lt;h3&gt;3) Cross-Domain Expertise (ISO 26262 + 42001 + 21434 + ASPICE)&lt;/h3&gt; 
&lt;p&gt; &lt;img width="936" height="561" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/all-in-one-1.png?width=936&amp;amp;height=561&amp;amp;name=all-in-one-1.png" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;Modern development requires integrated governance across safety, AI, cybersecurity, and quality.&lt;br&gt;Hermes Solution is one of the few firms that can support all these domains together.&lt;/p&gt; 
&lt;h3&gt;4) Designed for Certification &lt;em&gt;and&lt;/em&gt; Re-Certification&lt;/h3&gt; 
&lt;p&gt;Many companies struggle when re-certification comes.&lt;br&gt;We build systems that function independently within your organization long-term.&lt;/p&gt; 
&lt;h3&gt;5) Education + Consulting + Tool Integration (All-in-One)&lt;/h3&gt; 
&lt;p&gt;ISO compliance requires people (training) + process (procedures) + tools (systems).&lt;br&gt;Hermes Solution provides all three in a unified approach.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F11%2F18%2Fiso-configuration-management-roadmap&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>ISO configuration management</category>
      <category>ISO standards</category>
      <category>traceability</category>
      <category>CCB</category>
      <category>ISO 42001</category>
      <pubDate>Tue, 18 Nov 2025 07:55:23 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/11/18/iso-configuration-management-roadmap</guid>
      <dc:date>2025-11-18T07:55:23Z</dc:date>
    </item>
    <item>
      <title>Why Automotive Suppliers Should Prepare for ISO/IEC 42001 Certification Now</title>
      <link>https://blog.hermessol.com/en/2025/10/31/iso-iec-42001-certification-automotive-suppliers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/10/31/iso-iec-42001-certification-automotive-suppliers?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Prepare_for_ISOIEC42001_Certification_Now.png" alt="Why Automotive Suppliers Should Prepare for ISO/IEC 42001 Certification Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;“In December 2023, the global AI industry reached a turning point with the publication of ISO/IEC 42001 certification, the world’s first AI management system standard. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) officially published ISO/IEC 42001:2023, the world’s first &lt;em&gt;AI Management System (AIMS)&lt;/em&gt; standard. Many global companies have already obtained the certification, and tech giants like Microsoft and AWS have begun requiring their suppliers to comply.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;“In December 2023, the global AI industry reached a turning point with the publication of ISO/IEC 42001 certification, the world’s first AI management system standard. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) officially published ISO/IEC 42001:2023, the world’s first &lt;em&gt;AI Management System (AIMS)&lt;/em&gt; standard. Many global companies have already obtained the certification, and tech giants like Microsoft and AWS have begun requiring their suppliers to comply.&lt;/p&gt; 
&lt;p&gt;For automotive suppliers, this development is more than a formality. With 67% of automakers already integrating AI into their supply chains, OEMs are increasingly demanding that their partners demonstrate strong AI governance capabilities. ISO 42001 certification is no longer just a certificate — it is becoming a core competitive advantage for survival in the global automotive industry.&lt;/p&gt; 
&lt;h3&gt;What Exactly Is ISO/IEC 42001?&lt;/h3&gt; 
&lt;p&gt;ISO 42001 is an international management system standard designed to ensure the responsible development and operation of AI systems. Jointly developed by ISO and IEC, it can be applied to any organization that designs, develops, or uses AI — across all industries.&lt;/p&gt; 
&lt;p&gt;Unlike general management standards such as ISO 9001 (quality) or ISO 27001 (information security), ISO 42001 addresses AI-specific challenges: algorithmic bias, transparency and explainability, data quality and privacy, safety of continuously learning systems, and accountability for automated decisions.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="497" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/251004_01-1024x497-1.png?width=1024&amp;amp;height=497&amp;amp;name=251004_01-1024x497-1.png" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;The standard follows a clear 10-clause structure — from understanding organizational context and leadership to planning, support, operation, performance evaluation, and continual improvement. Annex A includes 38–39 concrete control measures covering data management, AI lifecycle, transparency, human oversight, and bias mitigation.&lt;/p&gt; 
&lt;p&gt;A full certification process typically takes 6–12 months: starting with a gap analysis and AI risk assessment, followed by policy development, internal audits, and a two-stage external audit. The certificate is valid for three years, with annual surveillance audits.&lt;/p&gt; 
&lt;p&gt;Importantly, ISO 42001 integrates seamlessly with existing management systems. Automotive suppliers already certified under IATF 16949 or ISO 9001 will find it efficient to align processes, as all these standards share the &lt;em&gt;Annex SL High-Level Structure (HLS)&lt;/em&gt; framework.&lt;/p&gt; 
&lt;h3&gt;How AI Is Transforming the Automotive Industry&lt;/h3&gt; 
&lt;p&gt;AI has already become an integral part of the automotive value chain.&lt;/p&gt; 
&lt;p&gt;The global AI-in-supply-chain market reached $7.1 billion in 2024, and is projected to surpass $190 billion by 2034, with the automotive sector accounting for about 18%.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="503" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/How-AI-Is-Transforming-the-Automotive-Industry_01-1024x503.png?width=1024&amp;amp;height=503&amp;amp;name=How-AI-Is-Transforming-the-Automotive-Industry_01-1024x503.png" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Quality Control: Audi uses machine-learning systems to detect micro-cracks in body panels, while Volvo Trucks partnered with SAS to cut diagnostic time by 70% and repair time by 25%.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Predictive Maintenance: BMW’s Regensburg plant uses AI to prevent over 500 minutes of assembly-line downtime annually; McKinsey reports predictive maintenance can reduce downtime by 30–50%.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Supply Chain Optimization: Toyota’s collaboration with Google Cloud saved 10,000 manual hours per year, achieving 15% lower logistics cost, 35% less inventory, and 65% higher service levels.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;However, risks are escalating too. In 2024 alone, 409 automotive cybersecurity incidents were reported — 60% affecting millions of vehicles. With autonomous and connected vehicles generating up to 25 GB of data per hour, privacy and security risks are rapidly increasing.&lt;/p&gt; 
&lt;p&gt;OEMs are also reshaping supplier expectations. Renault’s AI-based digital-twin supply chain shortened its EV Twingo development cycle to 100 weeks — nearly half the previous timeline — setting new standards for supplier innovation.&lt;/p&gt; 
&lt;p&gt;Regulations are tightening as well. The EU AI Act will take effect in 2025, with high-risk AI system provisions enforced by 2027. The U.S. is expanding state-level AI laws, and major Asian economies, including Korea, are establishing their own AI governance frameworks.&lt;/p&gt; 
&lt;h3&gt;Why ISO/IEC 42001 Matters for Automotive Suppliers&lt;/h3&gt; 
&lt;p&gt;The automotive sector is fundamentally about safety — and AI malfunctions can cause not just quality issues, but life-threatening incidents. Modern vehicles contain over 100 million lines of code, four times that of an F-35 fighter jet. Ensuring transparency and reliability in AI-driven decision-making is now mandatory, not optional.&lt;/p&gt; 
&lt;p&gt;Complex supply chains further amplify this need. Tier 1–3 suppliers are tightly interconnected, and even a single faulty component can disrupt entire vehicle production. Every minute of line downtime costs roughly $5,000. ISO 42001 helps maintain consistent AI governance across such complex networks.&lt;/p&gt; 
&lt;p&gt;Customer requirements are also shifting fast. Microsoft’s SSPA v10 program mandates ISO 42001 certification for sensitive AI systems, and by 2028, 60% of regulated-industry AI contracts are expected to require governance certification. Companies like Synthesia — a supplier to 70% of Fortune 100 firms — have already achieved certification for that reason.&lt;/p&gt; 
&lt;p&gt;ISO 42001 also strengthens legal accountability and compliance by establishing traceable audit mechanisms that clarify responsibility for AI-based decisions. It aligns naturally with EU AI Act, ISO/SAE 21434 (cybersecurity), and ISO 26262 (functional safety).&lt;/p&gt; 
&lt;p&gt;Because it follows the same structural foundation as IATF 16949 and ISO 9001, integration is straightforward — minimizing redundancy and audit burdens while enhancing efficiency.&lt;/p&gt; 
&lt;p&gt;Most importantly, it delivers a competitive edge: early adopters achieve 35% higher contract-win rates, stronger OEM trust, and smoother global market access.&lt;/p&gt; 
&lt;h3&gt;Business Value of ISO/IEC 42001 Certification&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="322" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/Benefits-of-AI-Authentication-1-1024x322.png?width=1024&amp;amp;height=322&amp;amp;name=Benefits-of-AI-Authentication-1-1024x322.png" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Trust &amp;amp; Reputation: Certified organizations report a 34% boost in consumer trust and 29% improvement in brand reputation — directly increasing client acquisition and deal success.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Cost Savings &amp;amp; ROI: Reduced recall and breach risk saves millions; typical ROI is achieved within 12–18 months. Deloitte estimates AI-driven quality management alone can save £200 million per year.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Market Access: Certified firms gain preferential status with OEMs and major tech partners like Microsoft, AWS, Google Cloud, and Synthesia.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Operational Efficiency: Standardized risk management reduces project uncertainty and accelerates product launches.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ESG &amp;amp; Talent Attraction: Certification demonstrates ethical AI leadership, appealing to ESG-minded investors and skilled professionals — as 83% of corporate boards now discuss AI risk directly.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Global Leaders Already Certified&lt;/h3&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Synthesia – First AI video company certified (Sep 2024); achieved major growth in trust and media visibility.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ORO Labs – First certified procurement platform; featured in the Gartner Hype Cycle.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;AWS / Microsoft / Google Cloud – Applied ISO 42001 to core AI services (Bedrock, Copilot, Gemini), setting new industry standards.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;AI Clearing / OrionStar Robotics – Manufacturers integrating ISO 42001 with ISO 9001, 27001, and 45001 for unified management systems.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The automotive parts industry is the next frontier. ISO and major certification bodies already include smart-factory, predictive-maintenance, and AI-based quality-control systems within their audit scopes.&lt;/p&gt; 
&lt;h3&gt;Why Now Is the Time to Act&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="574" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/251004_ISO42001_blog-1024x574.jpg?width=1024&amp;amp;height=574&amp;amp;name=251004_ISO42001_blog-1024x574.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;AI is no longer a future technology — it is today’s determinant of manufacturing competitiveness. By 2025, 96% of global manufacturers plan to expand AI investment, and 76% intend to undergo AI audits or certification within two years.&lt;/p&gt; 
&lt;p&gt;ISO 42001 is emerging not just as a compliance requirement but as a &lt;em&gt;strategic language of competitiveness in the AI era.&lt;/em&gt; Certified companies report 35% higher contract success, 12–18-month ROI, and multi-million-dollar risk reduction. Above all, clients and partners are beginning to trust responsibly managed AI.&lt;/p&gt; 
&lt;p&gt;Global leaders — Microsoft, AWS, Google Cloud, Synthesia, ORO Labs — are already setting the bar, and OEMs are extending those expectations to their suppliers. By 2028, certification will be a standard prerequisite for most AI-related contracts in regulated sectors.&lt;/p&gt; 
&lt;p&gt;For automotive suppliers, the choice is clear:&lt;br&gt;Adopt ISO 42001 now and lead as an early mover — or lag behind under customer pressure later. Establishing an AI inventory, performing gap analysis, and implementing a governance roadmap over the next 6–12 months will define your competitiveness for the next decade.&lt;/p&gt; 
&lt;p&gt;If IATF 16949 and ISO 9001 laid the foundation for quality, ISO/IEC 42001 now defines the future of AI governance.&lt;br&gt;Technology evolves rapidly — but the demand for responsible and transparent AI does not.&lt;/p&gt; 
&lt;p&gt;Begin that transformation with Hermes Solution today.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F10%2F31%2Fiso-iec-42001-certification-automotive-suppliers&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>EU AI Act</category>
      <category>AI compliance</category>
      <pubDate>Fri, 31 Oct 2025 06:07:30 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/10/31/iso-iec-42001-certification-automotive-suppliers</guid>
      <dc:date>2025-10-31T06:07:30Z</dc:date>
    </item>
    <item>
      <title>The The Two Pillars of Automotive Safety: How ISO/SAE 21434 Threats Link to ISO 26262 Hazard</title>
      <link>https://blog.hermessol.com/en/2025/10/23/the-two-pillars-of-automotive-safety-how-iso-sae-21434-threats-link-to-iso-26262-hazard</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/10/23/the-two-pillars-of-automotive-safety-how-iso-sae-21434-threats-link-to-iso-26262-hazard?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Two_Pillars_of_Automotive_Safety_Threats_and_Hazards_ISO21434_ISO26262.png" alt="The The Two Pillars of Automotive Safety: How ISO/SAE 21434 Threats Link to ISO 26262 Hazard" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, this is Hermes Solution.&lt;br&gt;This week’s blog explores the two core pillars of automotive safety: cybersecurity (ISO/SAE 21434) and functional safety (ISO 26262).&lt;br&gt;In today’s automotive industry, cybersecurity and functional safety can no longer be treated as separate disciplines. As vehicles become increasingly connected and autonomous, cyberattacks are evolving from simple data breaches into direct threats to human life.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Hello, this is Hermes Solution.&lt;br&gt;This week’s blog explores the two core pillars of automotive safety: cybersecurity (ISO/SAE 21434) and functional safety (ISO 26262).&lt;br&gt;In today’s automotive industry, cybersecurity and functional safety can no longer be treated as separate disciplines. As vehicles become increasingly connected and autonomous, cyberattacks are evolving from simple data breaches into direct threats to human life.&lt;/p&gt; 
&lt;p&gt;As of 2024, more than 95% of vehicle cyberattacks are executed remotely, revealing a new class of risks introduced by connectivity and wireless interfaces.&lt;/p&gt; 
&lt;p&gt;This article explains how “Threats” (under ISO/SAE 21434) and “Hazards” (under ISO 26262) are interrelated and why both standards must be addressed together throughout the vehicle development lifecycle.&lt;/p&gt; 
&lt;h3&gt;ISO/SAE 21434: Understanding “Threats” from a Cybersecurity Perspective&lt;/h3&gt; 
&lt;p&gt;ISO/SAE 21434 defines the automotive cybersecurity management framework across the entire vehicle lifecycle—from concept and design to production, operation, and decommissioning.&lt;/p&gt; 
&lt;p&gt;A Threat is defined as a &lt;em&gt;potential malicious act&lt;/em&gt; that could cause harm to a system or organization.&lt;br&gt;For example, if an attacker infiltrates an ECU (Electronic Control Unit) or communication channel and manipulates data or injects false control commands, they could directly influence steering or braking functions—transforming a cybersecurity issue into a safety incident.&lt;/p&gt; 
&lt;h4&gt;Core Elements of a Cybersecurity Threat&lt;/h4&gt; 
&lt;p&gt; &lt;img width="1024" height="853" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/cybersecurity-threat-analysis_eng-1024x853-1.png?width=1024&amp;amp;height=853&amp;amp;name=cybersecurity-threat-analysis_eng-1024x853-1.png" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Intentionality: The threat originates from a deliberate, malicious human act—not accidental system failure.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Attack Path: The route an attacker takes to reach the target system.&lt;br&gt;&lt;em&gt;Example: External Network → Gateway ECU → Internal CAN Bus → Braking ECU&lt;/em&gt;&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Attack Feasibility: Difficulty of execution based on required time, skill, equipment, and access.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Asset: Anything that must be protected, such as ECUs, communication channels, encryption keys, or firmware code.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Vulnerability: Weaknesses that an attacker could exploit, such as poor encryption, faulty authentication, or open ports.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;ISO/SAE 21434 evaluates threats based on the CIA Triad:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;Confidentiality&lt;/em&gt; – Prevent unauthorized data access&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;Integrity&lt;/em&gt; – Ensure data and functions cannot be modified arbitrarily&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;Availability&lt;/em&gt; – Ensure the system operates when needed&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The required protection level is expressed as CAL (Cybersecurity Assurance Level, 1–4):&lt;/p&gt; 
&lt;table style="height: 518px;" width="468"&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Level&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Risk Level&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Assurance Level&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Typical Security Measures&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Example Systems&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CAL &lt;br&gt;1&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Low&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Basic protection&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Access control, basic authentication&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Infotainment, diagnostic ports&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CAL 2&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Medium&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Standard protection&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Encrypted communication, logging, user authentication&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;OBD interface, vehicle gateway&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CAL 3&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;High&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Advanced protection&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Intrusion detection, integrity checks&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;ECU-to-ECU communication, OTA update system&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CAL 4&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Very High&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Multi-layered defense&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;HSM, key protection, intrusion prevention&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Braking/steering ECUs, ADAS control systems&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;h3&gt;ISO 26262: Understanding “Hazards” from a Functional Safety Perspective&lt;/h3&gt; 
&lt;p&gt;ISO 26262 addresses risks caused by malfunctioning E/E systems in vehicles.&lt;br&gt;A Hazard refers to a &lt;em&gt;potential source of harm&lt;/em&gt; resulting from system malfunction or random hardware/software failure.&lt;/p&gt; 
&lt;p&gt;While cyberattacks are intentional, hazards are unintentional—arising from faults such as sensor failure, logic errors, or unstable power supply.&lt;/p&gt; 
&lt;h4&gt;HARA: Hazard Analysis and Risk Assessment&lt;/h4&gt; 
&lt;p&gt;ISO 26262 uses three key parameters:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Severity (S): Potential level of harm&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Exposure (E): Likelihood of encountering the situation&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Controllability (C): Driver’s ability to control or mitigate the situation&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Combining these factors yields the ASIL (Automotive Safety Integrity Level), ranging from A to D, with D representing the highest integrity level.&lt;br&gt;Example: Brake failure at highway speed → ASIL D&lt;/p&gt; 
&lt;h4&gt;Fundamental Differences Between Threats and Hazards&lt;/h4&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Aspect&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;ISO/SAE 21434 (Threat)&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;ISO 26262 (Hazard)&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Cause&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Intentional malicious attack&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Random system fault&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Nature of Risk&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Adaptive adversary&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Statistically predictable failure&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Assessment&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;TARA (Impact × Attack Feasibility)&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;HARA (Severity × Exposure × Controllability)&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Integrity Level&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CAL 1–4&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;ASIL A–D&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Time Dynamics&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Continuously evolving&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Relatively static&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Focus&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Unknown, emerging attacks&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Known failure modes&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp; &lt;/p&gt; 
&lt;p&gt;In essence, Threats intentionally disrupt system operation, while Hazards result from unintentional malfunctions.&lt;br&gt;However, they are not independent—a cyber threat can become a safety hazard.&lt;/p&gt; 
&lt;h4&gt;How a Threat Becomes a Hazard&lt;/h4&gt; 
&lt;p&gt;Modern research confirms that cyberattacks can trigger safety incidents:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Sensor Data Manipulation: Tampering with radar or camera signals leads to misperception and potential collision.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ECU Control Override: Attackers inject commands that alter braking or steering behavior.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Communication Interference: Disruption of V2V messages causes cooperative driving systems to malfunction.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These cybersecurity threats can escalate into functional safety hazards under ISO 26262, posing immediate physical risks.&lt;/p&gt; 
&lt;h4&gt;Real-World Example: Remote Brake System Attack&lt;/h4&gt; 
&lt;p&gt;In a controlled test, researchers exploited vulnerabilities in a telematics ECU via a 5G network, gaining access to the in-vehicle CAN bus.&lt;br&gt;They successfully sent forged braking commands, causing the car to stop abruptly without driver input.&lt;/p&gt; 
&lt;p&gt;Assessment by Standards:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Attack Feasibility: &lt;em&gt;Medium&lt;/em&gt; (Skilled attacker within ~1 month effort)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Severity (S): S3 – Life-threatening potential&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Exposure (E): E4 – Highway driving is common&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Controllability (C): C3 – Driver cannot react&lt;br&gt;→ ASIL D&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;This experiment demonstrates how a single cybersecurity breach can directly lead to a functional safety failure—proving that security equals safety.&lt;/p&gt; 
&lt;h4&gt;Comparing TARA and HARA Methodologies&lt;/h4&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Item&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;TARA (ISO/SAE 21434)&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;HARA (ISO 26262)&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Target&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Cyber threats&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;System malfunctions&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Key Factors&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Impact × Attack Feasibility&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Severity × Exposure × Controllability&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Outcome&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Cybersecurity goals + CAL&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Safety goals + ASIL&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Frequency&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Continuous (upon new vulnerabilities)&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Event-driven (upon design changes)&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Evaluation&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Semi-quantitative&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Qualitative&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp; &lt;/p&gt; 
&lt;p&gt;Both are preventive analyses—TARA anticipates human-driven attacks, whereas HARA models system-driven failures.&lt;/p&gt; 
&lt;h4&gt;Toward Integration: The Rise of HATARA&lt;/h4&gt; 
&lt;p&gt;The industry is now embracing HATARA—an integrated approach combining HARA + TARA to jointly evaluate threats and hazards within one framework.&lt;br&gt;This unified process aligns ASIL and CAL levels for consistent risk management.&lt;/p&gt; 
&lt;p&gt;Advantages:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Eliminates duplicate analysis&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Ensures consistency between safety and security requirements&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Reduces project cost and lead time&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Enables holistic system-level risk control&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Conclusion: Safety and Security Must Converge&lt;/h4&gt; 
&lt;p&gt; &lt;img width="1024" height="585" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/cybersecurity-1024x585-1.jpg?width=1024&amp;amp;height=585&amp;amp;name=cybersecurity-1024x585-1.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;Modern vehicles are software-defined, network-connected systems, making isolated management of safety and security impossible.&lt;br&gt;A security breach can instantly create a safety risk, merging the two domains in practice and lifecycle management.&lt;/p&gt; 
&lt;p&gt;The automotive industry is already adopting HATARA and STPA-SafeSec methodologies to unify these disciplines.&lt;br&gt;Ultimately, the ability to integrate ISO/SAE 21434 and ISO 26262 will determine the reliability and trustworthiness of future mobility systems.&lt;/p&gt; 
&lt;h4&gt;Key Takeaways&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;em&gt;Cybersecurity threats&lt;/em&gt; are intentional; &lt;em&gt;functional safety hazards&lt;/em&gt; are unintentional.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;In reality, a single threat can evolve into a hazard.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;ISO/SAE 21434 and ISO 26262 must be implemented in tandem.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;HATARA will likely become the industry’s de facto standard.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Safety without security is impossible.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;This article was prepared by Hermes Solution to emphasize the importance of integrated automotive safety and cybersecurity management.&lt;br&gt;Hermes continues to provide expert insights on ISO/SAE 21434, ISO 26262, and AI-driven vehicle safety systems.&lt;br&gt;Design the future of safe mobility with Hermes.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F10%2F23%2Fthe-two-pillars-of-automotive-safety-how-iso-sae-21434-threats-link-to-iso-26262-hazard&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>automotive safety</category>
      <category>automotive standards</category>
      <pubDate>Thu, 23 Oct 2025 02:13:01 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/10/23/the-two-pillars-of-automotive-safety-how-iso-sae-21434-threats-link-to-iso-26262-hazard</guid>
      <dc:date>2025-10-23T02:13:01Z</dc:date>
    </item>
    <item>
      <title>Functional Safety and Cybersecurity in Autonomous Ships</title>
      <link>https://blog.hermessol.com/en/2025/09/12/functional-safety-cybersecurity-autonomous-ships</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/09/12/functional-safety-cybersecurity-autonomous-ships?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Why-Are-Functional-Safety-and-Cybersecurity-the-Twin-Engines-of-Autonomous-Ships.png" alt="Functional Safety and Cybersecurity in Autonomous Ships" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Autonomous Shipping Revolution: Are We Truly Ready?&lt;/h2&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;Functional safety and cybersecurity in autonomous ships are no longer optional—they are the foundation of the autonomous shipping revolution.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Autonomous ships are no longer science fiction.&lt;br&gt;Japan plans to deploy 250 AI-powered cargo vessels by 2025, while China has positioned smart ships as a core of its “Made in China 2025” strategy.&lt;br&gt;Global players such as Rolls-Royce, Kongsberg, and Google are leading commercial unmanned-ship projects, and Korean giants HD Hyundai and Samsung Heavy Industries are accelerating development of autonomous navigation solutions and even unmanned combat ships.&lt;/p&gt; 
&lt;p&gt;This technology promises dramatic cost savings, higher efficiency, and fewer human errors.&lt;br&gt;Analysts estimate that an autonomous ship can save about USD 7 million in crew and fuel costs over a 25-year life cycle.&lt;br&gt;Yet the real question remains:&lt;/p&gt; 
&lt;p&gt;“Can we prove that a vessel will stay safe and secure under the harshest, most unpredictable conditions?”&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The Role of Functional Safety and Cybersecurity in Autonomous Ships&lt;/h2&gt; 
&lt;h3&gt;Two Pillars: Functional Safety and Cybersecurity&lt;/h3&gt; 
&lt;p&gt;To answer this question, we must understand two interdependent concepts.&lt;/p&gt; 
&lt;h3&gt;Functional Safety&lt;/h3&gt; 
&lt;p&gt;A commitment that a system will operate as intended—even during malfunctions or unforeseen events—so that catastrophic accidents are prevented.&lt;/p&gt; 
&lt;h3&gt;Cybersecurity&lt;/h3&gt; 
&lt;p&gt;The ability to stop external attackers from hijacking or manipulating a system to force dangerous actions.&lt;/p&gt; 
&lt;p&gt;These are not separate concerns. Functional safety and cybersecurity are the twin pillars that support the survival, legal defensibility, and public acceptance of autonomous shipping.&lt;br&gt;If one collapses, the other quickly follows.&lt;/p&gt; 
&lt;h3&gt;Why It Matters Now&lt;/h3&gt; 
&lt;p&gt;Many companies are racing to market, placing speed ahead of safety and security.&lt;br&gt;History shows the danger: in the early IoT era, security was an afterthought, leading to costly failures.&lt;br&gt;With billions of dollars in assets—and lives—at stake, designing for functional safety and cybersecurity from day one is the only path to sustainable innovation.&lt;/p&gt; 
&lt;h3&gt;First Pillar: Functional Safety in a Crew-Free World&lt;/h3&gt; 
&lt;p&gt;Functional safety is not just about smooth sailing on calm seas.&lt;br&gt;The true test is whether a vessel can withstand internal faults or environmental failures—even without malicious attacks.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Example:&lt;/em&gt;&lt;br&gt;An autonomous ship performing a complex port-docking maneuver suddenly loses satellite communication with its shore control center.&lt;br&gt;The vessel cannot simply stop. To avoid collisions, it must follow a pre-defined fail-safe protocol and autonomously reach a safe position.&lt;br&gt;Because external rescue is slow at sea, self-directed safety measures are critical.&lt;/p&gt; 
&lt;p&gt;Another scenario: heavy fog degrades LiDAR sensors, GPS signals drop out, and radar data conflicts with electronic chart information.&lt;br&gt;A human navigator would cross-check data and choose the best action.&lt;br&gt;An autonomous system must achieve the same resilience through advanced sensor-fusion algorithms, preventing either decision paralysis or catastrophic choices based on corrupted inputs.&lt;/p&gt; 
&lt;p&gt;The global standard IEC 61508 provides a structured answer.&lt;br&gt;It requires identifying every potential hazard early in development, assigning quantitative Safety Integrity Levels (SILs), and enforcing rigorous design and validation so a company can confidently state:&lt;br&gt;“Our system meets internationally certified SIL 3 safety.”&lt;/p&gt; 
&lt;h3&gt;Second Pillar: Expanding Cyber Threat Surface&lt;/h3&gt; 
&lt;p&gt;Modern vessels are floating data centers where IT and OT (operational technology) systems converge.&lt;br&gt;High-speed satellite links and marine LTE keep ships permanently connected—creating an irresistible target for cyber criminals and state-sponsored attackers.&lt;/p&gt; 
&lt;p&gt;Among many threats, GPS spoofing is especially dangerous:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;MSC ANTONIA Grounding (May 2025):&lt;br&gt;Near Jeddah, Saudi Arabia, a massive container ship ran aground.&lt;br&gt;Analysts traced the likely cause to GPS spoofing, where average false-position “jumps” skyrocketed from 600 km in late 2024 to 6,300 km in early 2025.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Persian Gulf Tanker Collision (June 2025):&lt;br&gt;Two tankers collided and caught fire. AIS records showed one vessel “sailing” across impossible inland terrain—another clear sign of GPS manipulation.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These incidents prove that data manipulation—not data theft—is the gravest threat.&lt;br&gt;Hackers need not break into navigation controls; altering the external data that autonomous algorithms trust is enough to steer a ship onto rocks while the system believes it is acting safely.&lt;/p&gt; 
&lt;p&gt;The international IEC 62443 standard provides the cybersecurity blueprint.&lt;br&gt;It applies Defense-in-Depth architecture, segmenting systems into logical zones and conduits so any breach remains contained.&lt;br&gt;It also mandates a Secure Development Lifecycle, embedding security from the earliest design stage.&lt;/p&gt; 
&lt;h3&gt;When Cybersecurity Failure Becomes a Safety Disaster&lt;/h3&gt; 
&lt;p&gt;Real-world accidents show that functional safety and cybersecurity are inseparable.&lt;br&gt;A single vulnerability can nullify years of safety engineering:&lt;br&gt;malware in the navigation system (cybersecurity failure) leads directly to a collision (functional-safety failure).&lt;/p&gt; 
&lt;p&gt;This reality demands a new paradigm: Digital Seaworthiness.&lt;br&gt;In the 21st century, a ship is truly seaworthy only when it can withstand both internal malfunctions and external cyber attacks.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Risk Category&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Conventional Ships&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Autonomous Ships&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Navigation Error&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Human fatigue, poor judgment&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Algorithm errors, corrupted sensor data, GPS spoofing&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;System Control&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Mechanical failure, operator mistake&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Remote hijacking, cascading software faults, IT/OT breaches&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Situational Awareness&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Bridge team observation, radar, VHF&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Sensor-fusion failure, lost communications, data-integrity attacks&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Security&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Piracy, stowaways, sabotage&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Ransomware, network intrusion, malicious data injection&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Core Weakness&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Human fallibility&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;System complexity and hyper-connectivity&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;h2&gt;How to Achieve Functional Safety and Cybersecurity in Autonomous Ships&lt;/h2&gt; 
&lt;h3&gt;Navigating the New Regulatory and Financial Seas&lt;/h3&gt; 
&lt;p&gt;Functional safety and cybersecurity are not just technical challenges—they are business imperatives shaped by regulation, insurance, and legal liability.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Regulatory Wave:&lt;br&gt;The International Maritime Organization (IMO) has set a clear roadmap for Maritime Autonomous Surface Ships (MASS):&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;ul&gt; 
 &lt;li&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;2025 – Voluntary code adopted&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;2032 – Mandatory code enters into force&lt;br&gt;The International Association of Classification Societies (IACS) already requires new builds to meet cybersecurity standards (UR E26/E27).&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Insurance and Liability:&lt;br&gt;When a crew-less ship causes an accident, who is responsible—owner, AI developer, remote-operation center, or sensor maker?&lt;br&gt;Insurers are becoming cautious and will demand objective proof of digital seaworthiness.&lt;br&gt;Vessels documented to meet IEC 61508 and IEC 62443 will obtain coverage at reasonable rates, while non-compliant ships risk denial or sky-high premiums.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;South Korea’s pending Autonomous Ship Development and Commercialization Act even proposes mandatory liability insurance and penalties for non-compliance.&lt;/p&gt; 
&lt;h3&gt;Strategic Investment for Competitive Advantage&lt;/h3&gt; 
&lt;p&gt;Proactive investment in functional safety and cybersecurity is not a cost—it is a competitive edge.&lt;br&gt;Companies that demonstrate digital seaworthiness will:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Win regulatory approvals faster&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Secure favorable insurance terms&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Earn the trust of cargo owners and the market&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Organizations that treat the IMO’s 2025 voluntary code as a de-facto design standard today will dominate the market as regulations tighten, while late adopters face expensive retrofits and legal fallout from the first major precedent-setting accidents.&lt;/p&gt; 
&lt;h3&gt;Securing a Safe and Secure Voyage&lt;/h3&gt; 
&lt;p&gt;The full potential of autonomous shipping becomes reality only when functional safety and cybersecurity are built in from the very start.&lt;br&gt;Speed of innovation alone will turn the future into a sandcastle.&lt;/p&gt; 
&lt;p&gt;The solution is a Safety-and-Security-by-Design approach—integrating both pillars into every phase:&lt;br&gt;concept design, software architecture, hardware selection, and operational protocols.&lt;/p&gt; 
&lt;p&gt;Standards IEC 61508 and IEC 62443 provide proven roadmaps not just for &lt;em&gt;what&lt;/em&gt; to implement, but &lt;em&gt;how&lt;/em&gt; to embed safety and security throughout development.&lt;/p&gt; 
&lt;p&gt;The challenges of the autonomous era are complex, but with the right expertise, strategic insight, and collaborative approach, they are solvable.&lt;br&gt;The goal is not to slow innovation but to enable resilient, sustainable innovation.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;To achieve true &lt;em&gt;Digital Seaworthiness&lt;/em&gt;, companies need new forms of partnership and leadership—combining maritime operations, cutting-edge technology, international regulation, and strategic risk management.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Are you ready to embark on this new era of shipping leadership—with Hermes Solution as your trusted partner?&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;Autonomous Shipping Revolution: Are We Truly Ready?&lt;/h2&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;Functional safety and cybersecurity in autonomous ships are no longer optional—they are the foundation of the autonomous shipping revolution.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Autonomous ships are no longer science fiction.&lt;br&gt;Japan plans to deploy 250 AI-powered cargo vessels by 2025, while China has positioned smart ships as a core of its “Made in China 2025” strategy.&lt;br&gt;Global players such as Rolls-Royce, Kongsberg, and Google are leading commercial unmanned-ship projects, and Korean giants HD Hyundai and Samsung Heavy Industries are accelerating development of autonomous navigation solutions and even unmanned combat ships.&lt;/p&gt; 
&lt;p&gt;This technology promises dramatic cost savings, higher efficiency, and fewer human errors.&lt;br&gt;Analysts estimate that an autonomous ship can save about USD 7 million in crew and fuel costs over a 25-year life cycle.&lt;br&gt;Yet the real question remains:&lt;/p&gt; 
&lt;p&gt;“Can we prove that a vessel will stay safe and secure under the harshest, most unpredictable conditions?”&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The Role of Functional Safety and Cybersecurity in Autonomous Ships&lt;/h2&gt; 
&lt;h3&gt;Two Pillars: Functional Safety and Cybersecurity&lt;/h3&gt; 
&lt;p&gt;To answer this question, we must understand two interdependent concepts.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="312" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Autonomous-ships_01-1.svg" alt=""&gt; &lt;/p&gt; 
&lt;h3&gt;Functional Safety&lt;/h3&gt; 
&lt;p&gt;A commitment that a system will operate as intended—even during malfunctions or unforeseen events—so that catastrophic accidents are prevented.&lt;/p&gt; 
&lt;h3&gt;Cybersecurity&lt;/h3&gt; 
&lt;p&gt;The ability to stop external attackers from hijacking or manipulating a system to force dangerous actions.&lt;/p&gt; 
&lt;p&gt;These are not separate concerns. Functional safety and cybersecurity are the twin pillars that support the survival, legal defensibility, and public acceptance of autonomous shipping.&lt;br&gt;If one collapses, the other quickly follows.&lt;/p&gt; 
&lt;h3&gt;Why It Matters Now&lt;/h3&gt; 
&lt;p&gt;Many companies are racing to market, placing speed ahead of safety and security.&lt;br&gt;History shows the danger: in the early IoT era, security was an afterthought, leading to costly failures.&lt;br&gt;With billions of dollars in assets—and lives—at stake, designing for functional safety and cybersecurity from day one is the only path to sustainable innovation.&lt;/p&gt; 
&lt;h3&gt;First Pillar: Functional Safety in a Crew-Free World&lt;/h3&gt; 
&lt;p&gt;Functional safety is not just about smooth sailing on calm seas.&lt;br&gt;The true test is whether a vessel can withstand internal faults or environmental failures—even without malicious attacks.&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;Example:&lt;/em&gt;&lt;br&gt;An autonomous ship performing a complex port-docking maneuver suddenly loses satellite communication with its shore control center.&lt;br&gt;The vessel cannot simply stop. To avoid collisions, it must follow a pre-defined fail-safe protocol and autonomously reach a safe position.&lt;br&gt;Because external rescue is slow at sea, self-directed safety measures are critical.&lt;/p&gt; 
&lt;p&gt;Another scenario: heavy fog degrades LiDAR sensors, GPS signals drop out, and radar data conflicts with electronic chart information.&lt;br&gt;A human navigator would cross-check data and choose the best action.&lt;br&gt;An autonomous system must achieve the same resilience through advanced sensor-fusion algorithms, preventing either decision paralysis or catastrophic choices based on corrupted inputs.&lt;/p&gt; 
&lt;p&gt;The global standard IEC 61508 provides a structured answer.&lt;br&gt;It requires identifying every potential hazard early in development, assigning quantitative Safety Integrity Levels (SILs), and enforcing rigorous design and validation so a company can confidently state:&lt;br&gt;“Our system meets internationally certified SIL 3 safety.”&lt;/p&gt; 
&lt;h3&gt;Second Pillar: Expanding Cyber Threat Surface&lt;/h3&gt; 
&lt;p&gt;Modern vessels are floating data centers where IT and OT (operational technology) systems converge.&lt;br&gt;High-speed satellite links and marine LTE keep ships permanently connected—creating an irresistible target for cyber criminals and state-sponsored attackers.&lt;/p&gt; 
&lt;p&gt;Among many threats, GPS spoofing is especially dangerous:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;MSC ANTONIA Grounding (May 2025):&lt;br&gt;Near Jeddah, Saudi Arabia, a massive container ship ran aground.&lt;br&gt;Analysts traced the likely cause to GPS spoofing, where average false-position “jumps” skyrocketed from 600 km in late 2024 to 6,300 km in early 2025.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Persian Gulf Tanker Collision (June 2025):&lt;br&gt;Two tankers collided and caught fire. AIS records showed one vessel “sailing” across impossible inland terrain—another clear sign of GPS manipulation.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;These incidents prove that data manipulation—not data theft—is the gravest threat.&lt;br&gt;Hackers need not break into navigation controls; altering the external data that autonomous algorithms trust is enough to steer a ship onto rocks while the system believes it is acting safely.&lt;/p&gt; 
&lt;p&gt;The international IEC 62443 standard provides the cybersecurity blueprint.&lt;br&gt;It applies Defense-in-Depth architecture, segmenting systems into logical zones and conduits so any breach remains contained.&lt;br&gt;It also mandates a Secure Development Lifecycle, embedding security from the earliest design stage.&lt;/p&gt; 
&lt;h3&gt;When Cybersecurity Failure Becomes a Safety Disaster&lt;/h3&gt; 
&lt;p&gt;Real-world accidents show that functional safety and cybersecurity are inseparable.&lt;br&gt;A single vulnerability can nullify years of safety engineering:&lt;br&gt;malware in the navigation system (cybersecurity failure) leads directly to a collision (functional-safety failure).&lt;/p&gt; 
&lt;p&gt;This reality demands a new paradigm: Digital Seaworthiness.&lt;br&gt;In the 21st century, a ship is truly seaworthy only when it can withstand both internal malfunctions and external cyber attacks.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Risk Category&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Conventional Ships&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Autonomous Ships&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Navigation Error&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Human fatigue, poor judgment&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Algorithm errors, corrupted sensor data, GPS spoofing&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;System Control&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Mechanical failure, operator mistake&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Remote hijacking, cascading software faults, IT/OT breaches&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Situational Awareness&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Bridge team observation, radar, VHF&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Sensor-fusion failure, lost communications, data-integrity attacks&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Security&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Piracy, stowaways, sabotage&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Ransomware, network intrusion, malicious data injection&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Core Weakness&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Human fallibility&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;System complexity and hyper-connectivity&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;h2&gt;How to Achieve Functional Safety and Cybersecurity in Autonomous Ships&lt;/h2&gt; 
&lt;h3&gt;Navigating the New Regulatory and Financial Seas&lt;/h3&gt; 
&lt;p&gt;Functional safety and cybersecurity are not just technical challenges—they are business imperatives shaped by regulation, insurance, and legal liability.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Regulatory Wave:&lt;br&gt;The International Maritime Organization (IMO) has set a clear roadmap for Maritime Autonomous Surface Ships (MASS):&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt; &lt;img width="649" height="668" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Navigating-the-New-Regulatory-and-Financial-Seas.svg" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;2025 – Voluntary code adopted&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;2032 – Mandatory code enters into force&lt;br&gt;The International Association of Classification Societies (IACS) already requires new builds to meet cybersecurity standards (UR E26/E27).&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Insurance and Liability:&lt;br&gt;When a crew-less ship causes an accident, who is responsible—owner, AI developer, remote-operation center, or sensor maker?&lt;br&gt;Insurers are becoming cautious and will demand objective proof of digital seaworthiness.&lt;br&gt;Vessels documented to meet IEC 61508 and IEC 62443 will obtain coverage at reasonable rates, while non-compliant ships risk denial or sky-high premiums.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;South Korea’s pending Autonomous Ship Development and Commercialization Act even proposes mandatory liability insurance and penalties for non-compliance.&lt;/p&gt; 
&lt;h3&gt;Strategic Investment for Competitive Advantage&lt;/h3&gt; 
&lt;p&gt;Proactive investment in functional safety and cybersecurity is not a cost—it is a competitive edge.&lt;br&gt;Companies that demonstrate digital seaworthiness will:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Win regulatory approvals faster&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Secure favorable insurance terms&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Earn the trust of cargo owners and the market&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Organizations that treat the IMO’s 2025 voluntary code as a de-facto design standard today will dominate the market as regulations tighten, while late adopters face expensive retrofits and legal fallout from the first major precedent-setting accidents.&lt;/p&gt; 
&lt;h3&gt;Securing a Safe and Secure Voyage&lt;/h3&gt; 
&lt;p&gt;The full potential of autonomous shipping becomes reality only when functional safety and cybersecurity are built in from the very start.&lt;br&gt;Speed of innovation alone will turn the future into a sandcastle.&lt;/p&gt; 
&lt;p&gt; &lt;img width="624" height="512" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Securing-a-Safe-and-Secure-Voyage.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;The solution is a Safety-and-Security-by-Design approach—integrating both pillars into every phase:&lt;br&gt;concept design, software architecture, hardware selection, and operational protocols.&lt;/p&gt; 
&lt;p&gt;Standards IEC 61508 and IEC 62443 provide proven roadmaps not just for &lt;em&gt;what&lt;/em&gt; to implement, but &lt;em&gt;how&lt;/em&gt; to embed safety and security throughout development.&lt;/p&gt; 
&lt;p&gt;The challenges of the autonomous era are complex, but with the right expertise, strategic insight, and collaborative approach, they are solvable.&lt;br&gt;The goal is not to slow innovation but to enable resilient, sustainable innovation.&lt;/p&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;To achieve true &lt;em&gt;Digital Seaworthiness&lt;/em&gt;, companies need new forms of partnership and leadership—combining maritime operations, cutting-edge technology, international regulation, and strategic risk management.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;Are you ready to embark on this new era of shipping leadership—with Hermes Solution as your trusted partner?&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F09%2F12%2Ffunctional-safety-cybersecurity-autonomous-ships&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>IEC 62443</category>
      <category>IMO MASS</category>
      <category>autonomous ship</category>
      <pubDate>Fri, 12 Sep 2025 03:13:04 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/09/12/functional-safety-cybersecurity-autonomous-ships</guid>
      <dc:date>2025-09-12T03:13:04Z</dc:date>
    </item>
    <item>
      <title>ASPICE 4.0 Guide: Compliance Isn’t Everything – Real Business Value for Automotive Software</title>
      <link>https://blog.hermessol.com/en/2025/08/28/aspice-4-0-guide-compliance-isnt-everything-real-business-value-for-automotive-software</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/08/28/aspice-4-0-guide-compliance-isnt-everything-real-business-value-for-automotive-software?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/aspice-compiance-isnt-everything.png" alt="ASPICE 4.0 Guide: Compliance Isn’t Everything – Real Business Value for Automotive Software" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;Is Passing the ASPICE Assessment Enough? The Real Value You Might Be Missing&lt;/h3&gt; 
&lt;p&gt;If you are an automotive software developer—or have ever worked on a related project—you’ve probably felt the weight of the word &lt;em&gt;ASPICE&lt;/em&gt;. OEM compliance requirements, upcoming assessments, and an ever-growing pile of work products can make ASPICE feel less like a framework and more like a mountain to climb.&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;Is Passing the ASPICE Assessment Enough? The Real Value You Might Be Missing&lt;/h3&gt; 
&lt;p&gt;If you are an automotive software developer—or have ever worked on a related project—you’ve probably felt the weight of the word &lt;em&gt;ASPICE&lt;/em&gt;. OEM compliance requirements, upcoming assessments, and an ever-growing pile of work products can make ASPICE feel less like a framework and more like a mountain to climb.&lt;/p&gt; 
&lt;p&gt;Sometimes, after long nights filling out templates and producing documents, you may wonder:&lt;/p&gt; 
&lt;p&gt;“Are we doing all this just to pass the assessment?”&lt;/p&gt; 
&lt;p&gt;If that question has ever crossed your mind, read on. Beyond compliance, ASPICE delivers real, long-term value for your team and your product.&lt;/p&gt; 
&lt;h4&gt;ASPICE 4.0 in 2025: What’s New?&lt;/h4&gt; 
&lt;p&gt;The release of ASPICE 4.0 in December 2023 brought significant opportunities—especially for small and mid-sized mobility companies. With the March 31, 2025 transition deadline approaching, resource-limited teams can now compete more fairly with industry giants.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key updates include:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;AI &amp;amp; Machine Learning Processes (MLE.1–MLE.4)&lt;/strong&gt;&lt;br&gt;ASPICE now officially covers ML-based development, enabling structured validation of “black box” AI systems—crucial for autonomous driving and ADAS.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Hardware Engineering Processes (HWE.1–HWE.4)&lt;/strong&gt;&lt;br&gt;EV battery management systems (BMS), power electronics, and charging infrastructure are now fully recognized within ASPICE.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;More Flexible Assessment Model&lt;/strong&gt;&lt;br&gt;With a revamped VDA scope, initial implementation effort is cut by about 50%. Teams can begin with just the Basic Part and one Domain-Specific Part, making ASPICE adoption more practical for startups.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Numbers That Prove the Value of ASPICE&lt;/h4&gt; 
&lt;p&gt;Research shows that ASPICE-compliant companies detect 90% of defects 11 months before product launch, while non-compliant companies often find them just 2 months prior.&lt;/p&gt; 
&lt;p&gt; &lt;img width="744" height="552" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/Numbers-That-Prove-the-Value-of-ASPICE-1.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;The impact is clear:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;9 months of additional time to resolve critical issues&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Reduced warranty costs and recall risks&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Stronger customer trust and higher product quality&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;20% lower development costs through process efficiency&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;30% faster time-to-market via early issue detection&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;50% fewer post-release defects after Level 2 certification&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Why Do We Still See ASPICE as Just “Compliance”?&lt;/h4&gt; 
&lt;p&gt;For most organizations, ASPICE adoption is driven by customer requirements or project eligibility. The immediate goal becomes “achieving the level,” not transforming how the team works.&lt;/p&gt; 
&lt;p&gt;This target-driven approach often leads to a dangerous trap: producing documents for the sake of the audit while forgetting the “why” behind the process.&lt;/p&gt; 
&lt;h4&gt;The Hidden Value Beyond the Assessment&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;A Common Language Across the Team&lt;/strong&gt;&lt;br&gt;ASPICE defines clear expectations for every activity and work product. This eliminates misunderstandings such as one engineer’s “design complete” being just a mental sketch while another expects full documentation.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Reducing Dependence on “Star Developers”&lt;/strong&gt;&lt;br&gt;Without ASPICE, projects may collapse when a key developer leaves. ASPICE builds bridges between “islands of knowledge,” creating a structured system that anyone can follow.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Traceability for Faster Problem Solving&lt;/strong&gt;&lt;br&gt;Bugs in automotive software can become safety risks. ASPICE enforces end-to-end traceability from requirements → design → code → test. This creates a map for quickly locating the root cause, rather than relying on guesswork and late-night debugging.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt; Real Success Story: EDAG Embedded Systems&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Team size:&lt;/strong&gt; Small development team&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Timeline:&lt;/strong&gt; 2 years&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Strategy:&lt;/strong&gt;&lt;/p&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;2-week sprints with Agile + ASPICE in parallel&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Jira + Confluence automation&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;GitLab version control&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Result:&lt;/strong&gt; Achieved ASPICE Level 2 while maintaining consistent customer delivery&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt; Tools for Small and Mid-Sized Companies&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Codebeamer ALM&lt;/strong&gt; – Pre-built ASPICE templates, no coding required, customizable for SMEs (87% satisfaction)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Polarion ALM&lt;/strong&gt; – Best-in-class traceability, permanent license + 20% annual maintenance&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Open-source options&lt;/strong&gt; – ASPICE-Archi repository, GitHub/GitLab integration, AI-based documentation tools reducing manual effort by 40–50%&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Integration is key&lt;/strong&gt;: Seamless links with GitHub, GitLab, and Azure DevOps allow automated Jira issue creation, vulnerability scanning, and ASPICE-compliant traceability.&lt;/p&gt; 
&lt;h4&gt;EVs &amp;amp; Autonomous Driving: Why ASPICE 4.0 Matters&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;EV Battery Systems&lt;/strong&gt;: Companies like Qnovo (98.7% prediction accuracy), Breathe Battery Technologies (30% faster charging + 33% longer battery life), and Texas Instruments (wireless BMS) have demonstrated ASPICE-compliant innovation.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Autonomous Driving&lt;/strong&gt;: New MLE processes provide structured validation for black-box AI and support continuous learning, making ADAS and AV development more reliable.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;ROI: The Business Case for ASPICE&lt;/h4&gt; 
&lt;p&gt;&lt;strong&gt;Initial investment includes:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;ASPICE consulting and gap analysis&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Training for engineers, testers, PMs&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Formal ASPICE assessments&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Assigning process owners/quality managers&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Adopting ALM tools like Jira, Polarion, or Codebeamer&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Payback period:&lt;/strong&gt; 12–24 months, thanks to reduced defect-fixing costs, lower warranty risks, and faster market entry.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Hidden benefits:&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Direct access to premium OEM contracts (Level 2+ is often mandatory)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Continuous learning and improvement culture&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Competitive advantage—ASPICE-compliant firms resolve issues on average 9 months faster than rivals&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;ASPICE Implementation Roadmap&lt;/h4&gt; 
&lt;p&gt; &lt;img width="528" height="576" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/ASPICE-Implementation-Roadmap-1.svg" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt; Immediate:&lt;/strong&gt; Complete ASPICE 4.0 training, conduct gap analysis, select key domains (SYS, SWE, HWE, MLE)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt; 6–12 months:&lt;/strong&gt; Reach Level 1, establish documentation practices, adopt ALM tools, schedule quarterly consultant reviews&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt; 18+ months:&lt;/strong&gt; Scale to Level 2/3, integrate cybersecurity (SEC) and validation (VAL) processes, build internal audit capabilities, and embed ASPICE into the daily way of working&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Final Thoughts&lt;/h4&gt; 
&lt;p&gt;ASPICE is not just a regulatory burden—it’s a growth engine for automotive software. By 2030, the automotive software market will reach $32.3 billion, with 90% of vehicle differentiation coming from software.&lt;/p&gt; 
&lt;p&gt;ASPICE 4.0, with its flexible assessment model and AI/ML processes, opens doors even for small teams. With the right strategy, tools, and partner support, achieving Level 2 in 18–24 months is realistic.&lt;/p&gt; 
&lt;p&gt;At Hermes Solution, we help teams transform ASPICE from a “compliance checklist” into a strategic foundation for sustainable growth.&lt;/p&gt; 
&lt;p&gt; What does ASPICE’s real value mean for your team?&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F08%2F28%2Faspice-4-0-guide-compliance-isnt-everything-real-business-value-for-automotive-software&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Automotive SPICE Compliance</category>
      <category>ASPICE 4.0</category>
      <category>Automotive Software Process Improvement</category>
      <pubDate>Thu, 28 Aug 2025 06:12:31 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/08/28/aspice-4-0-guide-compliance-isnt-everything-real-business-value-for-automotive-software</guid>
      <dc:date>2025-08-28T06:12:31Z</dc:date>
    </item>
    <item>
      <title>Automotive Semiconductor Cybersecurity: UN R155, ISO/SAE 21434, TARA, HSM</title>
      <link>https://blog.hermessol.com/en/2025/08/21/automotive-semiconductor-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/08/21/automotive-semiconductor-cybersecurity?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/homepage_thumbnail_250803png.png" alt="Automotive Semiconductor Cybersecurity: UN R155, ISO/SAE 21434, TARA, HSM" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;1. Paradigm Shift in Automotive Semiconductor Cybersecurity&lt;/h3&gt; 
&lt;p&gt;Today, cars are no longer simple mechanical devices. Whereas vehicles once relied mainly on engines and mechanical parts, they have now become IT platforms on wheels centered on numerous ECUs and software. As connected cars and autonomous driving proliferate, vehicles are continuously linked to external networks via wireless communication, offering new conveniences to drivers and passengers.&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;1. Paradigm Shift in Automotive Semiconductor Cybersecurity&lt;/h3&gt; 
&lt;p&gt;Today, cars are no longer simple mechanical devices. Whereas vehicles once relied mainly on engines and mechanical parts, they have now become IT platforms on wheels centered on numerous ECUs and software. As connected cars and autonomous driving proliferate, vehicles are continuously linked to external networks via wireless communication, offering new conveniences to drivers and passengers.&lt;/p&gt; 
&lt;p&gt;This connectivity, however, simultaneously creates new opportunities for attackers. In the past, hacking a vehicle typically required direct access via the OBD-II port; now, remote attacks are possible through wireless channels such as cellular, Wi-Fi, and V2X. Attackers can even target specific models at scale and threaten critical control functions like braking or steering. Consequently, cybersecurity at the semiconductor level is no longer optional—it is essential.&lt;/p&gt; 
&lt;h3&gt;2. Regulatory Environment and Its Industry Impact&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="684" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/250803_01-1024x684-1.jpg?width=1024&amp;amp;height=684&amp;amp;name=250803_01-1024x684-1.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;In response, strong regulations have emerged across the global automotive industry. Chief among them is UN R155, which since 2022 has been a mandatory condition for new-vehicle type approval in major markets such as Europe, Japan, and Korea. This regulation requires OEMs to establish a Cybersecurity Management System (CSMS) and to manage threats throughout the vehicle lifecycle.&lt;/p&gt; 
&lt;p&gt;A notable characteristic is that the regulation does not target only OEMs. Through a “regulatory cascade” across the supply chain, semiconductor companies must also certify their own security processes to participate in the market. In other words, cybersecurity has been elevated from an individual feature to a criterion for business eligibility in the automotive sector.&lt;/p&gt; 
&lt;p&gt;In parallel, the international standard ISO/SAE 21434 has been introduced. If UN R155 defines &lt;em&gt;what&lt;/em&gt; must be done, ISO/SAE 21434 explains &lt;em&gt;how&lt;/em&gt; to do it. It provides a framework for managing cybersecurity across the entire vehicle lifecycle—from design to decommissioning— guiding organizations to perform security activities suited to their products through a risk-based approach rather than prescribing specific technologies.&lt;/p&gt; 
&lt;h3&gt;3. The Role of TARA (Threat Analysis and Risk Assessment)&lt;/h3&gt; 
&lt;p&gt;A core activity in ISO/SAE 21434 is TARA. Rather than merely listing threats, TARA systematically analyzes which assets may be attacked, the potential impacts if an attack succeeds, and the likelihood of success.&lt;/p&gt; 
&lt;h4&gt;TARA Workflow&lt;/h4&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Key Activities&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Deliverables&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Asset Identification&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Catalog data, functions, and resources that must be protected&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Asset inventory&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Threat Scenarios&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Derive threats using methods such as STRIDE&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Threat scenario list&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Impact Assessment&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Analyze impacts on safety, financials, operations, and privacy&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Impact ratings&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Attack Path Analysis&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Define the steps an attacker could take&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Attack path diagrams&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Likelihood Assessment&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Evaluate time, knowledge, equipment, and opportunity&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Likelihood ratings&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Risk Determination&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Assess risk = impact × likelihood&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Risk register&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Risk Treatment&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Decide on mitigation, avoidance, transfer, or acceptance&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Cybersecurity goals&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp; &lt;/p&gt; 
&lt;p&gt;Through this process, organizations move beyond the vague notion that “security is needed” to concretely identify which functions must be protected and what technical measures are required.&lt;br&gt;For example, if TARA confirms that an attacker could manipulate the CAN bus to control the steering ECU, a corresponding cybersecurity goal would be: &lt;em&gt;“Unauthorized messages must be blocked.”&lt;/em&gt; During development, this goal is then decomposed into implementable requirements.&lt;/p&gt; 
&lt;p&gt;Thus, TARA serves as the compass for security development and underpins all subsequent activities.&lt;/p&gt; 
&lt;h3&gt;4. The Need for a Secure Development Lifecycle (SDLC)&lt;/h3&gt; 
&lt;p&gt;In the past, security was often added after development, but retrofitting vulnerabilities late in the process incurs far greater time and cost. The Secure Development Lifecycle (SDLC) addresses this by integrating security from the earliest stages—often referred to as a shift-left approach.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Requirements&lt;/strong&gt;: Reflect TARA outcomes as explicit security requirements&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Design&lt;/strong&gt;: Apply principles such as least privilege and defense-in-depth&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Implementation&lt;/strong&gt;: Follow safe coding standards (e.g., MISRA C) and use static analysis tools&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Testing&lt;/strong&gt;: Employ fuzzing and penetration testing to uncover unforeseen vulnerabilities&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Post-release&lt;/strong&gt;: Maintain OTA updates, vulnerability management, and incident response&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Security does not end at vehicle launch. New threats must be addressed via OTA, and vulnerability/incident processes must be operated continuously. In short, SDLC is a lifecycle-long approach to managing cybersecurity.&lt;/p&gt; 
&lt;h3&gt;5. Hardware Root of Trust and HSM&lt;/h3&gt; 
&lt;p&gt;Security cannot rely on software alone. Software can contain bugs and is susceptible to physical attacks. Therefore, ensuring security at the semiconductor level requires a Hardware Root of Trust (RoT).&lt;/p&gt; 
&lt;p&gt;This role is provided by the Hardware Security Module (HSM), which creates an isolated security domain within the chip to securely store cryptographic keys, accelerate cryptographic operations, and support secure boot so that only trusted code runs at startup.&lt;/p&gt; 
&lt;p&gt;Not every ECU requires the same security level. The EVITA project classifies HSMs into three tiers: Full, Medium, and Light. Gateways and V2X modules that interface with external networks should use Full HSM; internal domains such as powertrain and chassis can adopt Medium; and simple ECUs for sensors/actuators can use Light. This approach balances cost and performance.&lt;/p&gt; 
&lt;h3&gt;6. Security Strategies of Leading Semiconductor Companies&lt;/h3&gt; 
&lt;p&gt;The automotive semiconductor cybersecurity market is led by a few global players.&lt;/p&gt; 
&lt;h4&gt;Overview Table&lt;/h4&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Company&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Key Products&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Security Features&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;Strengths&lt;/strong&gt;&lt;/p&gt; &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;N Corp&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;S32G, EdgeLock&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;“4+1” security framework; HSE built-in&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;ISO/SAE 21434 process certification&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;I Corp&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;AURIX TC4x&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;EVITA Full HSM; integrated functional safety &amp;amp; security&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;First to obtain ISO/SAE 21434 certification&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;&lt;strong&gt;R Corp&lt;/strong&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;RH850, R-Car&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Scalable ICU-HSM&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;TÜV-based CSMS operations&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp; &lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;N Corp&lt;/strong&gt; proposes a “4+1” security framework that provides layered defense from external vehicle communications to internal ECU security. The S32G processors integrate an HSE security engine enabling secure boot, key management, and accelerated network security, while the EdgeLock portfolio delivers security services across the device lifecycle.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;I Corp&lt;/strong&gt; is well known for its AURIX microcontroller series, meeting both functional safety and cybersecurity requirements and being the industry’s first to secure ISO/SAE 21434 process certification. With EVITA Full HSM on-chip, it enables secure key management and cryptographic acceleration.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;R Corp&lt;/strong&gt; offers scalable solutions centered on RH850 MCUs and R-Car SoCs, applicable across diverse ECUs. Its in-house ICU-HSM supports secure boot, communication security, and software update security, with reliability reinforced by a TÜV-certified CSMS.&lt;/p&gt; 
&lt;h3&gt;7. Strategy Going Forward&lt;/h3&gt; 
&lt;p&gt;Automotive semiconductor cybersecurity is no longer a technical option but a baseline requirement for market participation. Compliance with UN R155 and ISO/SAE 21434 is essential, supported by TARA-based risk analysis, SDLC-driven security by design, and hardware-anchored protections such as HSM.&lt;/p&gt; 
&lt;p&gt;Without close collaboration among OEMs, Tier-1 suppliers, and semiconductor companies, survival in the market will be difficult. In the future, semiconductors without built-in security will have no place, and semiconductor-level security will be both the starting point of vehicle cybersecurity and a core competitive advantage.&lt;/p&gt; 
&lt;h3&gt;Conclusion&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="578" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/250803_02-1024x578-1.jpg?width=1024&amp;amp;height=578&amp;amp;name=250803_02-1024x578-1.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;Automotive semiconductor cybersecurity has become a core determinant of competitiveness across the industry, going beyond mere regulatory compliance or safety assurance. UN R155 and ISO/SAE 21434, TARA-based risk analysis, SDLC integration, hardware roots of trust, and the latest security solutions from leading semiconductor companies are all part of the same goal: delivering safe and trustworthy future vehicles.&lt;/p&gt; 
&lt;p&gt;Hermes Solution walks this path with you—helping organizations navigate complex regulations and technical demands. Beyond basic compliance, we partner with you to build tangible cybersecurity capabilities and become a leader in the era of future mobility.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F08%2F21%2Fautomotive-semiconductor-cybersecurity&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Hardware Security Module</category>
      <category>Automotive Cybersecurity Standards</category>
      <category>UN R155</category>
      <category>Automotive Semiconductor Cybersecurity</category>
      <category>Secure Development Lifecycle</category>
      <pubDate>Thu, 21 Aug 2025 05:58:53 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/08/21/automotive-semiconductor-cybersecurity</guid>
      <dc:date>2025-08-21T05:58:53Z</dc:date>
    </item>
    <item>
      <title>ISO/IEC 42001 for Automotive AI: A Practical Guide for Tier 1/2 Suppliers</title>
      <link>https://blog.hermessol.com/en/2025/08/14/iso-iec-42001-automotive-ai-guide</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/08/14/iso-iec-42001-automotive-ai-guide?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/homepage_thumbnail_250802.png" alt="ISO/IEC 42001 for Automotive AI: A Practical Guide for Tier 1/2 Suppliers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h3&gt;AI Innovation and a New Era of Responsibility in the Automotive Industry&lt;/h3&gt; 
&lt;p&gt;Cars are no longer just means of transportation. With the emergence of Software-Defined Vehicles (SDVs), artificial intelligence (AI) is no longer a future technology—it has already become the core of the automotive industry.&lt;/p&gt;</description>
      <content:encoded>&lt;h3&gt;AI Innovation and a New Era of Responsibility in the Automotive Industry&lt;/h3&gt; 
&lt;p&gt;Cars are no longer just means of transportation. With the emergence of Software-Defined Vehicles (SDVs), artificial intelligence (AI) is no longer a future technology—it has already become the core of the automotive industry.&lt;/p&gt; 
&lt;p&gt;From Advanced Driver Assistance Systems (ADAS) and autonomous driving to enhancing in-vehicle user experiences, predictive maintenance, and manufacturing process innovation, there is no area untouched by AI.&lt;/p&gt; 
&lt;p&gt;However, this innovation comes with new challenges. AI’s inherent unpredictability and opacity create risks that cannot be addressed by traditional quality and safety management methods alone. Issues such as data bias, algorithm uncertainty, and performance degradation are prime examples.&lt;/p&gt; 
&lt;p&gt;Amid these changes, one international standard is attracting attention—ISO/IEC 42001, the Artificial Intelligence Management System (AIMS). This is not merely a regulation but a strategic framework for developing and operating AI safely and responsibly. Just as the automotive industry has long managed quality and risks through standards such as ISO 9001 and IATF 16949, AI governance will become the key to future competitiveness.&lt;/p&gt; 
&lt;p&gt;In particular, Tier 1 and Tier 2 suppliers should adopt this standard proactively. OEMs will expand AI management requirements across their supply chains, and compliance with ISO/IEC 42001 will determine future business opportunities.&lt;/p&gt; 
&lt;h3&gt;Understanding ISO/IEC 42001 AIMS: What It Is and Why It Matters&lt;/h3&gt; 
&lt;p&gt;&lt;strong&gt;Definition and Objectives&lt;/strong&gt;&lt;br&gt;ISO/IEC 42001 is the international standard for establishing, operating, and improving an Artificial Intelligence Management System (AIMS).&lt;br&gt;Its goal is to ensure responsible and ethical use of AI, manage AI-specific risks such as bias, opacity, and security vulnerabilities, and secure transparency and trustworthiness.&lt;/p&gt; 
&lt;h3&gt;Why Prepare for AIMS Certification Now?&lt;/h3&gt; 
&lt;p&gt; &lt;img width="924" height="444" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/250802_01_eng.svg" alt=""&gt; &lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Competitive Advantage&lt;/strong&gt;: Signals to OEMs and the market that you meet the highest AI governance standards.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Risk Management&lt;/strong&gt;: Proactively addresses AI bias, data security, and algorithm vulnerabilities.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Trust Building&lt;/strong&gt;: Enhances trust and brand image with customers and regulators.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Operational Efficiency&lt;/strong&gt;: Systematizes data, roles, and responsibility management.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Regulatory Readiness&lt;/strong&gt;: Prepares for evolving global regulations such as the EU AI Act.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Standard Structure and Core Requirements&lt;/h3&gt; 
&lt;p&gt;ISO/IEC 42001 is based on the PDCA (Plan-Do-Check-Act) structure, similar to ISO 9001 and IATF 16949, making integration with existing quality and safety standards straightforward.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Clause&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Core Requirement&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Automotive Industry Example&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Organizational Context&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Identify AI-related internal/external issues and stakeholder needs, define scope&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Analyze OEM strategies, regulations, and tech trends; define products/processes under AIMS&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Leadership&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Executive commitment, policies, clear roles/responsibilities&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;CEO/CTO announces “Responsible AI Policy” and assigns departmental leads&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Planning&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Identify risks/opportunities, set AI objectives&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;“Reduce pedestrian detection bias by 15% in Q4”&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Support&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Resources, training, documentation&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Train developers/data scientists; manage data/model documentation&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Operation&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;AI risk/impact assessment, control implementation&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Privacy impact analysis for driver monitoring; apply Annex A controls&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Performance Evaluation&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Monitoring, measurement, internal audit&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Check accuracy/bias metrics, operate independent audit team&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Improvement&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Continual improvement, corrective actions&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Root cause analysis, retraining, data enhancement&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;h3&gt;ISO/IEC 42001 Certification Roadmap for Tier 1/2 Suppliers&lt;/h3&gt; 
&lt;p&gt;&lt;strong&gt;Step 1: Preparation and Planning&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Leadership &amp;amp; Team Formation&lt;/strong&gt;: Secure top management support; involve R&amp;amp;D, quality, IT, legal, HR.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Scope Definition&lt;/strong&gt;: Decide whether to include only products (e.g., ADAS module) or also manufacturing AI.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Gap Analysis &amp;amp; Awareness Training&lt;/strong&gt;: Compare current processes with standard requirements; train employees on roles/responsibilities.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Step 2: System Development and Execution&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;AI Policy &amp;amp; Objectives&lt;/strong&gt;: Set measurable goals (e.g., “100% traceability of training datasets”).&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Risk &amp;amp; Impact Assessments&lt;/strong&gt;:&lt;/p&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;&lt;em&gt;Impact Assessment (8.4)&lt;/em&gt;: Analyze potential societal and personal impacts (e.g., privacy).&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;&lt;em&gt;Risk Assessment (8.2)&lt;/em&gt;: Identify AI-specific risks (data, models, security, ethics).&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Control Implementation&lt;/strong&gt;: Apply Annex A/B procedures for data management, lifecycle, stakeholder communication.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Documentation&lt;/strong&gt;: Maintain required documents (policies, assessment results, training records).&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;&lt;strong&gt;Step 3: Evaluation and Certification&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Internal Audit &amp;amp; Management Review&lt;/strong&gt;: Validate operational compliance and performance before reporting to executives.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Corrective Actions&lt;/strong&gt;: Investigate nonconformities and implement prevention measures.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;External Audit&lt;/strong&gt;: Pass document and on-site audits to obtain certification.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;Integrating ISO/IEC 42001 with Existing Quality and Safety Systems&lt;/h3&gt; 
&lt;p&gt;When combined with IATF 16949, ISO 26262, and ISO/SAE 21434, ISO/IEC 42001 maximizes its impact—integrating quality, safety, and security activities into one governance system to prevent duplication and omissions.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;IATF 16949 (Quality)&lt;/strong&gt;: Extend FMEA to include AI-specific failure modes (bias, noise, poisoning, hallucination, overfitting, adversarial attacks). Incorporate AIMS risk/impact results into APQP and control plans.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;ISO 26262 &amp;amp; ISO 21448 (SOTIF, Functional Safety)&lt;/strong&gt;: Address malfunction and insufficient performance risks. Apply Annex B.6 (AI lifecycle integration) and B.7 (data scenario coverage, bias removal, completeness).&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;ISO/SAE 21434 (Cybersecurity)&lt;/strong&gt;: Link TARA threat analysis with AIMS risk assessment. Include data integrity, model robustness, security-by-design, and secure OTA processes.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;ASPICE and ISO/IEC 42001 Integration: Enhancing AI Development Maturity&lt;/h3&gt; 
&lt;p&gt;ASPICE evaluates automotive software development maturity. The new ASPICE for Machine Learning adds AI-specific processes:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;MLE.1&lt;/strong&gt;: ML Requirements Analysis&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;MLE.2&lt;/strong&gt;: Architecture Design&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;MLE.3&lt;/strong&gt;: Training&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;SUP.11&lt;/strong&gt;: Data Management&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;AIMS provides the “what” and “why” of AI governance, while ASPICE for MLE defines the “how.” Running a mature AIMS naturally supports achieving higher ASPICE for MLE capability levels, ensuring AI quality, safety, and trustworthiness throughout the lifecycle.&lt;/p&gt; 
&lt;p&gt;Table 2: Integration Management Points Between Key Automotive Standards and ISO/IEC 42001 (continued)&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;table&gt; 
 &lt;colgroup&gt;&lt;/colgroup&gt; 
 &lt;tbody&gt; 
  &lt;tr&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Automotive Standard&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Core Processes / Tools&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Related ISO/IEC 42001 Clauses&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
   &lt;th colspan="1" rowspan="1"&gt; &lt;p&gt;Integrated Implementation and Considerations&lt;/p&gt;  &amp;nbsp;  &lt;/th&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;IATF 16949&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;FMEA / Risk-based Thinking&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;8.2 AI Risk Assessment, 8.4 AI System Impact Assessment&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Add AI-specific failure modes (bias, data drift, adversarial attacks) to existing FMEA. Reflect AI impact assessment results in the Severity (S) scoring of the FMEA.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;ISO 26262 / ISO 21448 (SOTIF)&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;HARA / SOTIF Analysis / Safety Assurance&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Annex B.6 AI System Lifecycle, Annex B.7 AI Data Management&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Include HARA and SOTIF analysis in formal procedures. Ensure scenario coverage and completeness in data management.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;ISO/SAE 21434&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;TARA / Cybersecurity Assurance&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;8.2 AI Risk Assessment, Annex A.2.6 Information Security&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Integrate TARA threats (model inference, adversarial attacks) into AI risk assessment. Include controls for data integrity, model confidentiality, and availability in information security policies.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
  &lt;tr&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Automotive SPICE (ASPICE)&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Software Development Process Assessment&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Overall AIMS processes (especially Clause 8, Annex B)&lt;/p&gt; &lt;/td&gt; 
   &lt;td colspan="1" rowspan="1"&gt; &lt;p&gt;Link AIMS operational processes to ASPICE for MLE requirements. Avoid duplication of documentation and work products, and improve process maturity.&lt;/p&gt; &lt;/td&gt; 
  &lt;/tr&gt; 
 &lt;/tbody&gt; 
&lt;/table&gt; 
&lt;p&gt;&amp;nbsp;&lt;br&gt; &lt;/p&gt; 
&lt;h3&gt;AI Era: The Time to Act Is Now&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="683" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/250802_02-1024x683.jpg?width=1024&amp;amp;height=683&amp;amp;name=250802_02-1024x683.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;AI is now an unstoppable force in the automotive industry. ISO/IEC 42001 is designed to balance AI’s risks and opportunities in increasingly complex technical environments. It is not merely a regulatory shield but a strategic tool for embedding a trustworthy AI culture into your organization and turning it into a competitive advantage.&lt;/p&gt; 
&lt;p&gt;For Tier 1 and Tier 2 suppliers, now is the time to start—from raising executive awareness to conducting process gap analyses. In fast-changing technological transitions, companies that adopt standards first will become industry leaders and preferred OEM partners.&lt;/p&gt; 
&lt;p&gt;Hermes Solution is ready to help you move beyond survival to achieve sustainable growth in the AI era.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F08%2F14%2Fiso-iec-42001-automotive-ai-guide&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Software-Defined Vehicles</category>
      <pubDate>Thu, 14 Aug 2025 06:39:20 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/08/14/iso-iec-42001-automotive-ai-guide</guid>
      <dc:date>2025-08-14T06:39:20Z</dc:date>
    </item>
    <item>
      <title>AI-Powered Anomaly Detection Systems: Building the Future of Automotive Security</title>
      <link>https://blog.hermessol.com/en/2025/08/08/blog_250704</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/08/08/blog_250704?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/homepage_thumbnail_250704.png" alt="AI-Powered Anomaly Detection Systems: Building the Future of Automotive Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The modern automotive industry is at the core of digital transformation. With the rise of Software-Defined Vehicles (SDVs), cars have evolved from simple mechanical transport machines to complex "computers on wheels." While this shift opens up endless possibilities, it also introduces unprecedented cybersecurity threats.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The modern automotive industry is at the core of digital transformation. With the rise of Software-Defined Vehicles (SDVs), cars have evolved from simple mechanical transport machines to complex "computers on wheels." While this shift opens up endless possibilities, it also introduces unprecedented cybersecurity threats.&lt;/p&gt; 
&lt;h3&gt;The Security Reality of the SDV Era&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="574" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/250704_01-1024x574-1.jpg?width=1024&amp;amp;height=574&amp;amp;name=250704_01-1024x574-1.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Connected Cars on the Rise&lt;/strong&gt;&lt;br&gt;According to the Korea Automobile &amp;amp; Mobility Association (KAMA), as of March 2023, South Korea had over 7.08 million registered connected cars—representing 27.6% of all vehicles. In other words, more than one in four cars on Korean roads is exchanging data through external networks. While this connectivity enables smartphone-like convenience, it also introduces new vectors for cyberattacks. Car hacking no longer requires physical access; it can happen remotely, even without the driver's awareness.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Escalating Cyber Threats&lt;/strong&gt;&lt;br&gt;A report by Upstream Security highlighted a 165% year-over-year increase in dark web and deep web activity related to the automotive ecosystem in 2023. One major incident involved a well-known EV manufacturer, where an API vulnerability exposed data from over two million vehicles across 130 countries. Hackers exploited this to track vehicle locations and unlock cars remotely—posing real-world safety risks.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Multi-layered Threat Landscape&lt;/strong&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;In-Vehicle Network Threats:&lt;/strong&gt; Malicious messages injected into the CAN (Controller Area Network) bus can tamper with essential functions like braking and steering.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;ECU and Hardware Threats:&lt;/strong&gt; Reverse engineering or firmware hacking of ECUs (Electronic Control Units) can result in control hijacking or installation of counterfeit ECUs.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;External Interface Threats:&lt;/strong&gt; Interfaces like Wi-Fi, Bluetooth, and OBD-II ports are potential intrusion points, especially when third-party apps are involved.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;&lt;strong&gt;Backend Server Threats:&lt;/strong&gt; A compromised backend server could impact millions of vehicles simultaneously, spreading malware through OTA updates.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h3&gt;The Fundamental Limits of Traditional Security Systems&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="548" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/blog_250704.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Issues with Signature-Based IDS&lt;/strong&gt;&lt;br&gt;Much like antivirus software, these systems rely on known attack "signatures." They're accurate for familiar threats, but powerless against zero-day exploits. They also require constant updates, making them slow to adapt to emerging attacks.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Early Anomaly Detection Pitfalls&lt;/strong&gt;&lt;br&gt;Early statistical anomaly detection aimed to solve this, but often failed due to high false positives. Vehicle operating environments are highly dynamic, making rigid threshold-based models ineffective.&lt;/p&gt; 
&lt;h3&gt;AI &amp;amp; ML-Powered Next-Generation Security&lt;/h3&gt; 
&lt;p&gt;&lt;strong&gt;Unsupervised Learning with Autoencoders&lt;/strong&gt;&lt;br&gt;Autoencoders are neural networks trained solely on "normal" CAN bus data. They learn hidden structures and relationships. When fed abnormal input, reconstruction errors spike, flagging potential threats.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Time-Series Pattern Analysis with LSTM&lt;/strong&gt;&lt;br&gt;LSTM (Long Short-Term Memory) models are ideal for sequential CAN data. By learning the rhythm and timing of messages, they can detect deviations caused by intrusions in real time.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Hybrid Architecture for Robust Detection&lt;/strong&gt;&lt;br&gt;Combining autoencoders and LSTM provides holistic defense. Autoencoders detect relational anomalies, while LSTM catches sequential disruptions. Together, they offer a robust, complementary system.&lt;/p&gt; 
&lt;h3&gt;Practical Implementation in Vehicles&lt;/h3&gt; 
&lt;p&gt;&lt;strong&gt;Edge AI for Real-Time Detection&lt;/strong&gt;&lt;br&gt;Safety-critical systems require millisecond-level responses. Cloud-based AI causes latency, whereas Edge AI enables on-board processing with no delay—essential for emergency scenarios.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Federated Learning for Privacy&lt;/strong&gt;&lt;br&gt;To protect privacy while training powerful models, Federated Learning sends models (not data) to vehicles. Each car trains locally and sends results to a central server for global model updates—preserving user privacy.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Explainable AI (XAI) for Trust&lt;/strong&gt;&lt;br&gt;Deep learning models can be black boxes. XAI methods like LIME or SHAP make decisions understandable—showing which CAN IDs or signals influenced detection. This builds analyst confidence and enables incident investigation.&lt;/p&gt; 
&lt;h3&gt;Meeting Global Compliance Standards&lt;/h3&gt; 
&lt;p&gt; &lt;img width="1024" height="683" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/AdobeStock_1225765691-1024x683-1.jpg?width=1024&amp;amp;height=683&amp;amp;name=AdobeStock_1225765691-1024x683-1.jpg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Understanding UN R155 &amp;amp; ISO/SAE 21434&lt;/strong&gt;&lt;br&gt;These regulations are mandatory in major markets like the EU, Japan, and Korea. UN R155 became mandatory for all new vehicles from July 2024. Compliance is not optional.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Key Requirement: Cybersecurity Management System (CSMS)&lt;/strong&gt;&lt;br&gt;Manufacturers must monitor and respond to threats throughout a vehicle's lifecycle—even post-sale. This includes anomaly detection, incident response, and vulnerability management.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;AI-IDS as a Compliance Enabler&lt;/strong&gt;&lt;br&gt;AI-IDS allows scalable, real-time monitoring across millions of vehicles. It turns static documentation into dynamic, field-driven compliance. By automating detection, evaluation, and reporting, manufacturers can satisfy UN R155 and ISO/SAE 21434 requirements.&lt;/p&gt; 
&lt;h3&gt;The Road Ahead for Automotive Security&lt;/h3&gt; 
&lt;p&gt;&lt;strong&gt;Securing V2X Communication&lt;/strong&gt;&lt;br&gt;As Vehicle-to-Everything (V2X) becomes mainstream, securing communication itself becomes critical. 5G-based security architectures will play a vital role.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Predictive Threat Intelligence&lt;/strong&gt;&lt;br&gt;AI will evolve to predict threats before they happen, using adaptive models and real-time data.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Security by Design&lt;/strong&gt;&lt;br&gt;AI will help embed security into vehicle design from the outset, ensuring ongoing verification and monitoring.&lt;/p&gt; 
&lt;h3&gt;Keys to a Successful AI-Based Security System&lt;/h3&gt; 
&lt;p&gt;A successful production-grade AI-IDS is more than a great algorithm. It requires:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Edge AI for real-time processing&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Federated Learning for scalability and privacy&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Explainable AI for transparency and trust&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;All this must work within the constraints of limited onboard computing resources and strict real-time demands.&lt;/p&gt; 
&lt;p&gt;Automotive cybersecurity must shift from reactive to proactive. In the SDV era, anomaly detection isn't a luxury—it's a necessity. AI and ML aren't just supporting tools; they are the foundation of future-proof, resilient mobility.&lt;/p&gt; 
&lt;p&gt;Hermes Solution is your strategic partner to ensure your next-generation vehicles are the safest, most compliant, and most resilient to emerging threats. Contact us today to explore how our AI-powered cybersecurity solutions can turn your vision into reality.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F08%2F08%2Fblog_250704&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>CybersecurityPartner</category>
      <category>AIinAutomotive</category>
      <category>SecureMobility</category>
      <category>FederatedLearning</category>
      <category>AIIDS</category>
      <category>CANbusSecurity</category>
      <category>ConnectedCars</category>
      <category>MLAnomalyDetection</category>
      <category>SoftwareDefinedVehicle</category>
      <category>Autoencoder</category>
      <category>UNR155</category>
      <category>DigitalTransformation</category>
      <category>EVSecurity</category>
      <pubDate>Fri, 08 Aug 2025 01:37:22 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/08/08/blog_250704</guid>
      <dc:date>2025-08-08T01:37:22Z</dc:date>
    </item>
    <item>
      <title>ISO 26262 Essential Guide: Automotive Safety Architecture with FMEA &amp; FTA</title>
      <link>https://blog.hermessol.com/en/2025/07/29/blog_250703</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.hermessol.com/en/2025/07/29/blog_250703?hsLang=en" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/%ED%99%88%ED%8E%98%EC%9D%B4%EC%A7%80%EC%9A%A9-%EB%B8%94%EB%A1%9C%EA%B7%B8-%EC%8D%B8%EB%84%A4%EC%9D%BC_250703-1.png" alt="ISO 26262 Essential Guide: Automotive Safety Architecture with FMEA &amp;amp; FTA" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hello, everyone leading the future of mobility! This is Hermes Solution. Have you ever thought that cars these days are like “moving smartphones”? In the past, sturdy machines were the best, but now cars have become sophisticated systems that run on hundreds of millions of lines of software code. Especially with the increase in smart features such as ADAS and autonomous driving, the importance of invisible software has grown even more.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Hello, everyone leading the future of mobility! This is Hermes Solution. Have you ever thought that cars these days are like “moving smartphones”? In the past, sturdy machines were the best, but now cars have become sophisticated systems that run on hundreds of millions of lines of software code. Especially with the increase in smart features such as ADAS and autonomous driving, the importance of invisible software has grown even more.&lt;/p&gt; 
&lt;p&gt;But here's the crucial question: what if even a small error occurs in such a system? A simple navigation error might be cute, but errors in steering or braking systems could lead to truly terrifying accidents. That's where the ISO 26262 international standard for automotive functional safety comes in.&lt;/p&gt; 
&lt;p&gt;This standard goes beyond being a technical guideline; it has become an essential requirement for survival in today's automotive industry. It serves as a “common language” for OEMs and suppliers to trust and collaborate with each other within the global supply chain. Failing to comply with ISO 26262 could result in missed business opportunities, costly recalls, or damage to corporate image, making it a core risk management strategy beyond mere technology.&lt;/p&gt; 
&lt;p&gt;This post will serve as a comprehensive guide to mastering FMEA (Failure Mode and Effects Analysis) and FTA (Fault Tree Analysis), the core analysis techniques of ISO 26262. This knowledge is essential for anyone interested in safe automotive development!&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;The Heart of Automotive Safety: A Comprehensive Look at ISO 26262 and ASIL&lt;/h3&gt; 
&lt;p&gt;To effectively apply ISO 26262, it is essential to first understand its core concepts. The standard follows the V-model development process, with the ASIL risk rating system at the center of all safety activities.&lt;/p&gt; 
&lt;h4&gt;Safety Lifecycle (V-Model): The Beginning of Systematic Safety Design&lt;/h4&gt; 
&lt;p&gt;ISO 26262 structures the development process like the letter V. The left wing represents the development stages from planning to design and implementation, while the right wing represents the verification and validation stages to ensure that all these stages function correctly. This ensures that safety requirements from the early stages of development are perfectly tracked and verified all the way to the final product.&lt;/p&gt; 
&lt;h4&gt;Key Concept: Automotive Safety Integrity Level (ASIL) - A Measure of Risk&lt;/h4&gt; 
&lt;p&gt;ASIL is at the core of ISO 26262's risk-based approach. In simple terms, it is a rating system that determines “how safe it needs to be” based on the severity of potential risks.&lt;/p&gt; 
&lt;p&gt;Quick note: Don't misunderstand! ASIL is not a rating for the component itself. While it is often referred to as an “ASIL D microcontroller,” this means that the component has the capability to be used in a system that requires ASIL D level. The actual ASIL rating depends on the risk caused when the component fails in a specific function.&lt;/p&gt; 
&lt;p&gt;Example: Even if it's the same front camera, the safety requirements needed for rear parking assistance (low risk, ASIL B) and autonomous emergency braking (very high risk, ASIL D) are totally different, right? So, remember that ASIL is a “context-dependent” requirement for functions!&lt;/p&gt; 
&lt;h4&gt;Three golden keys for determining ASIL&lt;/h4&gt; 
&lt;p&gt;ASIL ratings are determined by comprehensively evaluating the following three factors:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Severity (S): How serious could the injury be if a hazard occurs? (S0: No injury ~ S3: Death/life-threatening)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Exposure (E): How often are you exposed to the hazard? (E0: Almost none ~ E4: Very high)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Controllability (C): How well can the driver control the situation when the risk occurs? (C0: Easy to control ~ C3: Difficult/impossible to control)&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The combination of these three factors determines the final ASIL rating (A, B, C, D). ASIL D represents the highest risk and requires the most stringent safety measures. QM (Quality Management) is assigned when the risk is classified as unrelated to functional safety and follows general quality management.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="572" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/paragragh_01_250703.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&amp;lt;Table 1: ASIL Determination Matrix&amp;gt;&lt;br&gt;S0, E0, and C0 ratings are generally resolved by QM, so they are omitted from the table.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;From bottom to top! Complete mastery of Failure Mode and Effects Analysis (FMEA)&lt;/h3&gt; 
&lt;p&gt;Once the ISO 26262 safety objectives are set, the next question is, “How will failures occur and what impact will they have?” The powerful technique used here is FMEA!&lt;/p&gt; 
&lt;h4&gt;FMEA: A “bottom-up” analysis that examines every corner of the system&lt;/h4&gt; 
&lt;p&gt;FMEA is a systematic technique that starts with individual components (hardware, software) to thoroughly identify all possible failure modes and analyze the impact of these failures on the system and ultimately on the vehicle. It is a mandatory activity strongly recommended for all ASIL ratings!&lt;/p&gt; 
&lt;h4&gt;How to perform FMEA!&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Teamwork is important!: FMEA is a team activity involving design, manufacturing, and quality experts. It should not be performed formally after development is complete, but rather as a “living document” that is repeatedly performed from the early stages of design to prevent problems in advance.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;FMEA Worksheet: Key Items&lt;/p&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;Item/Function: The component or function to be analyzed (e.g., front camera)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Potential Failure Mode: How could it fail? (e.g., “Image data stops”)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Potential Impact of Failure: What would happen if it failed? (e.g., “Causes lane departure”)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Severity (S): Severity of the final impact (1–10 points)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Potential Cause of Failure: Why might it fail? (e.g., “Software deadlock”)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Occurrence (O): Likelihood of the cause occurring (1–10 points)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Current Control Measures: Methods to prevent or detect failure (e.g., watchdog timer)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;Detectability (D): The likelihood of detecting the failure (1–10 points; note that higher values indicate greater difficulty in detection!)&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Prioritizing risks: Beyond RPN to Action Priority!&lt;/h4&gt; 
&lt;p&gt;FMEA uses the formula RPN (Risk Priority Number) = S × O × D to quantify risk. The higher the RPN, the more urgent the need for improvement of the high-risk factor.&lt;/p&gt; 
&lt;p&gt;However, simply looking at the RPN number is not enough. Even if the RPN is low, failures with very high severity (S) must be managed as a top priority. Therefore, recent FMEA has introduced the concept of “Action Priority” to prioritize severity first. Remember that the true value of FMEA lies not in the RPN number, but in the process itself where the team discusses and analyzes high-risk events first!&lt;/p&gt; 
&lt;h4&gt;FMEA Actual Case: Front Camera Module for LKA&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Item: Front Camera Module for LKA System&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Failure Mode: Camera continuously outputs frozen images&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Impact: LKA system operates inaccurately, causing lane departure (Severity S=9)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Cause: Software deadlock in the camera's internal processor (Occurrence O=3)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Detection Management Measures: Watchdog timer in the image processing ECU monitors frame updates (Detection D=2)&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;RPN: 9 × 3 × 2 = 54&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;(This value is used to determine the priority of improvement measures by comparing it with the RPNs of other failure modes.)&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="132" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/paragragh_02_250703.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&amp;lt;Table 2: Example of a front camera module FMEA worksheet&amp;gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;From top to bottom! Complete analysis of fault tree analysis (FTA)&lt;/h3&gt; 
&lt;p&gt;While FMEA is a “bottom-up” approach that starts with small parts, FTA is a “top-down” analysis that looks at the entire system.&lt;/p&gt; 
&lt;h4&gt;FTA: A ‘Deductive’ Analysis to Find the Root Cause of the Problem&lt;/h4&gt; 
&lt;p&gt;FTA is a technique that starts with a specific system failure (‘top event’) and logically identifies all possible root causes (‘basic events’) that could lead to that failure. It is particularly essential for systems requiring high safety levels, such as ASIL C and D.&lt;/p&gt; 
&lt;h4&gt;How to Create a Fault Tree!&lt;/h4&gt; 
&lt;p&gt;Top Event: The starting point of the analysis! It must be a clearly defined system failure state, such as “unintended steering torque exceeding X Nm for more than Y ms.”&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Logic Gates: Symbols showing the relationships between events.&lt;/p&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;AND Gate: All input events must occur simultaneously for the result to appear. (Complex failure modeling)&lt;/p&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;OR Gate: The result appears when any one of the input events occurs. (Individual cause modeling)&lt;/p&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Intermediate and Basic Events: The process of breaking down the top event into multiple intermediate events, which are then broken down into basic events (component failure, software error, human error, etc.) that cannot be further decomposed.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;Qualitative analysis vs. quantitative analysis&lt;/h4&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Qualitative analysis: Focuses on finding the most critical minimum cause combination (‘minimum cutset’) that triggers the upper-level event. If the cutset consists of a single basic event, it is a ‘single point of failure,’ which is a design flaw that must be eliminated in safety-critical systems!&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Quantitative Analysis: Assigns failure probabilities (e.g., FIT) to each basic event to calculate the overall probability of the upper-level event occurring. This is used to demonstrate compliance with the PMHF (probabilistic metric for random hardware failures) target required for ASIL D systems.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;h4&gt;FTA Case Study: “Unintended Steering” in the LKA System&lt;/h4&gt; 
&lt;p&gt;[Upper-level event] Unintended steering occurs in the LKA system&lt;/p&gt; 
&lt;p&gt;OR&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;[Intermediate event 1] Incorrect steering command from the ECU OR&lt;/p&gt; 
  &lt;ul&gt; 
   &lt;li&gt; &lt;p&gt;[Intermediate event 2] Damaged sensor data input OR&lt;/p&gt; 
    &lt;ul&gt; 
     &lt;li&gt; &lt;p&gt;[Basic event] Camera internal defect&lt;/p&gt; &lt;/li&gt; 
     &lt;li&gt; &lt;p&gt;[Basic event] CAN bus communication error&lt;/p&gt; &lt;/li&gt; 
    &lt;/ul&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;[Intermediate event 3] Software calculation error OR&lt;/p&gt; 
    &lt;ul&gt; 
     &lt;li&gt; &lt;p&gt;[Basic event] Algorithm logic defect&lt;/p&gt; &lt;/li&gt; 
     &lt;li&gt; &lt;p&gt;[Basic Event] Memory corruption (RAM)&lt;/p&gt; &lt;/li&gt; 
    &lt;/ul&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;[Intermediate Event 4] ECU hardware defect OR&lt;/p&gt; 
    &lt;ul&gt; 
     &lt;li&gt; &lt;p&gt;[Basic Event] Microcontroller defect&lt;/p&gt; &lt;/li&gt; 
     &lt;li&gt; &lt;p&gt;[Basic Event] Power supply (PMIC) defect&lt;/p&gt; &lt;/li&gt; 
    &lt;/ul&gt; &lt;/li&gt; 
   &lt;li&gt; &lt;p&gt;[Intermediate Event 5] Steering actuator malfunction OR&lt;/p&gt; 
    &lt;ul&gt; 
     &lt;li&gt; &lt;p&gt;[Basic Event] Motor driver defect&lt;/p&gt; &lt;/li&gt; 
     &lt;li&gt; &lt;p&gt;[Basic Event] Motor defect&lt;/p&gt; &lt;/li&gt; 
    &lt;/ul&gt; &lt;/li&gt; 
  &lt;/ul&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt; &lt;img width="1024" height="700" src="https://blog.hermessol.com/hs-fs/hubfs/Imported_Blog_Media/FTA_250703_eng-1024x700-1.png?width=1024&amp;amp;height=700&amp;amp;name=FTA_250703_eng-1024x700-1.png" alt=""&gt; &lt;/p&gt; 
&lt;h3&gt;Integration of Analysis: Interaction between FMEA and FTA&lt;/h3&gt; 
&lt;p&gt;FMEA and FTA are not simply individual analyses, but rather a pair that interact with each other to produce powerful synergy.&lt;/p&gt; 
&lt;h4&gt;FMEA and FTA: Complementary Partners&lt;/h4&gt; 
&lt;p&gt;These two techniques analyze problems from opposite directions and complement each other's weaknesses.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;Analysis Direction: FMEA is top-down (cause → effect), while FTA is bottom-up (effect → cause).&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Analysis Scope: FMEA broadly explores “all” failure modes of a specific part, while FTA deeply analyzes “one” specific failure cause.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;Strengths: FMEA excels at identifying component weaknesses, while FTA is strong at analyzing failure interactions in complex systems.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;FMEA provides the list of potential failure causes that FTA requires, and FTA indicates how critical these causes are to the system. Through this feedback loop, the FMEA team can focus on preventing the most critical failure modes from a system-wide perspective.&lt;/p&gt; 
&lt;p&gt; &lt;img width="1024" height="884" src="https://blog.hermessol.com/hubfs/Imported_Blog_Media/paragragh_03_250703.svg" alt=""&gt; &lt;/p&gt; 
&lt;p&gt;&amp;lt;Table 4: Comparison of FMEA and FTA&amp;gt;&lt;/p&gt; 
&lt;h3&gt;Conclusion: Safe cars are no longer a choice, but a necessity!&lt;/h3&gt; 
&lt;p&gt;We have taken an in-depth look at FMEA and FTA. These two analysis techniques are not simple activities, but a process of building core evidence to prove automotive functional safety.&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt; &lt;p&gt;FMEA: Verifies that all parts are designed to be robust and that failure modes are well managed.&lt;/p&gt; &lt;/li&gt; 
 &lt;li&gt; &lt;p&gt;FTA: Verifies whether the system architecture has sufficient resilience even in the event of a critical failure.&lt;/p&gt; &lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;All these analysis results are ultimately compiled into a “Safety Case,” which is used to logically prove how safe our vehicles are. This is a mandatory requirement for regulatory and certification agencies!&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;Beyond functional safety: SOTIF and cybersecurity!&lt;/h3&gt; 
&lt;p&gt;The scope of automotive safety is expanding. Now, in addition to functional safety (ISO 26262), we must also consider SOTIF (ISO 21448), which addresses safety in unexpected situations (sensor limitations, external environments, etc.), and cybersecurity (ISO/SAE 21434), which protects systems from hacking attacks. Future automotive engineering is evolving in a direction that encompasses all three of these areas.&lt;/p&gt; 
&lt;p&gt;In conclusion, thoroughly understanding and utilizing systematic analysis techniques such as FMEA and FTA is no longer an “option” but a core competency for modern automotive engineers. The most important first step in creating safe and reliable future automobiles lies here!&lt;/p&gt; 
&lt;p&gt;I hope this article has helped you understand automotive safety architecture design. I look forward to sharing more useful information with you in the future! Thank you.&lt;/p&gt;  
&lt;img src="https://track-na2.hubspot.com/__ptq.gif?a=245270049&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.hermessol.com%2Fen%2F2025%2F07%2F29%2Fblog_250703&amp;amp;bu=https%253A%252F%252Fblog.hermessol.com%252Fen&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>automotive safety</category>
      <category>FMEA</category>
      <category>safety design</category>
      <category>automotive development</category>
      <pubDate>Tue, 29 Jul 2025 02:52:15 GMT</pubDate>
      <author>info@hermessol.com (Hermes Solution)</author>
      <guid>https://blog.hermessol.com/en/2025/07/29/blog_250703</guid>
      <dc:date>2025-07-29T02:52:15Z</dc:date>
    </item>
  </channel>
</rss>
