News

Collaborative Risk-Sharing in Automotive Cybersecurity

Atefeh Asayesh
Published on Jul 09, 2025

Collaborative Risk-Sharing in Automotive Cybersecurity

Presented at ESCAR USA 2025 by Atefeh Asayesh

As modern vehicles become more connected and software-driven, cybersecurity threats no longer stop at organizational boundaries. Vulnerabilities in Tier 2 supplier components can propagate to Tier 1 supplier systems and all the way to the OEM — yet today’s TARA practices treat these risks in silos.

At ESCAR USA 2025, we introduced a Collaborative Risk-Sharing Framework that addresses this challenge by quantifying shared cybersecurity responsibility across the automotive supply chain.

What’s the Problem?

  • ISO/SAE 21434 mentions risk sharing — but provides no technical and practical method to do it.
  • Suppliers’ risks often remain hidden or misassigned.
  • There’s no consistent way to allocate mitigation responsibility or measure impact reduction efforts across stakeholders (cf. Figure 1). This can lead to a breach as described in Table 1.
Figure 1. Challenge Area -  Complex Risk Ownership Scenario
Table 1. Attack Path and Responsibilities

Our Proposed Solution

We developed a multi-step framework that enhances standard TARA by:

  • Modeling weighted, multi-dimensional impacts across safety, privacy, finance, and operations.
  • Applying stakeholder-specific mitigation factors to both impact and feasibility.
  • Calculating final residual risk using an extended formula aligned with ALARP (As Low As Reasonably Practicable) principles.
  • Clarifying ownership of shared risks and enabling defensible decision-making.

Note:  We also recommend introducing a simple Cyber Risk Contract between stakeholders to clearly define roles, responsibilities, and expectations for cybersecurity ownership throughout the supply chain. Our proposed solution is summarized in Figure 2. 

Figure 2. Proposed Risk Sharing Model

Who Benefits?

  • OEMs gain better insight into inherited supplier risks and can act accordingly.
  • Tier 1 and Tier 2 suppliers can demonstrate proactive risk reduction.
  • Auditors and insurers can assess how well risks are being managed collaboratively — before a breach happens.

Download the full paper

Download

Stay Connected with Block Harbor

Keep up with the latest in vehicle cybersecurity through our specialized newsletters. Choose the option that best fits your interests and role.

Block Harbor Stakeholders

Newsletter for folks that want updates on what's next for Block Harbor.

Thank you for your submission!

Oops! Something went wrong while submitting the form.

Read More

Explore more automotive cybersecurity insights from our experts. Discover best practices, case studies, and emerging trends to strengthen your organization's security posture.

Industry
Why TARA Matters in Medical Devices

As medical devices become more connected, the need for structured cybersecurity grows. This post compares how automotive and healthcare industries handle risk—and how TARA can help medical device makers move from reactive compliance to proactive protection.

Learn More
Regulatory
Know the “Where” of your Firmware

New firmware scanning feature in VSEC lets OEMs verify country-of-origin for software packages—critical for compliance with Rule 791D’s ban on Chinese and Russian components in connected vehicles.

Learn More
Industry
Rule 791D: The Ban on Chinese & Russian Tech in Connected & Autonomous Vehicle Systems

The Department of Commerce rule banning Chinese and Russian software and hardware in connected vehicles is live and in effect. Automakers and their supply chains have until model year 2027 to comply.

Learn More
Industry
Assessing Automotive Cybersecurity Management System (CSMS) Compliance

Discover strategies to protect automotive supply chains from cybersecurity threats. Learn how to identify vulnerabilities and implement effective security measures across the vehicle ecosystem.

Learn More

Try Block Harbor Today

Start protecting your vehicles with the same platform the world’s best hackers and defenders use.