Next Article in Journal
Pixel Circuit Designs for Active Matrix Displays
Previous Article in Journal
Identification, Control, and Characterization of Peristaltic Pumps in Hemodialysis Machines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering

Institute for Engineering Design, Technische Universität Braunschweig, Hermann-Blenk Strasse 42, 38108 Braunschweig, Germany
*
Author to whom correspondence should be addressed.
Appl. Syst. Innov. 2025, 8(2), 45; https://doi.org/10.3390/asi8020045
Submission received: 20 December 2024 / Revised: 10 March 2025 / Accepted: 21 March 2025 / Published: 31 March 2025
(This article belongs to the Section Control and Systems Engineering)

Abstract

:
The increasing number and complexity of cyber–physical systems in vehicles necessitate a rigorous approach to identifying functional safety and cybersecurity hazards during the concept phase of product development. This study establishes a systematic method for identifying safety and security requirements for E/E components in the automotive sector, utilizing the SysML language within the CAMEO environment. The method’s activities and work products are grounded in the ISO 26262:2018 and ISO/SAE 21434:2021 standards. Comprehensive requirements were defined for the method’s application environment and activities, including generic methods detailing the creation of work products. The method’s metamodel was developed using the MagicGrid framework and validated through an application example. Synergies between the two foundational standards were identified and integrated into the method. The solution generation was systematically described by detailing activities for result generation and the production of standard-compliant work products. To facilitate practical implementation, a method template in SysML was created, incorporating predefined stereotypes, relationships, and tables to streamline the application and enhance consistency.

1. Introduction

The integration of autonomous functions into vehicle concepts necessitates rigorous verification of functional safety to ensure compliance with approval and homologation requirements throughout the vehicle lifecycle. Over-the-air updates, increased interconnectivity of vehicle systems, and the sensitivity of data exchanged across diverse networks demand continuous monitoring and assessment of cybersecurity for each vehicle component [1]. The update strategies and digital functionalities of modern vehicles require a unified approach to maintaining functional safety and cybersecurity across all lifecycle phases, enabling coordinated development of vehicle components. The capability to add or modify functions post-deployment introduces a paradigm shift in design, emphasizing the necessity of early planning for potential future functionalities during the concept phase of vehicle development [2]. This requirement underscores the critical need for a method that facilitates the early identification of functional safety and cybersecurity. This study aims to establish a method for defining the comprehensive functional safety and cybersecurity requirements of electrical/electronic (E/E) vehicle components. The proposed method is designed to ensure compliance with relevant functional safety and cybersecurity standards. It will be fully implementable in the systems modeling language (SysML) and compatible with development environments utilizing model-based systems engineering (MBSE). The scope of the method is confined to the concept phase of the product lifecycle, ensuring precise and early-stage requirements identification.

2. State of the Art

2.1. Systems Engineering

Systems engineering (SE) aims to manage increased complexity and achieve a cross-disciplinary optimum within the financial and time constraints of a project. A strong emphasis is placed on user-centered development, enabled by focused requirement management and requirements engineering (RE). This focus on stakeholder requirements increases the efficiency of product development as the process is not slowed down by addressing irrelevant issues [3,4]. The early phase identification of requirements and design constraints and concepts speeds up and reduces the costs of development, as shown, for example, for hydrogen refueling stations in [5].

2.2. Model-Based Systems Engineering

The effective implementation of document-based systems engineering is hindered by the complexity and volume of information as data are dispersed across multiple documents. Model-based systems engineering (MBSE) addresses these limitations by using digital models instead of documents to store information [6]. MBSE establishes a framework for effective, consistent SE application within teams while being adaptable to specific tasks [7]. Unlike traditional SE, which relies on isolated documents, MBSE uses the model as the central foundation for development and communication, offering several advantages. By capturing all relevant development information directly in the model, MBSE improves stakeholder communication and knowledge retention. It enables the management and development of complex systems by constructing models with the necessary complexity [6]. MBSE employs a consistent language for describing problems and solutions and facilitating system validation and the verification of requirements [7]. Successful MBSE implementation requires the integration of a modeling language, modeling tool, and modeling approach [8]. The spread of MBSE-based modeling in the safety and security space is shown in Figure 1 (right) where the standard ISO 26262:2018 [9] uses the SysML language to define one of its terms, in this case for the definition of the term ITEM.

2.3. Safety and Security Engineering

Safety and security aim to mitigate system risks but target distinct hazards. Safety addresses unintentional risks arising from system vulnerabilities, aiming to prevent accidents, and is categorized into product safety (focused on fault-free operation, including the safety of the intended functionality, SOTIF) and functional safety (addressing faults or malfunctions) [11]. Security mitigates intentional threats to E/E components of cyber–physical systems (CPS). It comprises functional security (protecting software from unauthorized access, modification, or suppression during development and operation) and information security (safeguarding data from unauthorized access) [11]. The foundational standards underlying the method to be developed are ISO 26262:2018 [9] and ISO/SAE 21434:2021 [12]. The identification of functional safety requirements for vehicle components is described in ISO 26262:2018 [9], while cybersecurity requirements are identified within the framework of ISO/SAE 21434 [12]. While the focus of this paper is on the cybersecurity framework developed specifically for the automotive industry, it is crucial to mention the General Data Protection Regulation (GDPR) [13] and the California Consumer Privacy Act (CCPA) [14] due to the fact that private data are collected during vehicle operation. Benyahya et al. point out that the application of GDPR is required and must be carried out together with the UN ECE R155 and R156 [15]. A possible GDPR-centered analysis for CAVs is shown by Benyahya et al. [16].

2.4. Interfaces of the Safety and Security Engineering

Safety and security often conflict, requiring prioritization strategies in CPS development. Success depends on aligning objectives, ensuring consistency, and addressing goal conflicts highlighted by ISO 26262:2018 [9]. However, ISO/SAE 21434 [12] lacks focus on safety interfaces, underscoring the need to synchronize safety and security lifecycles early in the design phase [17]. Safety and security analysis frameworks, such as HARA and TARA, share structural similarities, including fault and attack tree analyses, FMEAs, and verification techniques. Effective implementation requires a synchronized information flow, facilitated by integration with systems engineering (SE). This approach embeds control points in lifecycle models and ensures stakeholder inclusion [17]. A possible approach to integrating the safety and security activities is shown in Figure 1 (left).

2.5. Safety and Security Engineering in MBSE

The scientific literature deals with the integration of safety and security engineering into the MBSE environment from three perspectives: application examples, frameworks as well as approaches, and the implementation of individual safety/security-relevant frameworks (e.g., FMEA). The focus of this literature review is on analyzing methods, approaches, and frameworks. In the context of functional safety, Meyers et al. [18] describe the aSET approach, a high-level metamodel implemented in SysML from the concept phase to the HW/SW engineering phase. A profile implemented in UML for functional safety requirements based on ISO 26262:2018 [9] was developed by Frese et al. [19] for use in automated driver assistance systems. The implementation of parts of safety in MBSE as an interface between the document-based component model and the Matlab model for validation was described by Dybov et al. [20]. Safety–MBSE integration has been taken up by the Object Management Group (OMG) with the aim of supplementing it with safety applications from the perspective of the SysML environment. The OMG’s safety specification for SysML consists of a metamodel that supplements SysML with the necessary stereotypes and enables FTA, FMEA frameworks, and the implementation of HARA [21,22].
Metamodel-based approaches to integrating standards-based processes with MBSE solutions are also available in cybersecurity. Based on a template and SysML stereotypes, Mazeika et al. [23] have shown how a cybersecurity concept can be modeled in SysML. The cybersecurity process from requirements to solutions has been adapted by Larsen et al. [24] as a process model for MBSE, focusing on the identification of security requirements in the early stages of development in the context of aerospace. Oates et al. [25] describe the translation of cybersecurity threats into SysML with the security-aware systems engineering approach whereby the aim is the early integration of the threats into the SysML model of the product. The HEAVENS approach describes the security process from the TARA to the definition of the security requirements. The HEAVENS approach was implemented together with the processes of ISO 26262:2018 by Häring et al. [26] using the IBM Rhapsody framework in SysML, which enables the implementation of the safety and security analysis from the ITEM definition to the technical safety concept. Stakeholder information was transferred to the MBSE context by Japs et al. [27] and used as the basis for the hazard analysis of safety-relevant cybersecurity hazards. The relevance of integrating MBSE and safety/security is also shown by the fact that the manufacturer of one of the most prominently used tools for MBSE, Dassault Systems, released packages that contain the modeling elements for certain parts of the base standards [28,29].
The analysis of the scientific literature shows that the implementation of the base standards in an MBSE context is widespread. The safety and security processes, conforming to the base standards, were carried out by Häring et al. [26]. The general focus of the scientific work in the subject area analyzed is on the implementation of the base standards or frameworks, such as TARA, as metamodels or templates for carrying out safety and security activities. Outside the focus of the publications is the integration of safety and security management into the method, the possible tailoring approaches depending on the use cases of the method, the detailed modeling of the individual activities from the perspective of method and information flow, and the modeling of the application environment of the method as a prerequisite for conformity with the base standards.

2.6. Research Questions

Based on the analysis of the current literature in Chapter 2.5, the following aims are defined for this paper:
Question 1: Implement a method to identify safety and security requirements for the concept phase of product development utilizing the capabilities of the MBSE framework.
Question 2: Integrate steps into the method, which have not been, till now, the focus of research, such as safety and security management and the detailed (meta)modeling of activities prescribed in the base standards.
Question 3: Integrate the safety and security activities as much as possible to utilize the synergies and duplicities of the activities within the MBSE framework.

3. Materials and Concepts

3.1. Software Tool

The modeling language used in this paper, SysML, is a graphical language. The information stored in the model is represented via a group of views or diagrams [26]. CAMEO SYSTEMS MODELER (CSM, Version: NoMagic 2022x Golden), the software in which the modeling is carried out, is a cross-platform, collaborative modeling tool from Dassault Systems that enables integration with a variety of other engineering tools from Dassault Systems. The metamodel of the method was created based on the CAMEO internal modeling framework MagicGrid. However, the framework must be adapted to the modeling of a methodology. This framework can be used for the entire SE lifecycle because the grid model is best suited for representing the various aspects and views of a methodology and because the master thesis is carried out in the native system of the MagicGrid methodology, in CAMEO [30].

3.2. Information Management of the Method

The methodology is based on the evaluation of the ISO 26262:2018 [9] and ISO/SAE 21434:2021 [12] standards, which, in this paper, are referred to as base standards. The method uses two specific sources of external information: “ENISA: Good Practices for smart cars” [31] and “UN ECE R 155” [32], which contain the checklists for cybersecurity asset identification and cybersecurity threats and mitigation approaches. Input data for the safety and security activities, as outlined in Table 1, is categorized into internal and external information. Internal data pertain to the organization, project, or ITEM under analysis, while external data include supplementary standards, guidelines, or checklists supporting specific activities of the method. These are further complemented by frameworks such as “HazOp”.

3.3. Development Strategy

The development of the method is conducted by adapting the V-Model (Figure 2). Before the principal development, the concept of the method is outlined; this is accomplished by analyzing relevant stakeholders and their views. The views and the previously acquired general knowledge are the basis for the definition of the requirements and relevant measures of effectiveness. Based on the analysis of relevant standards, the structure of the method is defined, which is then broken down to its elements. The elements are then implemented in CAMEO using SysML and integrated according to the MagicGrid framework.

3.4. Generic Activities

The foundational standards define the safety and security frameworks as sequential activities with specified input and output information but do not provide detailed procedures for execution. During the analysis of the base standards, six generic activities were implemented, to be assigned to each activity of the method, enabling a generic description of each task. The DETERMINE generic activity uses predefined checklists or formulas to generate output without creative input. The DEFINE generic activity and DEVELOP generic activity require high creativity: the DEFINE generic activity applies concepts such as brainstorming, while the DEVELOP generic activity adapts generic approaches to the project context for tailored solutions. The ALLOCATE generic activity aligns existing information, while the ASSEMBLE generic activity both aligns and generates target information. The CATEGORIZE generic activity segments input into comprehensive, context-specific values. An overview of these generic activities is provided in Table A1.

3.5. Tailoring

The term “Tailoring” refers to the adaptation of frameworks prescribed by standards or guidelines to suit the specific conditions of a project. During safety-tailoring, the requirements of ISO 26262:2018 [9] must be observed, while during security-tailoring, the requirements of ISO/SAE 21434:2021 [12], along with the demands of the safety and security frameworks and the environmental requirements of the method, must be taken into account, as shown in Table A2, Table A3, Table A4 and Table A5. The goal of tailoring is to define a process that complies with standards at every step, meets process requirements, and can be executed within the constraints of the existing environment.

3.6. Identification of Synergies

Identifying synergies between safety and security frameworks optimizes time, resources, and collaboration among teams. These synergies, detailed in Table 2, are identified by comparing activities and work products. Synergies exist in preliminary safety/security management and ITEM definition. Preliminary management benefits from shared execution environments and pooled resources, enabling efficient scheduling. However, separate work products are required to comply with standards and facilitate independent regulatory submissions. A joint ITEM definition is viable as foundational standards align in this area, though ISO 26262:2018 [9] demands more detailed ITEM environment documentation than ISO 21434:2021 [12]. HARA focuses on ITEM functions, while TARA addresses cybersecurity assets, preventing alignment and synergy. Concept development shares approaches in requirements engineering and hazard/threat evaluation but lacks significant synergies due to differing inputs from TARA and HARA and their distinct scopes.

4. Development of the Method

The modeled content, shown in Figure 3, showcases the artifacts of the method development, documented in a tailored version of the MagicGrid framework, and the details for the tailoring of the model are described in Table A6.

4.1. Stakeholder Viewpoints

Based on the project goals, the stakeholders, listed in Table 3, were identified as relevant from the perspective of the method. The successful development of the method is based on the identification of objective requirements that are expressed by all stakeholders of the project. Three stakeholder groups were identified as part of the method: project engineering (responsible for the course of the project and communication, and exchange with external partners), management (responsible for costs, infrastructure, organizational culture, and acquisition), and safety and security engineering (users of the method).

4.2. Use Cases

Based on the analysis of the base standards and taking the stakeholder viewpoints and the project scope into consideration, the use cases were identified. The identified use cases can be divided into four categories: Project Management, Defining the ITEM, Analyzing the Risk, and the Concept of Risk Mitigation. The use cases were assigned to the stakeholders derived from the safety and security engineering stakeholder group. In order to anchor conformity with the standards early on in the development of the method, the three phases including project management, the safety- and security relevant aspects of an ITEM, and the project objective were modeled separately as included use cases.

4.3. Method Environment

The analysis of the base standards resulted in the identification of the requirements for the method environment that must be met to achieve standard compliance, as described in Table A7. The base standards define specific requirements for the management of safety and security at the organizational level (e.g., culture, management, and infrastructure, including competences), but the implementation of permanent security activities must be also demonstrated for the security framework. Permanent cybersecurity activities are responsible for monitoring the cyber(security) environment of the ITEM and potential threats.

4.4. Measurements of Effectiveness

The requirements derived from the project requirements are supplemented by measures of effectiveness (MoEs) in the evaluation of the method. MoEs are parameters that are measurable, which can only be determined by using the method in its application environment. The MoEs that were identified are average education time required by employees to utilize the method, comparative rate of successful approvals by the relevant authority, average timesaving compared to projects not using the method, adoption rate by employees, number and severity of incidents that occurred compared to other approaches, and rate of unsuccessful attempts of using the method.

4.5. Requirements of the Method

The requirements of the method (Table 4) are derived from the stakeholder viewpoints (Table 3). The requirements of the method specify and formalize the intended scope and objective of the development of the method further.

4.6. Activities

The use cases of the method were further specified as activities, which consist of chapters, subchapters, requirements, and work products which were kept during the tailoring frameworks of the base standards, documented in Table A8, Table A9, Table A10 and Table A11.
The main activities and support activities of the method are carried out iteratively. This iterative approach is shown in the parallelization of the activities (Figure 4—top). The activities model forms the spine of the method as it summarizes all the activities required to meet the normative requirements. Activities possess two types of input information: work products created in previous steps and external information (Figure 4—bottom). The output information is arranged on the right-hand side of the activities and contains the work products created during the execution of the activity.

4.7. Work Products

The analysis of activities and their tailoring shows which work products must be provided to complete the method; these are summarized in the work product diagram (Table A12 and Table A13). The tables also contain the allocation of generic activities to the work products.

4.8. Requirements for the Application of the Method

Based on the requirements of the method (Table 4) and the requirements for the method environment (Table A7), the requirements for the application of the method are derived. The requirements for the application of the method summarize and define the conditions under which the method can be used (Table A14).

4.9. Flowchart of the Method

The procedure for implementing the method can be derived from the analysis of the base standards and the tailoring of the activities (Figure A1). Starting from the overview of the method (Figure 5), each chapter is further subdivided and specified in a diagram assigned to it until each activity of the method is modeled (Figure 6). An activity has three types of input information: DATA—information that is the basis for performing the procedure element; STEREOTYPES—the stereotypes used to model the outcome of the procedure; and METHOD—one of the methods specified in Table A1 that describes how the activity must be created. The method procedure refers to the initial processing of the activities; the iterative approach to processing has already been illustrated in the activity diagram, in which the method can only be completed by creating each defined work product.

4.10. Template of the Method

The methods template was created based on the analysis of the base standards and the procedures defined in Section 4.9. The method template contains all the elements, stereotypes, and relations required to fully implement the safety and security frameworks within the SysML language. The overview of the template of the method is shown in Figure A1.

4.11. Achieved Measures of Effectiveness

The MoEs defined in Section 4.4 (Measurements of Effectiveness) are assigned target values during the adaptation of the method to its specific application environment. The target values of the MoEs must be measurable, realistic, and objective. The validation of the MoEs is outside the scope of this paper and must always be carried out for the specific application environment. Achieving the target values of the MoEs depends on factors such as workshop quality, infrastructure, project type, and the type of product under investigation.

5. Use Case

The use case serves as an example of how to model a system’s safety and security characteristics. Its goal is not to provide a concrete example of a fully modeled vehicle E/E system.

5.1. Preliminary Management

The method begins with preliminary safety and security management where work products and their tailoring status are documented. Each work product’s inclusion or exclusion must be justified via a tailoring rationale. Activities responsible for generating these work products are specified, detailing objectives, responsibilities, required resources, and supporting tasks in compliance with normative standards. Supporting activities, as mandated by ISO 26262:2018 [9], such as verification procedures and ASIL (automotive safety integrity level) decomposition, must be defined for the safety framework. A schedule for developing safety and security work products is then established, often visualized using Gantt charts in the CAMEO environment, with time units represented as “Timeframe Elements”. The method defines project goals and scope to address key questions and specify required requirements and concepts. Goals clarify the intended use, while the scope identifies project limitations, areas excluded, and the necessary detail level for work products. Documenting goals and scope contextualizes project decisions and ensures clarity, often represented as requirements diagrams, subdivided into safety and security diagrams if needed. The diagrams of the model are shown in Figure A2, Figure A3, Figure A4 and Figure A5.

5.2. Unified ITEM Definition

The ITEM definition consolidates all available information to ensure a shared understanding among stakeholders. It serves both safety and security frameworks, with ISO 26262:2018 [9] requiring a detailed description of the ITEM’s environment, functions, and impact on the vehicle. The analysis of ITEM boundaries and interfaces must document internal elements and shared interfaces with external ITEMs. Both black-box and grey-box models are required to specify interface types (e.g., mechanical, logical, electrical), varying by project. The ITEM architecture, modeled as a white-box view, describes its elements and interfaces. This may include decentralized or external elements for clarity. Functions are modeled as requirement sets detailing ideal behavior and limitations and as process models capturing activity sequences. Use cases define the ITEM’s purposes and interactions, further refined with additional requirements. The ITEM environment encompasses operational conditions, including climate, infrastructure, digital connectivity, and repair access. Lifecycle requirements address the ITEM’s needs across phases: development/testing, manufacturing, operation, service, and decommissioning. While focused on early phases, understanding later stages aids in tailoring safety and security requirements. The diagrams of the model are shown in Figure A6, Figure A7 and Figure A8.

5.3. Hazard Analysis and Risk Assessment

In the Hazard Analysis and Risk Assessment (HARA), hazard scenarios are identified and assigned an ASIL (automotive safety integrity level) rating, which determines safety goals to mitigate risks. HARA begins with defining operational situations relevant to the ITEM, characterized by attributes, categories, and an exposure value indicating operational frequency. Malfunctions are identified via a HazOp procedure, categorizing failures in functionality. Accident scenarios arise from malfunctions occurring in specific operational situations, with each scenario assigned a controllability rating to assess manageability by the driver. From accident scenarios, hazardous events are identified, representing situations that may lead to accidents. Hazards—conditions or behaviors arising from malfunctions—are documented and linked to hazardous events using tailored HazOp or FMEA frameworks. Multiple hazards may correspond to a single hazardous event and vice versa. Effects of hazardous events are defined at both ITEM and vehicle levels, linked to specific elements, and assigned a severity rating. Ratings range from severe (e.g., collisions) to minor (e.g., slow driving). Severity, controllability, and exposure ratings collectively determine ASIL values. Each hazardous event requires at least one safety goal, aimed at reducing associated risks to acceptable levels. The diagrams of the model are shown in Figure A9, Figure A10, Figure A11, Figure A12, Figure A13 and Figure A14.

5.4. Threat Analysis and Risk Assessment

The Threat Analysis and Risk Assessment (TARA) identifies, evaluates, and assigns risk treatment decisions to attack scenarios affecting the ITEM. These decisions define how risks are managed in the security concept. Assets, the cybersecurity-relevant components of the ITEM, are assigned to ITEM elements and identified using the ENISA checklist [27]. Multiple assets, such as software, status, data, and configurations, may correspond to a single element. Damage scenarios, linked to specific assets and cybersecurity properties (availability, integrity, confidentiality), describe potential harm and vehicle impact. Unclear scenarios are divided for precise property assignment. The case study iteratively developed damage scenarios by analyzing asset vulnerabilities across these properties. Threat scenarios outline potential threats to ITEM assets, identified via the UN ECE R 155 checklist [28]. Each scenario is associated with a cybersecurity property, and ambiguous scenarios are subdivided as necessary. An impact Rating assesses each damage scenario’s effect on safety, financial, operational, and privacy (SFOP) attributes, with a rating assigned for each category. Attack paths detail attack steps for ITEM assets. Each threat scenario is linked to attack approaches, which are further divided into steps. In the case study, attack paths traced vulnerabilities to ITEM boundaries. Non-ITEM system attacks are also considered in the security concept. Attack feasibility ratings evaluate the practicality of attack approaches based on factors such as time for vulnerability identification, required resources, available knowledge, and execution windows. Risk ratings are calculated for each attack approach using impact and feasibility ratings. Based on these ratings, risk treatment decisions determine whether risks are acceptable, redistributed, or mitigated in the security concept. Risk treatment decisions are tabulated for attack approaches and threat scenarios. If any decision mandates risk reduction, the corresponding threat scenario requires mitigation. These decisions form the basis for security concept requirements. The diagrams of the model are shown in Figure A15, Figure A16, Figure A17, Figure A18, Figure A19, Figure A20, Figure A21, Figure A22 and Figure A23.

5.5. Functional Safety Concept

The functional safety concept aggregates functional safety requirements, defining the measures needed to reduce ITEM risks to acceptable levels. It serves as the foundation for specifying ITEM functions via technical safety requirements within the technical safety concept. Functional safety requirements, derived from safety goals, are implemented using ISO 26262:2018 [9] strategies such as fault prevention, detection, or driver warnings. Each requirement is assigned a single safety strategy and describes the functions necessary to achieve safety goals without specifying technical solutions. Requirements are allocated to ITEM elements or external vehicle components. Further specification uses predefined categories, with updates required for values determined in later development phases. The functional safety concept collectively underpins the technical safety concept. The diagrams of the model are shown in Figure A24 and Figure A25.

5.6. Technical Safety Concept

The technical safety concept comprises all technical safety requirements, defining the system-level implementation of functional safety requirements and guiding hardware (HW) and software (SW) development. Technical safety requirements are derived from functional safety requirements, providing specific technical solutions. Each functional safety requirement must have at least one corresponding technical safety requirement, which should be subdivided if it applies to multiple functional safety requirements or relates specifically to HW or SW to ensure traceability. These requirements must be detailed using predefined categories, with updates for values determined in later development phases, and must be assignable to specific ITEM functions. The diagrams of the model are shown in Figure A26 and Figure A27.

5.7. Security Concept

The security concept defines the cybersecurity requirements necessary to reduce the ITEM’s vulnerability to cyberattacks, forming the basis for its technical specification and lifecycle development. For threat scenarios with acceptable risks, cybersecurity claims document the justification. Each threat scenario is assigned a cybersecurity assurance level (CAL), determined by evaluating the attack impact (severity) and attack vector (attack approach). The CAL dictates the evidence required for validating ITEM security. For threat scenarios requiring risk reduction, cybersecurity goals are defined, specifying the target state to achieve acceptable risk. Each goal is supported by at least one cybersecurity requirement, detailing measures for prevention, detection, and monitoring. These requirements must be linked to ITEM elements and include operational environment requirements specifying conditions for fulfillment. The diagrams of the model are shown in Figure A28, Figure A29 and Figure A30.

5.8. Continual Management

The continual management of safety and security activities involves the documentation of the generated work products within the safety case and security case. Upon completion of an activity, all resulting work products must be added to the respective safety or security case. The safety or security cases do not have predefined templates.

5.9. Conclusive Management

As part of conclusive management, the work products required for verifying the safety and security status of the ITEM are compiled. The method’s documentation is submitted during the safety audit, while the work products are provided to the regulatory authority or the independent safety assessor (ISA) as part of the safety confirmation review. The cybersecurity assessment consolidates the work products from the cybersecurity framework.

6. Results

This study presents a novel method that integrates safety, security, and their management aspects within a comprehensive model-based systems engineering (MBSE) method for automotive electrical and electronic (E/E) systems. To the best of our knowledge, this is the first study to consolidate these three critical domains into a unified and structured method. Unlike previous research trends, which have primarily addressed safety and security separately, this study introduces a method for the generation of work products as required by relevant standards. The proposed method defines six generic activities that algorithmize the process of identifying and implementing solutions, thereby providing a systematic and repeatable method for addressing safety and security challenges in automotive E/E systems. A significant outcome of this research is the establishment of an MBSE method that incorporates specifically defined stereotypes and relationships. This structured approach enhances traceability and facilitates collaboration throughout the development lifecycle by providing a formalized means of linking requirements, models, and design elements. The structured representation supports seamless communication among stakeholders and ensures compliance with regulatory requirements. Furthermore, the study includes an in-depth analysis of normative requirements and their systematic translation into a step-by-step process model. This method formalizes the transformation of abstract regulatory mandates into practical, executable engineering workflows, thereby bridging the gap between compliance requirements and their implementation in development processes.

7. Discussion

Implementing the method in SysML enhances comprehension by reducing textual explanations and minimizing misunderstandings. Unlike base standards, which define work products and their requirements, the method provides detailed guidelines on activity order, required information, and interconnections, supporting creative problem-solving while leaving solution identification to users. Safety and security framework synergies were identified, particularly in project management and ITEM definition. Common templates and activities may reduce processing time, but the extent is project-dependent and requires validation. Incorporating technical safety requirements (TSRs) ensures functional safety requirements (FSRs) are achievable. TSRs also aid in developing security requirements by prescribing connections or defining new cybersecurity assets. TSRs guide sub-discipline development but must be documented to clarify their flexibility and prevent misinterpretation as fixed constraints. Safety and security requirements must be evaluated to address conflicts, such as safety’s preference for redundant controls versus cybersecurity’s aim to minimize assets at risk. Integrated processing resolves such conflicts, but awareness of these trade-offs is essential throughout the method. Completeness of requirements is guided by standards and verified through work product reviews, though subjective assessment by project leaders remains necessary. Internal reviews ensure safety and security aspects are fully addressed. Unlike approaches reviewed in the literature, this method includes a management phase, enabling early capacity, information, and evidence planning for standard compliance, thus improving resource allocation for the concept phase. A unified ITEM definition prevents redundant activities, ensures consistent asset and function assignment, and maintains coherence in integrated safety and security concepts, avoiding the misalignment caused by separate ITEM definitions.
The application of this method is limited to the scope of its base documents, that is, the E/E architecture development of vehicles. Furthermore, its focus lies solely on the concept phase of the development process, finishing with the requirement definition for the system concept. The developed system, if accomplished according to the method, is compliant with the base documents; however, country-specific requirements are not taken into account. The method also presupposes the common responsibility and availability of data for both the development of functional safety and the cybersecurity concept of the system. While the combined implementation of the safety and security activities in SysML at this scope is a novel concept, during further studies its real-life applicability must be tested “in-the-field”. While the general applicability of the method has been tested on a basic model, the method must be verified on systems with real-life complexity. Possible “in-the-field” validation or verification of the method would entail its use within the development process of an actual automotive E/E component, ideally within multiple development processes, to determine its averaged performance compared to the classical, separate approach.

8. Conclusions

This paper defines a method for identifying safety and security requirements for E/E components in the automotive sector, developed in SysML using the CAMEO environment. Unlike existing approaches that focus on specific frameworks or approaches of base standards, this method integrates the entire safety and security framework of the concept phase, emphasizing standard conformity and a structured approach to creating work products. The method aims to simplify the implementation by detailing process steps, reducing the amount of double work and offering a supporting method for interpreting the tasks described in the base standards. Addressing the entire concept phase enables leveraging synergies between safety and security analyses, reducing the number of required work products, due to eliminating duplicities. Early identification of safety and security requirements facilitates their integration into the development process. While research primarily focuses on engineering phases (e.g., ITEM definition, HARA, TARA, concepts), this method incorporates management aspects, essential for standard compliance. Effective project management, which has not been integrated in the reviewed frameworks, aims to support the successful completion of activities. The method’s requirements, activities, and work products were derived from base standards and modeled as a SysML metamodel. Expanding the method across all lifecycle phases could enhance accessibility and improve diagram representation, such as preliminary management scheduling. Integrating machine learning (ML) could enable an intelligent solution catalogue to assist in HARA, TARA, and requirement definition tasks by suggesting solutions based on project data. Implementing model or property checking could automate requirement analysis, validation, and verification, improving the evaluation of SysML-based model instances.

9. Outlook

The method’s validation requires application across diverse projects to evaluate measures of effectiveness (MoEs) and quantify synergies. If MoEs are unmet, adjustments can be informed by collected data. Initially developed for the conceptual phase, the method can extend across all lifecycle phases, avoiding redundant steps like ITEM definition, HARA, and TARA while enabling comprehensive evaluation of safety and security requirements. Implemented in CAMEO with predefined elements, the method improves clarity and efficiency. Expanding this method across all phases could enhance accessibility, simplify usage via CAMEO’s resource center, and improve diagram representation, such as preliminary management scheduling. While reliant on user expertise for creative solutions, the method could benefit from a solution catalogue augmented by machine learning (ML) to suggest solutions for HARA, TARA, and requirement definition tasks using project data. Incorporating product safety or SOTIF (ISO 21448:2021 [33]) would enable addressing scenarios like environment sensing and CAV control robustness. Documentation tools for automated safety and security reports would streamline communication with regulatory authorities, reducing processing time. Another possibility for the further development of the method is the utilization of model or property checking. This would support the evaluation of the model instances created by using the method in the SysML language. The adoption of model or property checking could be used to automate requirements analysis, validation, and verification.

Author Contributions

Conceptualization, B.N.; methodology, B.N. and A.S.; modeling, A.S.; investigation, A.S.; writing—original draft, B.N. and A.S.; writing—review and editing, B.N. and A.S.; supervision, B.N. and T.V.; validation B.N.; visualization, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

The publication of this paper has been funded by the TU Braunschweig Publication Fund.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

This work was conducted in the context of the project “ReTraSON” (Regionales Transformationsnetzwerk Südostniedersachsen), which is funded by the “Bundesministerium für Wirtschaft und Klimaschutz” (Federal Ministry for Economic Affairs and Climate Action).

Conflicts of Interest

The authors declare no conflicts of interest.

Nomenclature

ACTActivity Diagram
ASILAutomotive Safety Integrity Level
AVAutonomous Vehicle
AVPAutomated Valet Parking
BDDBlock Definition Diagram
CADComputer-Aided Design
CANController Area Network
CALCybersecurity Assurance Level
CAVCooperative Autonomous Vehicle
CCPACalifornia Consumer Protection Act
CMCooperative Maneuvering
CSMCAMEO Systems Modeler
E/EElectric/Electronic
UNECEUnited Nations Economic Commission for Europe
ECUElectronic Control Unit
ENISAEuropean Union Agency for Cybersecurity
FAS(Driver Assistance System)
FEMFinite Element Method
FMEAFailure Mode and Effects Analysis
FSRFunctional Safety Requirement
FTAFailure Tree Analysis
GDPRGeneral Data Protection Regulation
HARAHazard Analysis and Risk Assessment
HWHardware
IBDInternal Block Diagram
IECInternational Electrotechnical Commission
IEEEInstitute of Electrical and Electronics Engineers
INCOSEInternational Council on Systems Engineering
IoTInternet of Things
ISAIndependent Safety Assessor
ISOInternational Organization for Standardization
MBSEModel-Based Systems Engineering
MoEMeasures of Effectiveness
OMGObject Management Group
PARParametric Diagram
PKGPackage Diagram
RAM(S)Reliability, Availability, Maintainability (Safety)
RERequirements Engineering
REQRequirement
SAESociety of Automotive Engineers
SDSequence Diagram SE Systems Engineering
SFOPSafety, Financial, Operational, Privacy
SoISystem of Interest
SoSSystem of Systems
SOTIFSafety of the Intended Functionality
STMState Machine Diagram
SWSoftware SysML (Systems Modeling Language)
TARAThreat Analysis and Risk Assessment
TCUTelematics Control Unit
TSRTechnical Safety Requirement
UCUse Case Diagram
UMLUnified Modeling Language
UPDMUnified Profile for DoDAF/MODAF
V2XVehicle to X
VANETVehicular ad hoc Network
VDAVerband der Automobilindustrie
VDIVerein Deutscher Ingenieure

Explanation of “In-Paper” Terminology

MethodThe method is the specific process that this paper aims to develop and to describe
Generic ActivityA group of six tasks that characterize how to carry out the tasks described in each step of the method (Section 3.4)
ActivityThe concrete task one must complete to advance to the next step of the method
Main ActivityActivity defined as such by a base standard
Support ActivityActivity defined as such by a base standard
FrameworkA basic concept already established independently of the method, here referenced
ApproachOne way of completing one task, where multiple correct options can be chosen

Appendix A. Generic Activities

Table A1. Generic activities.
Table A1. Generic activities.
Generic ActivityDETERMINEALLOCATEDEVELOPDEFINECATEGORIZEASSEMBLE
Number/Status of Inputsn/definedn/defined1/defined1/defined1/definedn/defined
Number/Status of Outputs1/defined1/definedn/undefinedn/undefinedn/undefined1/undefined
Description of the MethodDetermines output using formulas, rules, or tables based on inputs, where calculated elements constitute the outputMaps input to an existing element, with the mapping forming the outputCreates a framework of categories based on input, considering context; categories are the outputDetermines output using creative techniques applied to input, taking context into accountCreates categories dividing input range into distinct parts, considering context; categories form the outputMaps input to a newly defined element; both the mapping and new element constitute the output
ExampleDetermining the ASIL valueMapping the type of interfaces to individual interfacesCreating a HazOp table tailored to the task with specific keywordsDetermining hazards based on accident scenarios and project contextIdentifying relevant road surface states (slippery/non-slippery) based on project contextIdentifying a specific operational situation by selecting parameters (traffic, weather, road quality)
ApproachesCalculationsProject scopeProject scopeBrainstormingProject scopeStandards
Result tablesProject objectivesProject objectivesCreative problem-solvingProject objectivesGuidelines
ChecklistsExisting proceduresExisting procedures Existing proceduresProcedures

Appendix B. Tailoring of the Safety and Security Activities

Table A2. Tailoring of safety activities.
Table A2. Tailoring of safety activities.
Tailoring of the Safety Activities
IDActivityChapterWork Products
2–6Project-dependent safety managementManagement of functional safetyIn Scope:
2.6.5.1 Impact Analyses at the ITEM level
2.6.5.2 Impact Analyses at the Element level
2.6.5.3 Safety Plan
2.6.5.4 Safety Case
2.6.5.5 Confirmation Measures Report
Out of Scope:
2.6.5.7 Release of Production Report
3–5ITEM definitionConcept phaseIn Scope:
3.5.5.1 ITEM Definition
Out of Scope:
3–6Hazard analysis and risk assessmentConcept phaseIn Scope:
3.6.5.1 Hazard Analysis and Risk Assessment Report
3.6.5.2 Verification Report on the Hazard Analysis and Risk Assessment
Out of Scope:
3–7Functional safety conceptConcept phaseIn Scope:
3.7.5.1 Functional Safety Concept
3.7.5.2 Verification Report on the Functional Safety Concept
Out of Scope:
4–6Technical safety conceptProduct development at the system levelIn Scope:
4.6.5.1 Technical Safety Requirements Specification
4.6.5.2 Technical Safety Concept
4.6.5.6 Verification Report on System Architectural Design, Hardware–Software Interface Specification, Requirements for Production, Operation, Service, Decommissioning, and the Technical Safety Concept
Out of Scope:
4.6.5.3 System Architectural Design Specification
4.6.5.4 Hardware–Software Interface Specification
4.6.5.5 Specification of Requirements for Production, Operation, Service, Decommissioning
4.6.5.7 Safety Analyses Report
Table A3. Tailoring of safety support activities.
Table A3. Tailoring of safety support activities.
Tailoring of the Safety Support Activities
IDSupport ActivityChapterApplied in
8–6Specification and management of safety requirementsSupporting processes3.6.5.1 Hazard Analysis and Risk Assessment Report
3.7.5.1 Functional Safety Concept
4.6.5.6 Verification Report on System Architectural Design, Hardware–Software Interface Specification, Requirements for Production, Operation, Service, Decommissioning, and the Technical Safety Concept
8–9VerificationSupporting processes3.6.5.2 Verification Report on the Hazard Analysis and Risk Assessment
3.7.5.2 Verification Report on the Functional Safety Concept
4.6.5.6 Verification Report on System Architectural Design, Hardware–Software Interface Specification, Requirements for Production, Operation, Service, Decommissioning, and the Technical Safety Concept
9–5Requirements decomposition with respect to ASIL decompositionASIL-oriented and safety-oriented analyses3.7.5.1 Functional Safety Concept
4.6.5.2 Technical Safety Concept
9–6Criteria for the coexistence of elementsASIL-oriented and safety-oriented analyses3.7.5.1 Functional Safety Concept
4.6.5.2 Technical Safety Concept
9–7Analyses of dependent failuresASIL-oriented and safety-oriented analyses3.7.5.1 Functional Safety Concept
9–8Safety analysesASIL-oriented and safety-oriented analyses4.6.5.2 Technical Safety Concept
Table A4. Tailoring of security activities.
Table A4. Tailoring of security activities.
Tailoring of Security Activities
IDSubchapterChapterWork Products
6Project-dependent cybersecurity managementIn Scope:
WP-06-01 Cybersecurity Plan
WP-06-02 Cybersecurity Case
WP-06-03 Cybersecurity Assessment Report
Out of Scope:
WP-06-04 Release for Post-Development Report
9.ITEM definitionConceptIn Scope:
WP-09-01 ITEM Definition
Out of Scope:
9Cybersecurity goalsConceptIn Scope:
WP-09-02 Threat Analysis and Risk Assessment
WP-09-03 Cybersecurity Goals
WP-09-04 Cybersecurity Claims
WP-09-05 Verification Report on the Cybersecurity Goals
Out of Scope:
9Cybersecurity conceptConceptIn Scope:
WP-09-06 Cybersecurity Concept
WP-09-07 Verification Report on the Cybersecurity Concept
Out of Scope:
Table A5. Tailoring of security support activities.
Table A5. Tailoring of security support activities.
Tailoring of Security Support Activities
IDSubchapterChapterWork ProductsScope
15.Asset IdentificationTARA MethodsWP-15-01 Damage ScenariosIn Scope
WP-15-02 Assets with Cybersecurity Properties
15.Threat Scenario IdentificationTARA MethodsWP-15-03 Threat ScenariosIn Scope
15.Impact RatingTARA MethodsWP-15-04 Impact RatingsIn Scope
15.Attack Path AnalysisTARA MethodsWP-15-05 Attack PathsIn Scope
15.Attack Feasibility RatingTARA MethodsWP-15-06 Attack Feasibility RatingsIn Scope
15.Risk Value DeterminationTARA MethodsWP-15-07 Risk ValuesIn Scope
15.Risk Treatment DecisionTARA MethodsWP-15-08 Risk Treatment DecisionIn Scope

Appendix C. Tailoring of the MagicGrid Framework

Table A6. Tailoring of the Magic Grid Framework.
Table A6. Tailoring of the Magic Grid Framework.
IDMagicGrid SubmodelTailoring
1Stakeholder NeedsThe requirements and desires of stakeholders are analyzed from their perspective and modeled as a viewpoint diagram.
2System ContextThe environment of the methodology is considered from an organizational and resource perspective and modeled as a requirements collective based on the application environment from [9,12].
3Measurements of EffectivenessMoEs supplement the methodology requirements but relate to the desired effects of the methodology in project-specific use.
4Logical Subsystem CommunicationThe internal structure of the methodology is formed by work products and input information, which are modeled as elements of the overall product of the methodology.
5Component BehaviorThe methodology does not have physical components; however, its behavior can be adapted to the process of executing the methodology.
6Component StructureWhile the methodology itself lacks a structure, the generated work products and models do possess one. Therefore, the structure of the methodology is modeled as a CAMEO template (stereotypes, elements, relationships).
7Component ParametersThe defined MoEs are assigned target values, and the degree to which these targets are met is modeled. However, achieving these targets is beyond the scope of this work.

Appendix D. Method Application Environment

Table A7. Method application environment.
Table A7. Method application environment.
IDStandard ChapterRequirement
MER1ISO 26262:2018/2.5.4.2.5The user must have the resources specified in ISO 26262:2018/2.5.4.2.5
MER2ISO 26262:2018/2.5.4.2The user must have a safety culture specified in ISO 26262:2018/2.5.4.2
MER3ISO 26262:2018/2.5.4.3The user must have the management of safety anomalies regarding functional safety specified in ISO 26262:2018/2.5.4.3
MER4ISO 26262:2018/2.5.4.4The user must have the competence management specified in ISO 26262:2018/2.5.4.4
MER5ISO 26262:2018/2.5.4.5The user must have the quality management system specified in ISO 26262:2018/2.5.4.5
MER6ISO 26262:2018/2.5.4.6The user must have the project-independent tailoring of the safety lifecycle specified in ISO 26262:2018/2.5.4.6
MER7ISO/SAE 21434:2021/5.4.1The user must have the resources specified in ISO/SAE 21434:2021/5.4.1
MER8ISO/SAE 21434:2021/5.4.1The user must have the cybersecurity governance specified in ISO/SAE 21434:2021/5.4.1
MER9ISO/SAE 21434:2021/5.4.2The user must have the cybersecurity culture specified in ISO/SAE 21434:2021/5.4.2
MER10ISO/SAE 21434:2021/5.4.3The user must have the information sharing specified in ISO/SAE 21434:2021/5.4.3
MER11ISO/SAE 21434:2021/5.4.4The user must have the quality management system specified in ISO/SAE 21434:2021/5.4.4
MER12ISO/SAE 21434:2021/5.4.4The user must have the cybersecurity management system specified in ISO/SAE 21434:2021/5.4.4
MER13ISO/SAE 21434:2021/5.4.5The user must have the tool management specified in ISO/SAE 21434:2021/5.4.5
MER14ISO/SAE 21434:2021/5.4.6The user must have the information security management specified in ISO/SAE 21434:2021/5.4.6
MER15ISO/SAE 21434:2021/5.4.7The user must have the organizational cybersecurity audit specified in ISO/SAE 21434:2021/5.4.7
MER16ISO/SAE 21434:2021/8.3The user must have the cybersecurity monitoring specified in ISO/SAE 21434:2021/8.3
MER17ISO/SAE 21434:2021/8.4The user must have the cybersecurity event evaluation specified in ISO/SAE 21434:2021/8.4
MER18ISO/SAE 21434:2021/8.5The user must have the vulnerability analysis specified in ISO/SAE 21434:2021/8.5
MER19ISO/SAE 21434:2021/8.6The user must have the vulnerability management specified in ISO/SAE 21434:2021/8.6

Appendix E. Activities

Table A8. Safety Activities.
Table A8. Safety Activities.
Safety Activities
IDActivityStandard ChapterWork Products
2–6Project-dependent safety managementManagement of
functional safety
In Scope:
2.6.5.1 Impact Analyses at the ITEM level
2.6.5.2 Impact Analyses at the Element level
2.6.5.3 Safety Plan
2.6.5.4 Safety Case
2.6.5.5 Confirmation Measures Report
Out of Scope:
2.6.5.7 Release of Production Report
3–5ITEM definitionConcept phaseIn Scope:
3.5.5.1 ITEM Definition
Out of Scope:
-
3–6Hazard analysis and
risk assessment
Concept phaseIn Scope:
3.6.5.1 Hazard Analysis and
Risk Assessment
3.6.5.2 Verification Report on the Hazard Analysis and Risk Assessment
Out of Scope:
-
3–7Functional safety conceptConcept phaseIn Scope:
3.7.5.1 Hazard Analysis and
Risk Assessment
3.7.5.2 Verification Report on the Hazard Analysis and Risk Assessment
Out of Scope:
-
4–6Technical safety conceptProduct development at the system levelIn Scope:
4.6.5.1 Technical Safety Requirements Specification
4.6.5.2 Technical Safety Concept
4.6.5.6 Verification Report on System Architectural Design, the Hardware–Software Interface Specification, the Specification of Requirements for Production, Operation, Service and Decommissioning, and the Technical Safety Concept
Out of Scope:
4.6.5.3 System Architectural Design Specification
4.6.5.4 Hardware–Software Interface Specification
4.6.5.5 Specification of Requirements for Production, Operation, Service, and Decommissioning
4.6.5.7 Safety Analyses Report
Table A9. Safety Support Activities.
Table A9. Safety Support Activities.
Safety Support Activities
IDActivityStandard ChapterApplied in
8–6Specification and management of safety requirementSupporting processes3.6.5.1 Hazard Analysis and Risk Assessment Report
3.7.5.1 Functional Safety Concept
4.6.5.6 Verification Report on System Architectural Design, the Hardware–Software Interface Specification, the Specification of Requirements for Production, Operation, Service and Decommissioning, and the Technical Safety Concept
8–9VerificationSupporting processes3.6.5.2 Verification Report on the Hazard Analysis and Risk Assessment
3.7.5.2 Verification Report on the Functional Safety Concept
4.6.5.6 Verification Report on System Architectural Design, the Hardware–Software Interface Specification, the Specification of Requirements for Production, Operation, Service and Decommissioning, and the Technical Safety Concept
9–5Requirements
decomposition with respect to ASIL-decomposition
ASIL oriented and
safety-oriented analyses
3.7.5.1 Functional Safety Concept
4.6.5.2 Technical Safety Concept
9–6Criteria for the coexistence of elementsASIL oriented and
safety-oriented analyses
3.7.5.1 Functional Safety Concept
4.6.5.2 Technical Safety Concept
9–7Analysis of dependent
failures
ASIL oriented and
safety-oriented analyses
3.7.5.1 Functional Safety Concept
9–8Safety analysesASIL oriented and
safety-oriented analyses
4.6.5.2 Technical Safety Concept
Table A10. Security Activities.
Table A10. Security Activities.
Security Activities
IDActivityStandard ChapterWork Products
2–6Project-dependent cybersecurity managementIn Scope:
WP-06-01 Cybersecurity Plan
WP-06-02 Cybersecurity Case
WP-06-03 Cybersecurity Assessment Report
Out of Scope:
WP-06-04 Release for Post-Development Report
3–5ITEM definitionConcept phaseIn Scope:
WP-09-01 ITEM-Definition
Out of Scope:
-
3–6Cybersecurity goalsConcept phaseIn Scope:
WP-09-02 Threat Analysis and Risk Assessment
WP-09-03 Cybersecurity Goals
WP-09-04 Cybersecurity Claims
WP-09-05 Verification Report on the Cybersecurity Goals
Out of Scope:
-
3–7Cybersecurity conceptConcept PhaseIn Scope:
WP-09-06 Cybersecurity Concept
WP-09-07 Verification Report on the Cybersecurity Concept
Out of Scope:
-
Table A11. Security Support Activities.
Table A11. Security Support Activities.
Security Support Activities
IDActivityStandard ChapterWork Products
15.3Asset identificationTARA MethodsIn Scope:
WPleaseP-15-01 Damage Scenarios
WP-15-02 Assets with Cybersecurity Properties
Out of Scope:
-
15.4Threat scenario
identification
TARA MethodsIn Scope:
WP-15-03 Threat Scenarios
Out of Scope:
-
15.5Impact ratingTARA MethodsIn Scope:
WP-15-04 Impact Ratings
Out of Scope:
-
15.6Attack path analysisTARA MethodsIn Scope:
WP-15-05 Attack Paths
Out of Scope:
-
15.7Attack feasibility ratingTARA MethodsIn Scope:
WP-15-06 Attack Feasibility Rating
Out of Scope:
-
15.8Risk value determinationTARA MethodsIn Scope:
WP-15-07 Risk Values
Out of Scope:
-
15.9Risk treatment decisionTARA MethodsIn Scope:
WP-15-08 Risk Treatment Decision
Out of Scope:
-

Appendix F. Allocation of Generic Activities to Activities

Table A12. Allocation of Generic Activities to Safety Activities.
Table A12. Allocation of Generic Activities to Safety Activities.
Allocation of Generic Activities to Safety Activities
Process ElementGeneric ActivityExternal
Information
Work Products
ResponsibilitiesDetermine-2.6.5.3 Safety Plan
Impact AnalysisAllocate-2.6.5.1 Impact Analyses at the ITEM Level
TailoringDetermine, Define-2.6.5.3 Safety Plan
Safety ActivitiesDetermine, Allocate-2.6.5.3 Safety Plan
Safety Support ActivitiesDevelop, Activities-2.6.5.3 Safety Plan
Safety Project TimelineDevelop, Allocate-2.6.5.3 Safety Plan
Safety ObjectivesDefine-2.6.5.3 Safety Plan
Safety ScopeDefine-2.6.5.3 Safety Plan
ITEM ArchitectureDefine-3.5.5.1 ITEM Definition
ITEM InterfacesDefine, Allocate-3.5.5.1 ITEM Definition
ITEM Use CasesDefine-3.5.5.1 ITEM Definition
ITEM FunctionsDefine-3.5.5.1 ITEM Definition
ITEM EnvironmentDevelop, Allocate-3.5.5.1 ITEM Definition
ITEM Lifecycle RequirementsDefine-3.5.5.1 ITEM Definition
Operational SituationsCategorize, Assemble-3.6.5.1 HARA Report
MalfunctionsDetermine-3.6.5.1 HARA Report
Accident ScenariosDetermine, Assemble-3.6.5.1 HARA Report
Hazardous EventsDefine, Allocate-3.6.5.1 HARA Report
HazardsDevelop, Determine-3.6.5.1 HARA Report
Vehicle Level EffectsDefine, Determine-3.6.5.1 HARA Report
ITEM Level EffectsDefine-3.6.5.1 HARA Report
ASIL-RatingDetermine-3.6.5.1 HARA Report
Safety GoalsDefine-3.6.5.1 HARA Report
Functional Safety StrategiesAllocate-3.7.5.1 Functional Safety Concept
Functional Safety RequirementsDefine-3.7.5.1 Functional Safety Concept
ASIL DecompositionDefine-3.7.5.1 Functional Safety Concept
Element-Requirement AllocationAllocate-3.7.5.1 Functional Safety Concept
Emergency OperationsDefine-3.7.5.1 Functional Safety Concept
Safe StatesDefine-3.7.5.1 Functional Safety Concept
Fault Tolerant Time IntervalsDefine-3.7.5.1 Functional Safety Concept
Functional RedundanciesDefine-3.7.5.1 Functional Safety Concept
Technical Safety RequirementsDefine-4.6.5.1 Technical Safety Requirements Spec.
Function Requirement AllocationAllocate-4.6.5.2 Technical Safety Concept
Operating Mode AllocationAllocate-4.6.5.2 Technical Safety Concept
Safety MechanismsDefine-4.6.5.1 Technical Safety Requirements Spec.
Design ConstraintsDefine-4.6.5.2 Technical Safety Concept
Interface/Signal AllocationAllocate-4.6.5.2 Technical Safety Concept
Element-Requirement AllocationAllocate-4.6.5.2 Technical Safety Concept
HW/SW AllocationAllocate-4.6.5.2 Technical Safety Concept
HIS SpecificationDefine-4.6.5.2 Technical Safety Concept
Failure Control MeasuresDefine-4.6.5.2 Technical Safety Concept
Safety CaseAllocate-2.6.5.4 Safety Case
Safety Confirmation Review WPsAllocate-2.6.5.5 Confirmation Measures Report
Safety Audit WPsAllocate-2.6.5.5 Confirmation Measures Report
Table A13. Allocation of Generic Activities to Security Activities.
Table A13. Allocation of Generic Activities to Security Activities.
Allocation of Generic Activities to Security Activities
Process ElementGeneric ActivityExternal
Information
Work Products
ResponsibilitiesDetermine-WP-06-01 Cybersecurity Plan
Impact AnalysisAllocate-WP-06-01 Cybersecurity Plan
TailoringDetermine, Define-WP-06-01 Cybersecurity Plan
Security ActivitiesDetermine, Allocate-WP-06-01 Cybersecurity Plan
Security Support ActivitiesDevelop, Activities-WP-06-01 Cybersecurity Plan
Security Project TimelineDevelop, Allocate-WP-06-01 Cybersecurity Plan
Security ObjectivesDefine-WP-06-01 Cybersecurity Plan
Security ScopeDefine-WP-06-01 Cybersecurity Plan
ITEM ArchitectureDefine-WP-09-01 ITEM Definition
ITEM InterfacesDefine, Allocate-WP-09-01 ITEM Definition
ITEM Use CasesDefine-WP-09-01 ITEM Definition
ITEM FunctionsDefine-WP-09-01 ITEM Definition
ITEM EnvironmentDevelop, Allocate-WP-09-01 ITEM Definition
ITEM Lifecycle RequirementsDefine-WP-09-01 ITEM Definition
Cybersecurity AssetsDetermineENISA [14]WP-15-02 Cybersecurity Assets
WP-09-02 TARA
Damage ScenariosDefine, Allocate-WP-15-01 Damage Scenarios
WP-09-02 TARA
Threat ScenariosDefine, Allocate-WP-15-03 Threat Scenarios
WP-09-02 TARA
Attacker ProfilesDefine, Allocate-WP-15-03 Threat Scenarios
WP-09-02 TARA
Impact RatingDetermine-WP-15-04 Impact Rating
WP-09-02 TARA
Attack ApproachesDefineUN ECE R155 [15]WP-15-05 Attack Paths
WP-09-02 TARA
Attack PathsDefine-WP-15-05 Attack Paths
WP-09-02 TARA
Attack Feasibility RatingDetermine-WP-15-06 Attack Feasibility Rating
WP-09-02 TARA
Risk Treatment DecisionDetermine-WP-15-07 Risk Values
WP-15-08 Risk Treatment Decision
WP-09-02 TARA
Cybersecurity ClaimsDefine-WP-09-04 Cybersecurity Claims
Cybersecurity GoalsDefine-WP-09-03 Cybersecurity Goals
Attack VectorsDetermine-WP-09-06 Cybersecurity Concept
Attack ImpactsDetermine-WP-09-06 Cybersecurity Concept
Cybersecurity Assurance LevelDetermine-WP-09-06 Cybersecurity Concept
Cybersecurity RequirementsDefine-WP-09-06 Cybersecurity Concept
Cybersecurity Operational Env.Define-WP-09-06 Cybersecurity Concept
Compromise HandlingDefine-WP-09-06 Cybersecurity Concept
Security CaseAllocate-WP-06-02 Cybersecurity Case
Cybersecurity AssessmentAllocate-WP-06-03 Cybersecurity Assessment Report

Appendix G. Requirements for Conducting the Method

Table A14. Requirements for the application of the method.
Table A14. Requirements for the application of the method.
IDRequirements for the Application of the Method
RAM1The safety process and the security process of the methodology must be implemented in CAMEO using the SysML.
RAM2The safety process and the security process of the methodology must use the same ITEM definition.
RAM3In the case of an update of the base standards ISO 26262:2018 and ISO/SAE 21434:2021, the conformity of the methodology with the base standards must be verified.
RAM4The field of use of the ITEM must be verified to be in the automotive field.
RAM5The E/E property of the ITEM must be verified.
RAM6The safety process and the security process of the methodology must only be defined on the project level and not affect organizational activities.
RAM7The conduction of the safety process and the security process of the methodology must be compliant with the determined aspects of the base standards.
RAM8The conduction of the safety process and the security process of the methodology must be compliant with the environmental requirements of the methodology.
RAM9The requirements defined during the conduction of the safety process and the security process of the methodology must be verified for consistency and completeness, in addition to any requirements specified by the base standards.
RAM10The requirements defined during the conduction of the safety process and the security process of the methodology must not specify the production, service, maintenance, or decommissioning of the ITEM.

Appendix H. Template of the Method—Overview

Figure A1. Overview of the relevant aspects of the method.
Figure A1. Overview of the relevant aspects of the method.
Asi 08 00045 g0a1

Appendix I. Artifacts of Preliminary Management

Figure A2. Preliminary management template.
Figure A2. Preliminary management template.
Asi 08 00045 g0a2
Figure A3. Safety activities template.
Figure A3. Safety activities template.
Asi 08 00045 g0a3
Figure A4. Safety support activities template.
Figure A4. Safety support activities template.
Asi 08 00045 g0a4
Figure A5. Time plan template.
Figure A5. Time plan template.
Asi 08 00045 g0a5

Appendix J. Artifacts of the Unified ITEM Definition

Figure A6. ITEM interface template.
Figure A6. ITEM interface template.
Asi 08 00045 g0a6
Figure A7. ITEM architecture template.
Figure A7. ITEM architecture template.
Asi 08 00045 g0a7
Figure A8. ITEM functions template.
Figure A8. ITEM functions template.
Asi 08 00045 g0a8

Appendix K. Artifacts of the Hazard Analysis and Risk Assessment

Figure A9. Operational situations template.
Figure A9. Operational situations template.
Asi 08 00045 g0a9
Figure A10. Malfunction HazOp template.
Figure A10. Malfunction HazOp template.
Asi 08 00045 g0a10
Figure A11. Accident scenarios template.
Figure A11. Accident scenarios template.
Asi 08 00045 g0a11
Figure A12. Hazard identification und documentation templates.
Figure A12. Hazard identification und documentation templates.
Asi 08 00045 g0a12
Figure A13. Effects—template.
Figure A13. Effects—template.
Asi 08 00045 g0a13
Figure A14. Safety goals—template.
Figure A14. Safety goals—template.
Asi 08 00045 g0a14

Appendix L. Artifacts of the Threat Analysis and Risk Assessment

Figure A15. Asset identification—template.
Figure A15. Asset identification—template.
Asi 08 00045 g0a15
Figure A16. Damage scenarios—template.
Figure A16. Damage scenarios—template.
Asi 08 00045 g0a16
Figure A17. Threat scenarios—template.
Figure A17. Threat scenarios—template.
Asi 08 00045 g0a17
Figure A18. Impact rating—template.
Figure A18. Impact rating—template.
Asi 08 00045 g0a18
Figure A19. Attack paths—template.
Figure A19. Attack paths—template.
Asi 08 00045 g0a19
Figure A20. Attack feasibility rating—template.
Figure A20. Attack feasibility rating—template.
Asi 08 00045 g0a20
Figure A21. Safety risk rating—template.
Figure A21. Safety risk rating—template.
Asi 08 00045 g0a21
Figure A22. Risk Treatment decisions overview—template.
Figure A22. Risk Treatment decisions overview—template.
Asi 08 00045 g0a22
Figure A23. Final risk treatment decisions—template.
Figure A23. Final risk treatment decisions—template.
Asi 08 00045 g0a23

Appendix M. Artifacts of the Functional Safety Concept

Figure A24. Functional safety strategy—template.
Figure A24. Functional safety strategy—template.
Asi 08 00045 g0a24
Figure A25. Functional safety requirement specification—template.
Figure A25. Functional safety requirement specification—template.
Asi 08 00045 g0a25

Appendix N. Artifacts of the Technical Safety Concept

Figure A26. Technical safety requirements specification—template.
Figure A26. Technical safety requirements specification—template.
Asi 08 00045 g0a26
Figure A27. Technical safety requirements specification—template.
Figure A27. Technical safety requirements specification—template.
Asi 08 00045 g0a27

Appendix O. Artifacts of the Security Concept

Figure A28. Cybersecurity claims specification—template.
Figure A28. Cybersecurity claims specification—template.
Asi 08 00045 g0a28
Figure A29. Cybersecurity goals specification—template.
Figure A29. Cybersecurity goals specification—template.
Asi 08 00045 g0a29
Figure A30. Cybersecurity requirements specification—template.
Figure A30. Cybersecurity requirements specification—template.
Asi 08 00045 g0a30

References

  1. Kifor, C.V.; Popescu, A. Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies. Sensors 2024, 24, 6139. [Google Scholar] [CrossRef] [PubMed]
  2. Ayres, N.; Deka, L.; Paluszczyszyn, D. Continuous Automotive Software Updates through Container Image Layers. Electronics 2021, 10, 739. [Google Scholar] [CrossRef]
  3. Gausemeier, J.; Moehringer, S. VDI 2206—A New Guideline for the Design of Mechatronic Systems. IFAC Proc. Vol. 2002, 35, 785–790. [Google Scholar] [CrossRef]
  4. Gräßler, I.; Oleff, C. Systems Engineering: Verstehen und Industriell Umsetzen; Springer: Berlin, Germany, 2022. [Google Scholar]
  5. Nolte, B.; Gollnick, D.; Stein, A.; Vietor, T. Development of a Method for Evaluating H2-Filling Stations. Hydrogen 2024, 5, 851–871. [Google Scholar] [CrossRef]
  6. Walden, D.D.; Roedler, G.J.; Forsberg, K.; Hamelin, R.D.; Shortell, T.M.; International Council on Systems Engineering (Eds.) Systems engineering Handbook: A Guide for System Life Cycle Processes and Activities, 4th ed.; Wiley: Hoboken, NJ, USA, 2015. [Google Scholar]
  7. Long, D.; Scott, Z. A Primer for Model-Based Systems Engineering. 2012. Available online: http://ccose.org/media/upload/MBSE_Primer_2ndEdition_full_Vitech_2011.10.pdf (accessed on 17 November 2023).
  8. Delligatti, L. SysML Distilled: A Brief Guide to the Systems Modeling Language; Addison-Wesley: Upper Saddle River, NJ, USA, 2014; ISBN 0321927869. [Google Scholar]
  9. ISO 26262:2018; Road Vehicles—Functional Safety. ISO: Geneva, Switzerland, 2018. Available online: https://www.iso.org/standard/68383.html (accessed on 17 November 2023).
  10. Kriaa, S.; Pietre-Cambacedes, L.; Bouissou, M.; Halgand, Y. A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf. 2015, 139, 156–178. [Google Scholar] [CrossRef]
  11. Furrer, F.J. Safety and Security of Cyber-Physical Systems: Engineering Dependable Software Using Principle-Based Development; Springer: Berlin/Heidelberg, Germany, 2022. [Google Scholar] [CrossRef]
  12. ISO 21434:2021; Road vehicles—Cybersecurity Engineering. ISO: Geneva, Switzerland, 2021. Available online: https://www.iso.org/standard/70918.html (accessed on 17 November 2023).
  13. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA Relevance) (OJ L 119 04.05.2016, p. 1). Available online: http://data.europa.eu/eli/reg/2016/679/oj (accessed on 17 November 2023).
  14. California Consumer Privacy Act (CCPA), as Amended by the California Privacy Rights Act (CPRA). Available online: https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?lawCode=CIV&division=3.&title=1.81.5.&part=4.&chapter=&article= (accessed on 18 February 2025).
  15. Benyahya, M.; Collen, A.; Nijdam, N.A. Analyses on standards and regulations for connected and automated vehicles: Identifying the certifications roadmap. Transp. Eng. 2023, 14, 100205. [Google Scholar] [CrossRef]
  16. Benyahya, M.; Kechagia, S.; Collen, A.; Nijdam, N.A. The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis. Appl. Sci. 2022, 12, 4413. [Google Scholar] [CrossRef]
  17. Liedtke, T. (Ed.) Funktionale Sicherheit (Safety). In Informationssicherheit; Springer: Berlin, Germany, 2022; pp. 89–106. [Google Scholar] [CrossRef]
  18. Meyers, B.; Gadeyne, K.; Oakes, B.; Bernaerts, M.; Vangheluwe, H.; Denil, J. A Model-Driven Engineering Framework to Support the Functional Safety Process. In Proceedings of the ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Munich, Germany, 15–20 September 2019; pp. 619–623. [Google Scholar] [CrossRef]
  19. Frese, T.; Gerber, N.; Hatebur, D.; Côté, I.; Heisel, M. Functional Safety Processes and Advanced Driver Assistance Systems: Evolution or Revolution? In Mobilität und digitale Transformation; Proff, H., Fojcik, T.M., Eds.; Springer: Wiesbaden, Germany, 2018; pp. 199–216. [Google Scholar] [CrossRef]
  20. Valdivia Dabringer, M.L.; Dybov, A.; Fresemann, C.; Stark, R. Towards Integrated Safety Analysis as Part of Traceable Model-Based Systems Engineering. Proc. Des. Soc. 2022, 2, 2005–2014. [Google Scholar] [CrossRef]
  21. Biggs, G.; Juknevicius, T.; Armonas, A.; Post, K. Integrating Safety and Reliability Analysis into MBSE: Overview of the new proposed OMG standard. INCOSE Int. Symp. 2018, 28, 1322–1336. [Google Scholar] [CrossRef]
  22. Biggs, G.; Post, K.; Armonas, A.; Yakymets, N.; Juknevicius, T.; Berres, A. OMG standard for integrating safety and reliability analysis into MBSE: Concepts and applications. INCOSE Int. Symp. 2019, 29, 159–173. [Google Scholar] [CrossRef]
  23. Mažeika, D.; Butleris, R. Integrating Security Requirements Engineering into MBSE: Profile and Guidelines. Secur. Commun. Netw. 2020, 2020, 5137625. [Google Scholar] [CrossRef]
  24. Larsen, M.H.; Muller, G.; Kokkula, S. A Conceptual Model-Based Systems Engineering Method for Creating Secure Cyber-Physical Systems. INCOSE Int. Symp. 2022, 32, 202–213. [Google Scholar] [CrossRef]
  25. Oates, R.; Thom, F.; Herries, G. Security-Aware, Model-Based Systems Engineering with SysML. In Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, (ICS-CSR 2013), Leicester, UK, 16–17 September 2013. [Google Scholar] [CrossRef]
  26. Häring, I.; Sudheedran, V.; Sankin, R.; Hiermaier, S. Joint Functional Safety ISO 26262 and Cybersecurity STRIDE/HEAVENS Assessment by Developers within MBSE SPES Framework Using Extended SysML Diagrams and Minor Automations; International Association for Probabilistic Safety Assessment and Management (IAPSAM): Seal Beach, CA, USA, 2022; Available online: https://www.iapsam.org/PSAM16/papers/IV42-PSAM16.pdf (accessed on 17 November 2023).
  27. Japs, S.; Anacker, H.; Dumitrescu, R. SAVE: Security & safety by model-based systems engineering on the example of automotive industry. Procedia CIRP 2021, 100, 187–192. [Google Scholar] [CrossRef]
  28. NoMagic. ISO 26262 Functional Safety. Available online: https://docs.nomagic.com/display/CSRA190SP3/ISO+26262+Functional+Safety (accessed on 15 December 2024).
  29. NoMagic. ISO 21434 Cybersecurity. Available online: https://docs.nomagic.com/display/CSRA2024x/ISO+21434+Functional+Cybersecurity (accessed on 15 December 2024).
  30. Morkevicius, A.; Aleksandraviciene, A.; Mazeika, D.; Bisikirskiene, L.; Strolia, Z. MBSE Grid: A Simplified SysML-Based Approach for Modeling Complex Systems. INCOSE Int. Symp. 2017, 27, 136–150. [Google Scholar] [CrossRef]
  31. European Union Agency for Cybersecurity. ENISA Good Practices for the Security of Smart Cars; ENISA: Athens, Greece, 2019; Available online: https://data.europa.eu/doi/10.2824/17802 (accessed on 17 November 2023).
  32. United Nations Economic Commission for Europe. UN ECE R 155; UNECE: Geneva, Switzerland, 2021. [Google Scholar]
  33. ISO 21448:2022; Road Vehicles—Safety of the Intended Functionality. ISO: Geneva, Switzerland, 2022. Available online: https://www.iso.org/standard/77490.html (accessed on 17 November 2023).
Figure 1. A possible approach to integrating the safety and security risk analysis [10] (left); the definition of the term ITEM in ISO 26262:2018 using SysML nomenclature [9] (right).
Figure 1. A possible approach to integrating the safety and security risk analysis [10] (left); the definition of the term ITEM in ISO 26262:2018 using SysML nomenclature [9] (right).
Asi 08 00045 g001
Figure 2. Development of the method.
Figure 2. Development of the method.
Asi 08 00045 g002
Figure 3. Created models (implementation in SysML, based on the MBSE MagicGrid [25]).
Figure 3. Created models (implementation in SysML, based on the MBSE MagicGrid [25]).
Asi 08 00045 g003
Figure 4. An overview of activity chapters (implementation in SysML) (top); Examples of the model of activity components (implementation in SysML) (bottom) [9].
Figure 4. An overview of activity chapters (implementation in SysML) (top); Examples of the model of activity components (implementation in SysML) (bottom) [9].
Asi 08 00045 g004aAsi 08 00045 g004b
Figure 5. An overview of the method as a flowchart (implementation in SysML).
Figure 5. An overview of the method as a flowchart (implementation in SysML).
Asi 08 00045 g005
Figure 6. An example of an activity of the method (implementation in SysML).
Figure 6. An example of an activity of the method (implementation in SysML).
Asi 08 00045 g006
Table 1. Information management of the method.
Table 1. Information management of the method.
Categorization of Project Information
Internal Information
Information typeExampleDocument
Information about the organizationEmployees, competencies, infrastructureOrganigram
Base standardsISO 26262:2018 [9]Base standard document
Project informationProject plan, goals, scopeProject plan, impact rating
ITEM informationArchitecture, functions, impact analysisITEM documentation
External Information
Standards/guidelines/checklistsCybersecurity asset identificationECE R 155 document
Table 2. Synergies between the safety and security processes.
Table 2. Synergies between the safety and security processes.
Synergies Between the Safety and Security Processes
Safety FrameworkSecurity FrameworkResultSynergyImplementation in the Method
Preliminary safety managementPreliminary security managementSafety/security plan
Safety/security goals
Safety/security scope
Organizational synergyParallel
No technical
synergies
ITEM definition (safety)ITEM definition (Security)Knowledge about ITEMWork products and activities are equivalentUnified
HARATARARisk analysis
Type of risk treatment
No synergiesSeparate
Functional safety conceptCybersecurity conceptSafety concepts
ITEM requirements
No synergiesSeparate
Technical safety concept
Continual safety managementContinual security managementWork productsNo synergiesSeparate
Conclusive safety managementConclusive security managementProject resultsNo synergiesSeparate
Table 3. Identification of synergies between ISO 26262:2018 [9] and ISO 21434:2021 [11].
Table 3. Identification of synergies between ISO 26262:2018 [9] and ISO 21434:2021 [11].
IDStakeholder GroupViewpoint
SVP1Project engineeringProvide results for successful certification or
homologation through conformity with base standards
SVP2Management of the
organization
Integration of the method into the already present IT and organizational infrastructure
SVP3Adaptability of the method to any automotive E/E component
SVP4Time and cost reduction
SVP5Safety and security
engineering
Creation of the safety and security requirements
and concepts
Table 4. Requirements of the method.
Table 4. Requirements of the method.
IDRequirements of the Method
RM1The safety framework must be based on the ISO 26262:2018 [9] standard.
RM2The security framework must be based on the ISO/SAE 21434:2021 [12] standard.
RM3The safety framework must determine all functional safety requirements of the item’s concept phase.
RM4The security framework must determine all cybersecurity requirements of the item’s concept phase.
RM5The safety framework and the security framework must regard exclusively the concept phase.
RM6The safety framework and the security framework must be fully implementable using the SysML language.
RM7The safety framework and the security framework must be for any general, automotive E/E components.
RM8The safety framework and security framework should be integrated as much as possible.
RM9The safety framework and the security framework must only be defined on the project level.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nolte, B.; Stein, A.; Vietor, T. Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering. Appl. Syst. Innov. 2025, 8, 45. https://doi.org/10.3390/asi8020045

AMA Style

Nolte B, Stein A, Vietor T. Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering. Applied System Innovation. 2025; 8(2):45. https://doi.org/10.3390/asi8020045

Chicago/Turabian Style

Nolte, Bastian, Armin Stein, and Thomas Vietor. 2025. "Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering" Applied System Innovation 8, no. 2: 45. https://doi.org/10.3390/asi8020045

APA Style

Nolte, B., Stein, A., & Vietor, T. (2025). Designing a Method for Identifying Functional Safety and Cybersecurity Requirements Utilizing Model-Based Systems Engineering. Applied System Innovation, 8(2), 45. https://doi.org/10.3390/asi8020045

Article Metrics

Back to TopTop