Front view of the Bosch concept vehicle in an abstract white environment, surrounded by software packages and a protective sign that prevents unauthorized access

Well protected: Automotive Cybersecurity from Bosch

Due to advancing connectivity and the increasing significance of software in vehicles, protection from cyberattacks is becoming more and more important. Cybersecurity is a key component of Bosch’s promise of quality and an important aspect of the development, production, and operation of our products. For over ten years, Bosch has been actively shaping cybersecurity in the automotive sector and helping develop solutions and set standards to optimally protect vehicles and occupants at all times.

Secure from start to finish: cybersecurity over the entire life cycle

The importance of cybersecurity in the automotive sector continues to grow due to increasing connectivity and software that controls and monitors key driving functions. Connections to the internet and to smartphones must be protected from unauthorized access. Advanced driver assistance features require protection from attacks and manipulation to ensure the safety of all traffic participants. Consequently, international regulations (e.g. UN R155)

now place mandatory cybersecurity requirements on new vehicles. Cybersecurity has been an integral part of the development of new Bosch products for many years, based on a comprehensive technology portfolio. And cybersecurity has also found its way into the worldwide production network as well. Bosch also offers support to its customers during operation to ensure that cybersecurity is in place until the end of the vehicle’s life cycle.

Overview with four platforms that abstractly show the cybersecurity procedure from development to operation

Risk analysis and security concept

Abstract representation of a work scene on a platform, on which a group of people analyze a vehicle

Cybersecurity is an important part of the development stage, determining the level of protection a new product requires. Through a structured process, threats and risks are determined and analyzed, and these are then used to derive suitable protective measures.

Cybersecurity technology

Glass vehicle on a platform; the internal components are emphasized

In order to implement the protective measures, Bosch uses a comprehensive portfolio of cybersecurity technologies for tailor-made hardware and software solutions. These form the basis for protecting systems that are critical to safety.

A global key management network

Section of an abstract production line; a data packet is being uploaded to a vehicle

Cryptographic keys in each vehicle and electronic control unit are the basis for many security measures. These keys must be installed into the components during production. Using its own global key management system (KMS), Bosch distributes its own cryptographic keys.

Keeping security constantly up to date

Abstract section of a city; vehicles that send and receive data are driving on the roads

After a vehicle is delivered, the requirements of detecting new threats and closing vulnerabilities in security and other weaknesses are by no means over. In this context, Bosch provides its customers with various services to continue the collaboration over the life cycle of a vehicle model.

Cybersecurity in development
Cybersecurity technology
Cybersecurity in production
Cybersecurity in operation
Overview with four platforms that abstractly show the cybersecurity procedure from development to operation
Overview with four platforms that abstractly show the cybersecurity procedure from development to operation
Overview with four platforms that abstractly show the cybersecurity procedure from development to operation
Overview with four platforms that abstractly show the cybersecurity procedure from development to operation
Background graphic

Risk analysis and security concept

Cybersecurity is an important part of the development stage, determining the level of protection a new product requires. Through a structured process, threats and risks are determined and analyzed, and these are then used to derive suitable protective measures.

Cybersecurity technology

In order to implement the protective measures, Bosch uses a comprehensive portfolio of cybersecurity technologies for tailor-made hardware and software solutions. These form the basis for protecting systems that are critical to safety.

A global key management network

Cryptographic keys in each vehicle and electronic control unit are the basis for many security measures. These keys must be installed into the components during production. Using its own global key management system (KMS), Bosch distributes its own cryptographic keys.

Keeping security constantly up to date

After a vehicle is delivered, the requirements of detecting new threats and closing vulnerabilities in security and other weaknesses are by no means over. In this context, Bosch provides its customers with various services to continue the collaboration over the life cycle of a vehicle model.

‘Mastering cybersecurity risks is a mandatory precondition for connected and automated driving.’

Mathias Pillin

Mathias Pillin

Member of the Bosch Mobility Sector Board

Cybersecurity in development

A person discussing notes on a glass pane with colleagues; other people blurry in the background and a person joining digitally

Many years ago, Bosch already started implementing well-structured processes for developing all cybersecurity-critical products. A lot of the expertise of our cybersecurity experts from these years of experience also went into the standardization activities for the new ISO/SAE 21434 standard, which has been applied in product engineering since 2022. The first step is determining all potential threats and risks for the product. Conducting a

threat analysis and risks assessment (TARA), these risks can be evaluated in order to, in the next step, select suitable protective measures during product development and create the security concept. Before approval, a penetration test, meaning a simulated cyber attack, can be performed to test the effectiveness of the measures.

Example from practice: secure software updates

A glass vehicle with an abstract software platform inside, on which software packages are depicted

The hardware security module checks the authorization of software updates.

One of the prime protection goals is preventing unauthorized changes to the software in the electronic control unit, which can have serious consequences during operation.

Therefore, software updates are provided with a digital signature, which is checked during installation.

The signature is created using the key management system and compared during installation with the root certificate that is securely stored in the hardware security module (HSM) in the electronic control unit.

Bosch technology portfolio for cybersecurity

A technical graphic showing a simplified microchip, on which software layers are stacked
Bosch AUTOSAR stack
Hardware security module (HSM)
ESCRYPT CycurHSM

The comprehensive cybersecurity portfolio from Bosch provides the foundation for many protective measures. An important component is the hardware security module (HSM), which is contained inside the microcontroller. This is where cryptographic keys are stored securely. The specification of the Bosch

HSM is implemented by many chip manufacturers today. Special software – for example, CycurHSM from the Bosch subsidiary ETAS – runs on the HSM. Combining that with the Bosch AUTOSAR stack creates the secure basis for a wide range of different functions.

Example from practice: Secure Boot

Technical representation of an electronic control unit that exchanges data with other components via lines

The ECU controls and monitors the exchange of data.

Many control units from Bosch must meet elevated security requirements. In addition to other measures such as secure software updates, a secure boot process can be used on such devices. During this process, the ECU checks whether unauthorized changes have been made to the software each time the vehicle is started. When the original software or an update is installed, an individual checksum is calculated and saved in the HSM. This sum is recalculated and compared to the reference value each time the vehicle is started. Any possible deviations are thus detected, and appropriate countermeasures can be taken.

Cybersecurity in the production process

A woman with a tablet examines a machine during production.

Cybersecurity is also an essential part of the production process. Many security measures require cryptographic keys to be transmitted to the electronic control units. There, they are used for digital signatures, for example, and are necessary to prove the identity of the vehicles to backend systems. Using Bosch’s own global key management system (KMS), the

cryptographic keys are distributed securely to the individual plants to be installed directly to the control units during the production process. Individual cryptographic keys can be generated by Bosch or provided by OEM customers. It is also possible to connect to a customer’s KMS and exchange data directly and securely.

Example from practice: digital vehicle identification

Computer-generated image of a vehicle which is accessing an online service.

Cryptographic keys are used to verify a vehicle’s identity.

If a vehicle sends data to a backend system or uses online services, it is often necessary to verify its identity. For this purpose, the vehicle identifies itself digitally using its individual cryptographic key, which was already installed during production. This key proves the authorization and prevents data from being accessed or sent without permission.

Security over the entire life cycle

Abstract representation of a road forming an eight, on which a vehicle is driving.
Detecting vulnerabilities
Software updates
Data-based development
Software maintenance agreement

Vehicles are exposed to a variety of threats over their entire life cycle. Even comprehensive analyses during development and technical measures cannot prevent novel threats from arising and new security vulnerabilities from being discovered. As part of a maintenance agreement, Bosch supports its customers in continuously analyzing the threat situation over the lifetime of a

vehicle to identify new vulnerabilities and to be able to respond quickly. By using intrusion detection systems (IDS), attacks on vehicles can be automatically detected, reported to a central vehicle security operations center, and analyzed there.

Example from practice: software updates

Software updates help ensure cybersecurity over the service life of vehicles.

On many devices such as smartphones and computers, regular updates are part of everyday life today. The need for such updates is also growing in the automotive sector in order to close vulnerabilities and provide new features. A great challenge in doing so is the long service life of vehicles, which can mean that software must be modified and released again for use in the vehicle even many years after it was originally developed.

As part of a maintenance agreement, Bosch supports its customers in ensuring that updates can be provided as needed, so that secure operation is ensured even years after development.

ESCRYPT cybersecurity solutions from ETAS

“escrypt security. trust. success.” as white text on a blue background

With its ESCRYPT cybersecurity solutions, ETAS GmbH, which is part of the Bosch Group, is an important partner and internal supplier for holistic cybersecurity in the automotive sector.

Protection against cyber attacks as well as data security and integrity is the foundation of the future service models of automated and connected mobility.

Find out more

Join the cybersecurity community at Bosch

A team of developers in a conference room during a meeting.

Bosch is working on security in the automotive sector with over 300 cybersecurity experts. This broad field offers many possibilities for personal development and making an important contribution to the secure mobility of the future.

Apply now

Discovered a vulnerability?

Bosch PSIRT logo

Our Bosch PSIRT is working hard to find and fix security vulnerabilities.

The Bosch product security incident response team (PSIRT) is the central point of contact for external security researchers, partners, and customers to report possible security vulnerabilities in Bosch products. If you have discovered a vulnerability, please use this link to let us know. We are grateful for any information.

Report vulnerability

Contact us

Contact icon

Sales inquiries
Bosch Mobility

Are you interested in our solutions? Then write us a message. Our sales team will be happy to help you.

Start enquiry