The international standard ISO/SAE 21434 introduces a cybersecurity (CySec) life cycle, as depicted in Fig. 4. This life cycle shares some conceptional similarities with the functional safety life cycle discussed before.
On the left-hand side of the V, an initial threat analysis and risk assessment (TARA) leads lo high-level cybersecurity goals which are refined into a cybersecurity concept at the system (item) level. This concept informs the lower level designs at the component and sub-component levels.
Please note that the refinement steps here are more generic in nature in comparison to the functional safety life cycle. The exact steps might differ due to the different company structures or system characteristics.
The right-hand side of the V, comprises the usual integration, verification, and validation activities. A successful cybersecurity validation is followed by production and operation activities.
The cybersecurity life cycle is more iterative in nature. As indicated in the upper left part of Fig. 4, the above mentioned concept, product development, production, and operation activities are conducted in cyles. The maintenance of the software using OTA updates becomes an integral part of the life cycle. One of the reasons for this is to ensure the necessary cybersecurity throughout the entire product life cycle.
So far we have two distinct life cycles, one for functional safety and a second for cybersecurity. The two standards themselves merely point out the need to coordinate security and cybersecurity activities and provide only some general guidance on how to do so.
ISO 26262 requires to establish and maintain effective communication channels between functional safety, cybersecurity, and other related domains. ISO 21434 emphasizes that organizations should identify the fields that relate to or interact with cybersecurity. The standard also calls for the establishment and maintenance of communication channels between these fields to determine how cybersecurity fits into current processes and to achieve synergies in the exchange of information.
However, both standards lack more detailed descriptions of processes, methods, and tools for safety and cybersecurity co-engineering.