EconPapers    
Economics at your fingertips  
 

How to secure development environments

Gerd Giese and Frank Bartel
Additional contact information
Gerd Giese: Zscaler, Inc., Germany
Frank Bartel: Fortinet GmbH, Germany

Cyber Security: A Peer-Reviewed Journal, 2025, vol. 8, issue 3, 232-242

Abstract: In July 2024, Porsche announced the discontinuation of its petrol-powered Macan sports utility vehicle (SUV) sales in Europe due to cyber security compliance issues with UN Regulation No. 155. This regulation mandates robust cyber security measures to protect vehicles from cyber threats, highlighting the direct impact of cyber security regulations on the automotive industry. While this is a drastic instance of a cyber security regulation directly affecting the automotive industry, other regulations, such as the Network and Information Security Directive (NIS2), impose cyber security standards in more subtle yet comprehensive ways. The NIS2 is set to transform cyber security expectations across various industries, including automotive manufacturing. NIS2 extends beyond simple compliance, emphasising proactive cyber security measures that start long before cars are built. The upcoming implementation in the automotive industry aims to enhance cyber resilience and mitigate the financial and reputational damage caused by cyber incidents. This directive covers the entire life cycle of a vehicle, from the initial design and development of the car and its software to the production and maintenance stages. This paper proposes that urgent action is required to safeguard the industry’s digital infrastructure from increasing cyber security threats.

Keywords: cyber security; DevSecOps; automotive; zero trust (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/9016/download/ (application/pdf)
https://hstalks.com/article/9016/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:8:i:3:p:232-242

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2025:v:8:i:3:p:232-242