Aerospace and Defense
Automotive
Consumer and Retail
Energy
Financial Services
Healthcare
Insurance
Life sciences
Manufacturing
Public Sector
Technology, Media and Telecommunications
Travel and Transportation
AGIG's Customer Service Transformation
Agentic AI in Insurance
Addressing Technical Debt with DXC Assure Platform
The Hogan API Microservices solution
DXC launches AMBER platform at CES 2026
Build & Innovate
Manage & Optimize
Protect & Scale
AI & Data
DXC IoT & Digital Twin Services
Strategize and accelerate your AI agenda
Explore our tailored options to navigate change
Enhance operational effectiveness, maintain compliance and foster customer trust
Customer Stories
Knowledge Base
AI
Closing the AI execution gap
About DXC
Awards & Recognition
Careers
Partners
Events
Environmental, Social, Governance
Investor Relations
Newsroom
Leadership
Legal & Compliance
DXC leads in the age of AI
Partnership with Manchester United
Partnership with Scuderia Ferrari
February 11, 2026
By Ronaldo Mendes, Automotive Process Architect (ASPICE and Cybersecurity)
As software and connectivity fundamentally transform the automotive industry — due to the advent of autonomous driving, shared mobility and electrification — cybersecurity is one of the make-or-break challenges for the industry. Regulations such as UNECE R155 demand OEMs and their suppliers to integrate cybersecurity activities into the whole project lifecycle to provide evidence of timely, end-to-end and effective cybersecurity management, which ultimately allows the system to be certified as secure against cyberattacks. One of the main aspects for automotive is to ensure that the vehicle, system and/or component is cyber resilient. For that purpose, the recently released international standard ISO/SAE 21434 provides guidance on how to perform one of the most relevant cybersecurity activities: The TARA.
In the context of automotive cybersecurity engineering, risk assessment is called “Threat Analysis and Risk Assessment (TARA).” It’s an automotive-specific risk assessment procedure aligned with the ISO/SAE 21434 standard. As with any risk assessment, TARA starts with the definition of the item that needs to be ensured for cyber resilience. Afterwards, damage scenarios and threats are identified, and their respective impact and feasibility are carefully assessed to determine a corresponding risk value .
TARA is an indispensable mechanism to driving security by design — this is proven to be the most effective and efficient way of ensuring security in the final product. Ultimately, as TARA is one of the core activities defined within the ISO/SAE 21434, customers will certainly demand its execution and maintenance throughout the product lifecycle.
ISO/SAE 21434 provides a standardized approach to TARA such that risk and risk treatment decisions can be understood and compared across organizations along the supply chain. Generally, TARA consists of the following steps:
Asset identification — to identify objects of the system that need to be protected from cyberattacks (e.g., a software program or a communication link)
Damage scenario identification and impact rating — to identify negative consequences from a successful cyberattack and to estimate the impact on the system and its user
Threat scenario identification and attack path analysis — to enumerate potential ways of attacking the asset and to identify the series of actions required to achieve these attacks
Attack feasibility rating — to estimate the ease or plausibility of identified attacks
Risk value determination — to calculate the value of risk from impact and attack feasibility
Risk treatment decision — to make conscious decisions about treating potential attacks (e.g., reducing the risk or retaining the risk)
Unsurprisingly, the race to devise quantum-resistant cryptography is on. The National Institute of Standards and Technology (NIST) is endeavoring to standardize post-quantum cryptographic algorithms. Fortunately, the banking industry has thrown its considerable weight behind the initiative to ensure financial systems are in pole position for the implementation of quantum-safe encryption.
Even so, integrating cyber agility with system modernization will be a massive undertaking for top-tier banks. It will involve the entire cast of financial services players and standards bodies and will be supported by cross-industry cooperation at all levels.
Here are three reasons for getting quantum-ready now:
Cyber resilience: Prepare, protect, detect, respond, recover
Software-defined vehicles: Software dream, integration nightmare
Preparing for a quantum future
Risk treatment decisions are used to derive cybersecurity design, architecture and implementation details. Without a proper TARA, cybersecurity engineering is prone to fail because security controls might not be considered if a potential threat hasn’t been identified, or if incorrect risk values lead to a wrong priority ranking and high risks are mistakenly treated as acceptable ones.
The quality of TARA strongly depends on the knowledge and experiences of the cybersecurity engineers who perform the analyses. In addition to being familiar with the standard and method, a competent cybersecurity engineer needs to have an in-depth understanding of the automotive systems under evaluation and up-to-date knowledge of attack methods and exploitation techniques specific to the automotive domain. Additionally, he or she must be a good communicator when collaborating with development teams, architects, safety engineers and other experts in order to complete different parts of the TARA.
Details matter: In a TARA process, an experienced cybersecurity engineer knows where to focus, where vulnerabilities are likely to appear, where to look for common paths of attacks and how to produce useful information. The description of a threat needs to be precise and informative to provide sufficient understanding for deriving cybersecurity goals and effective countermeasures.
TARA is an iterative process done in tandem with project development. Often, key information is missing for TARA at the beginning of a project. One way to overcome this is to use assumptions to limit the scope of analysis and to offset the lack of information. These assumptions are then changed once more information (such as system architecture and software design) becomes available. For example, by assuming that an electronic control unit (ECU) has security access for privileged diagnostics, you can exclude threats that use direct diagnostic interface to read and write ECU data or code. If more details become available along the project development, additional threats related to bypassing or manipulating the security access implementation can be added in the analysis.
TARA excellenceTARA is a pivotal step for systematically managing automotive cybersecurity risks. Familiarity with the TARA process, method and tools, combined with knowledge in automotive cybersecurity engineering and past project experiences, are key factors to guaranteeing the quality of TARA. DXC Luxoft has a pool of automotive cybersecurity consultants with the technical expertise to steer your organization toward TARA excellence. Contact our Software Factory team to learn more about how we can support your TARA process and secure your automotive products.
Ronaldo Mendes is Automotive Process Architect (ASPICE and Cybersecurity). Ronaldo is a seasoned automotive software development stakeholder with more than 10 years’ experience in DC ECUs software design and validation, quality assurance and process improvement. His focus is to steer organizational transformations to ensure smooth integration of processes, methods and state-of-art tools in alignment with industry standards and expectations, such as ASPICE and Cybersecurity. He has a wide network within ASPICE and cybersecurity communities and uses these connections to constantly reflect automotive engineering best practices within the organization.
Thank you for providing your contact information. We will follow up by email to connect you with a sales representative.