Intelligent
Automotive Solutions

Automotive Security

Automotive Security

We offer solutions for automotive security across the entire life cycle of vehicles for OEMs and the supply industry. This includes support during the development phase, during type approval (homologation) of large-scale production projects and during the operation of your product - the "operational life cycle". We consider the topic of the General Data Protection Regulation "at the latest" during the Threat and Risk Analysis (TARA). Our consultants have many years of experience in automotive series development.

Ongoing training and certifications

We deliver added value through permanent training in research projects and through staff certification; for example, many of our specialists have certificates for ISO 21434 and the 270xy series of standards in addition to their social competence.

Do you have questions?

DI Stefan Wachter

DI Stefan Wachter
Head of Business Competence Center Automotive

Cooperation

We are happy to support you with our systematic approach throughout the entire product life cycle. We also offer assistance in critical project phases and in the event of capacity bottlenecks. No matter how you commission us - trust is one of the cornerstones of our cooperation.

We take away your worries: Through our extremely flexible design of the cooperation, we take over work packages completely or partially, provide support on site and/or remotely and adapt the scope of support to your requirements.

Cyber Security

The focus of cyber security is on the product - the related standard is ISO 21434. With a Cyber Security Management System [CSMS], all necessary actions at company level for a "cyber-secures" product are understood. For serial development projects, activities are combined with our security-by-design and trusted-zones approaches.

Cyber Security Management System (CSMS)
Cyber Security Management System (CSMS)
Cyber Security Management System (CSMS)

According to ISO 21434: Introduction in your company as well as operational implementation.

Cyber Security: Threat and Risk Assessment (TARA)
Cyber Security: Threat and Risk Assessment (TARA)
Cyber Security: Threat and Risk Assessment (TARA)

Analysis of product assets: proposals for the protection of intellectual property. Cyber security assurance level is basis for development and verification and/or validation.

Security Manager according to ISO 21434
Security Manager according to ISO 21434
Security Manager according to ISO 21434

Takeover of the Security Manager according to ISO 21434 as well as partial tasks in innovation and series development projects.

Security by Design
Security by Design
Security by Design

Creation of architectures based on our concept of "trusted zones" according to your specifications and customer load specifications (also: defence in depth). 

Security requirements
Security requirements
Security requirements

We define security requirements, carry out code reviews and support you with vulnerability scans.

Testing
Testing
Testing

We carry out fuzz and penetration tests at and with you.

Information Security

An Information Security Management System [ISMS] is required for a company - specifications for this are based on the ISO 2700x standards. The right implementation enables a basis for your company to develop and test "cyber-secure" products. For this purpose, risk analyses are carried out and the appropriate measures are taken. You can check the correct implementation with an internal Information Security Assessment (ISA). The German Association of the Automotive Industry [VDA] has presented a cross-company standard for comparability: TISAX stands for Trusted Information Security Assessment Exchange.

Information Security Management System (ISMS)
Information Security Management System (ISMS)
Information Security Management System (ISMS)

Consulting and support for the introduction and optimisation of an Information Security Management System (ISMS) based on ISO 2700x

Information Security Officer
Information Security Officer
Information Security Officer

We support your Information Security Officer (ISO) / Security Representative or we provide one for you.

Risk and gap analyses
Risk and gap analyses
Risk and gap analyses

Carrying out risk and gap analyses and internal audits

Information Security Assessments (ISA)
Information Security Assessments (ISA)
Information Security Assessments (ISA)

Implementation of Information Security Assessments (ISA)

Trusted Information Security Assessment Exchange (TISAX)
Trusted Information Security Assessment Exchange (TISAX)
Trusted Information Security Assessment Exchange (TISAX)

Comprehensive advice & audits

Further information: www.msg.group

msg Plaut & AIT

msg Plaut & AIT cooperate to further develop safety & security in the automotive sector.
Read here more.

ait logo

msg Plaut tests cyber security in vehicles & systems with "THREATGET

With THREATGET, manufacturers and suppliers have a tool at their fingertips to prepare the cyber security of their vehicle systems for type approval in conformity with ECE and thus remain competitive in top markets. This tool was developed at the AIT Austrian Institute of Technology together with LieberLieber Software, and msg Plaut is now successfully using it in practice. The early detection of risks saves costs and the updatable threat catalogue automatically keeps the analysis up to date.

Sie wollen mehr Informationen? Wir helfen Ihnen gerne weiter!

Kontaktieren Sie uns!

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input
Invalid Input

DI Stefan Wachter

DI Stefan Wachter
Head of Business Competence Center Automotive