The The Two Pillars of Automotive Safety: How ISO/SAE 21434 Threats Link to ISO 26262 Hazard

The Two Pillars of Automotive Safety: How ISO/SAE 21434 Threats Link to ISO 26262 Hazards | Hermes Solution

Hello, this is Hermes Solution.
This week’s blog explores the two core pillars of automotive safety: cybersecurity (ISO/SAE 21434) and functional safety (ISO 26262).
In today’s automotive industry, cybersecurity and functional safety can no longer be treated as separate disciplines. As vehicles become increasingly connected and autonomous, cyberattacks are evolving from simple data breaches into direct threats to human life.

As of 2024, more than 95% of vehicle cyberattacks are executed remotely, revealing a new class of risks introduced by connectivity and wireless interfaces.

This article explains how “Threats” (under ISO/SAE 21434) and “Hazards” (under ISO 26262) are interrelated and why both standards must be addressed together throughout the vehicle development lifecycle.

ISO/SAE 21434: Understanding “Threats” from a Cybersecurity Perspective

ISO/SAE 21434 defines the automotive cybersecurity management framework across the entire vehicle lifecycle—from concept and design to production, operation, and decommissioning.

A Threat is defined as a potential malicious act that could cause harm to a system or organization.
For example, if an attacker infiltrates an ECU (Electronic Control Unit) or communication channel and manipulates data or injects false control commands, they could directly influence steering or braking functions—transforming a cybersecurity issue into a safety incident.

Core Elements of a Cybersecurity Threat

  • Intentionality: The threat originates from a deliberate, malicious human act—not accidental system failure.

  • Attack Path: The route an attacker takes to reach the target system.
    Example: External Network → Gateway ECU → Internal CAN Bus → Braking ECU

  • Attack Feasibility: Difficulty of execution based on required time, skill, equipment, and access.

  • Asset: Anything that must be protected, such as ECUs, communication channels, encryption keys, or firmware code.

  • Vulnerability: Weaknesses that an attacker could exploit, such as poor encryption, faulty authentication, or open ports.

ISO/SAE 21434 evaluates threats based on the CIA Triad:

  • Confidentiality – Prevent unauthorized data access

  • Integrity – Ensure data and functions cannot be modified arbitrarily

  • Availability – Ensure the system operates when needed

The required protection level is expressed as CAL (Cybersecurity Assurance Level, 1–4):

Level

Risk Level

Assurance Level

Typical Security Measures

Example Systems

CAL
1

Low

Basic protection

Access control, basic authentication

Infotainment, diagnostic ports

CAL 2

Medium

Standard protection

Encrypted communication, logging, user authentication

OBD interface, vehicle gateway

CAL 3

High

Advanced protection

Intrusion detection, integrity checks

ECU-to-ECU communication, OTA update system

CAL 4

Very High

Multi-layered defense

HSM, key protection, intrusion prevention

Braking/steering ECUs, ADAS control systems

 
 

ISO 26262: Understanding “Hazards” from a Functional Safety Perspective

ISO 26262 addresses risks caused by malfunctioning E/E systems in vehicles.
A Hazard refers to a potential source of harm resulting from system malfunction or random hardware/software failure.

While cyberattacks are intentional, hazards are unintentional—arising from faults such as sensor failure, logic errors, or unstable power supply.

HARA: Hazard Analysis and Risk Assessment

ISO 26262 uses three key parameters:

  • Severity (S): Potential level of harm

  • Exposure (E): Likelihood of encountering the situation

  • Controllability (C): Driver’s ability to control or mitigate the situation

Combining these factors yields the ASIL (Automotive Safety Integrity Level), ranging from A to D, with D representing the highest integrity level.
Example: Brake failure at highway speed → ASIL D

Fundamental Differences Between Threats and Hazards

Aspect

 

ISO/SAE 21434 (Threat)

 

ISO 26262 (Hazard)

 

Cause

Intentional malicious attack

Random system fault

Nature of Risk

Adaptive adversary

Statistically predictable failure

Assessment

TARA (Impact × Attack Feasibility)

HARA (Severity × Exposure × Controllability)

Integrity Level

CAL 1–4

ASIL A–D

Time Dynamics

Continuously evolving

Relatively static

Focus

Unknown, emerging attacks

Known failure modes

 
 

In essence, Threats intentionally disrupt system operation, while Hazards result from unintentional malfunctions.
However, they are not independent—a cyber threat can become a safety hazard.

How a Threat Becomes a Hazard

Modern research confirms that cyberattacks can trigger safety incidents:

  • Sensor Data Manipulation: Tampering with radar or camera signals leads to misperception and potential collision.

  • ECU Control Override: Attackers inject commands that alter braking or steering behavior.

  • Communication Interference: Disruption of V2V messages causes cooperative driving systems to malfunction.

These cybersecurity threats can escalate into functional safety hazards under ISO 26262, posing immediate physical risks.

Real-World Example: Remote Brake System Attack

In a controlled test, researchers exploited vulnerabilities in a telematics ECU via a 5G network, gaining access to the in-vehicle CAN bus.
They successfully sent forged braking commands, causing the car to stop abruptly without driver input.

Assessment by Standards:

  • Attack Feasibility: Medium (Skilled attacker within ~1 month effort)

  • Severity (S): S3 – Life-threatening potential

  • Exposure (E): E4 – Highway driving is common

  • Controllability (C): C3 – Driver cannot react
    → ASIL D

This experiment demonstrates how a single cybersecurity breach can directly lead to a functional safety failure—proving that security equals safety.

Comparing TARA and HARA Methodologies

Item

TARA (ISO/SAE 21434)

HARA (ISO 26262)

Target

Cyber threats

System malfunctions

Key Factors

Impact × Attack Feasibility

Severity × Exposure × Controllability

Outcome

Cybersecurity goals + CAL

Safety goals + ASIL

Frequency

Continuous (upon new vulnerabilities)

Event-driven (upon design changes)

Evaluation

Semi-quantitative

Qualitative

 

Both are preventive analyses—TARA anticipates human-driven attacks, whereas HARA models system-driven failures.

Toward Integration: The Rise of HATARA

The industry is now embracing HATARA—an integrated approach combining HARA + TARA to jointly evaluate threats and hazards within one framework.
This unified process aligns ASIL and CAL levels for consistent risk management.

Advantages:

  • Eliminates duplicate analysis

  • Ensures consistency between safety and security requirements

  • Reduces project cost and lead time

  • Enables holistic system-level risk control

Conclusion: Safety and Security Must Converge

Modern vehicles are software-defined, network-connected systems, making isolated management of safety and security impossible.
A security breach can instantly create a safety risk, merging the two domains in practice and lifecycle management.

The automotive industry is already adopting HATARA and STPA-SafeSec methodologies to unify these disciplines.
Ultimately, the ability to integrate ISO/SAE 21434 and ISO 26262 will determine the reliability and trustworthiness of future mobility systems.

Key Takeaways

  • Cybersecurity threats are intentional; functional safety hazards are unintentional.

  • In reality, a single threat can evolve into a hazard.

  • ISO/SAE 21434 and ISO 26262 must be implemented in tandem.

  • HATARA will likely become the industry’s de facto standard.

  • Safety without security is impossible.

This article was prepared by Hermes Solution to emphasize the importance of integrated automotive safety and cybersecurity management.
Hermes continues to provide expert insights on ISO/SAE 21434, ISO 26262, and AI-driven vehicle safety systems.
Design the future of safe mobility with Hermes.

Share this article:

Facebook
Twitter
LinkedIn
WhatsApp