
ISO/SAE INTERNATIONAL ISO/SAE 21434 DRAFT Page 3 of 108
7.5 Vulnerability Analysis ............................................................................................................................ 31
7.5.1 Inputs..................................................................................................................................................... 31
7.5.2 Requirements and Recommendations .................................................................................................. 31
7.5.3 Work Products ....................................................................................................................................... 32
7.6 Vulnerability Management .................................................................................................................... 32
7.6.1 Inputs..................................................................................................................................................... 32
7.6.2 Requirements and Recommendations .................................................................................................. 32
7.6.3 Work Products ....................................................................................................................................... 33
8. RISK ASSESSMENT METHODS ......................................................................................................... 33
8.1 General.................................................................................................................................................. 33
8.2 Objectives ............................................................................................................................................. 34
8.3 Asset Identification ................................................................................................................................ 34
8.3.1 Inputs..................................................................................................................................................... 34
8.3.2 Requirements and Recommendations .................................................................................................. 34
8.3.3 Work Products ....................................................................................................................................... 35
8.4 Threat Scenario Identification ............................................................................................................... 35
8.4.1 Inputs..................................................................................................................................................... 35
8.4.2 Requirements and Recommendations .................................................................................................. 35
8.4.3 Work Products ....................................................................................................................................... 36
8.5 Impact Rating ........................................................................................................................................ 36
8.5.1 Inputs..................................................................................................................................................... 36
8.5.2 Requirements and Recommendations .................................................................................................. 36
8.5.3 Work Products ....................................................................................................................................... 37
8.6 Attack Path Analysis ............................................................................................................................. 37
8.6.1 Inputs..................................................................................................................................................... 37
8.6.2 Requirements and Recommendations .................................................................................................. 37
8.6.3 Work Products ....................................................................................................................................... 38
8.7 Attack Feasibility Rating ........................................................................................................................ 39
8.7.1 Inputs..................................................................................................................................................... 39
8.7.2 Requirements and Recommendations .................................................................................................. 39
8.7.3 Work Products ....................................................................................................................................... 40
8.8 Risk Determination ................................................................................................................................ 40
8.8.1 Inputs..................................................................................................................................................... 40
8.8.2 Requirements and Recommendations .................................................................................................. 40
8.8.3 Work Products ....................................................................................................................................... 40
8.9 Risk Treatment Decision ....................................................................................................................... 40
8.9.1 Inputs..................................................................................................................................................... 40
8.9.2 Requirements and Recommendations .................................................................................................. 41
8.9.3 Work Products ....................................................................................................................................... 41
9. CONCEPT PHASE ............................................................................................................................... 41
9.1 General.................................................................................................................................................. 41
9.2 Objectives ............................................................................................................................................. 42
9.3 Item Definition ....................................................................................................................................... 42
9.3.1 Inputs..................................................................................................................................................... 42
9.3.2 Requirements and Recommendations .................................................................................................. 42
9.3.3 Work Products ....................................................................................................................................... 43
9.4 Cybersecurity Goals .............................................................................................................................. 43
9.4.1 Inputs..................................................................................................................................................... 43
9.4.2 Requirements and Recommendations .................................................................................................. 44
9.4.3 Work Products ....................................................................................................................................... 45
9.5 Cybersecurity Concept .......................................................................................................................... 45
9.5.1 Inputs..................................................................................................................................................... 45
9.5.2 Requirements and Recommendations .................................................................................................. 46
9.5.3 Work Products ....................................................................................................................................... 46
10. PRODUCT DEVELOPMENT ................................................................................................................ 46
10.1 General.................................................................................................................................................. 46
10.2 Objectives ............................................................................................................................................. 49
10.3 Inputs..................................................................................................................................................... 49
10.3.1 Prerequisites ......................................................................................................................................... 49
10.3.2 Further Supporting Information ............................................................................................................. 50
ISO/SAE DIS 21434:2020(E)
© ISO/SAE International 2020 – All rights reserved