Improve your security and compliance posture while automating automotive and cloud compliance with AWS.
Check out the Security Pillar of the Well Architected Connected Mobility Lens
Connected Mobility Lens for the AWS Well-Architected Framework, enables you to review and improve your cloud-based architectures and better understand the impact of design decisions.
Resources
Blogs
Whitepapers and other resources
Customer stories
Read how automotive customers are using AWS to deploy their most sensitive workloads.

Toyota Motor North America: Securing the cloud with AWS KMS
Toyota Motor North America, along with Booz Allen Hamilton, has created a secure, cloud-native solution to analyze billions of messages per day using AWS Key Management Service (AWS KMS)

VicOne Steers the Automotive Industry Towards Faster Security Protection with AWS
VicOne drives the adoption of cybersecurity systems across the automotive industry with its xNexus platform, leveraging AWS IoT FleetWise and Amazon Timestream to rapidly integrate and analyze vehicle data.

Scaling and Enhancing Security for Electric Vehicle Chargers Using AWS IoT Core with Wallbox
Learn how electric vehicle charging company Wallbox migrated its connectivity infrastructure to AWS IoT Core.
Compliance, Standards & Framework
AWS empowers automotive customers
AWS Cloud Security for automotive is a guide to customers on establishing processes and security tools to manage and govern their AWS environment. Automotive clients can find compliance, frameworks and best practices that discuss policies and standards of security within automotive to enforce overall compliance and security on their platforms.
Automotive compliance
UNECE 155 - Cyber security and cyber security management system
UNECE Regulation 155 requires vehicle manufacturers to establish a Cyber Security Management System
UNECE 156 - Software update and software update management system
UNECE Regulation 156 requires vehicle manufacturers to establish and a Software Update Management System (“SUMS”) that covers certain mandatory elements
ISO/SAE 21434-Road Vehicles - Cybersecurity Engineering
This standard specifies engineering requirements for cybersecurity risk management regarding concept, product development, production andoperation,
Automotive Software Process Improvement Capability Determination (SPICE)
ASPICE is an industry-standard guideline for evaluating software development processes.
IS0 24089-Road vehicles — Software update engineering
This standard specifies requirements and recommendations for software update engineering for road vehicles on both the organizational and the project level
ISO 9001& IATF 16949-Quality management & Automotive Quality Management Systems
This standard sets out the criteria for a quality management system
TISAX Assessment Level 3 (AL3)
Amazon Web Services (AWS) has completed a Trusted Information Security Assessment Exchange (TISAX) assessment. This standard provides the European automotive industry a consistent, standardized approach to information security systems.
Key Certificates & Attestations
ISO 27001, 27017, 27018
AWS has certification for compliance with ISO.
SOC
AWS System and Organization Controls (SOC) Reports are independent third-party examination reports that demonstrate how AWS achieves key compliance controls and objectives. The purpose of these reports is to help you and your auditors understand the AWS controls established to support operations and compliance.
PCI DSS
PCI DSS applies to entities that store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD), including merchants, processors, acquirers, issuers, and service providers. The PCI DSS is mandated by the card brands and administered by the Payment Card Industry Security Standards Council.
Key Alignments and Frameworks
CSA (Cloud Security Alliance)
The CSA aims to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
GDPR
The European Union’s General Data Protection Regulation (GDPR) protects European Union (EU) individuals’ fundamental right to privacy and the protection of personal data.
NIST 800-53
The National Institute of Standards and Technology (NIST) 800-53 security controls are generally applicable to US Federal Information Systems.
Shared responsibility model
Security and Compliance is a shared responsibility between AWS and the customer. This shared model can help relieve the customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. Customers are still responsible for other aspects of security, such as the security measures used to protect your applications - which is no different than if your application was running in a traditional data center.

AWS automotive security partners
Learn more about how automotive security partners can help you secure your automotive workloads.

Argus Cyber Security
Argus Cyber Security offers onboard and offboard vehicle cyber security products and services to protect private and commercial vehicles against cyber attacks. Our cloud-based cyber security solutions include VSOC (Vehicle Security Operation Center) and Vehicle Vulnerability Management (VVM). Argus VVM monitors, detects and helps mitigate software vulnerabilities, enabling early prevention of potential cyber threats. Argus VSOC detects attacks and/or suspicious events, as well as providing security analysts with tools for investigation and the insights needed for response and recovery.

Upstream
Upstream provides a data management and cybersecurity platform, purpose-built for connected vehicles and smart mobility. The Upstream Platform transforms highly distributed vehicle data into centralized, structured, and contextualized data lakes. Utilizing advanced machine learning technologies, the platform unlocks the value of mobility data, delivering unparalleled automotive cybersecurity and data-driven applications.
Get started
