Your cart is currently empty!
ISO 26262 + ASPICE + ISO/SAE 21434
The three frameworks that govern software-bearing automotive products. Functional safety prevents the vehicle from harming users due to malfunction. ASPICE prevents bad software-engineering process from producing those malfunctions. Cybersecurity prevents an adversary from creating the malfunction. This module gives you instructor-level awareness — not full compliance mastery — of all three. Enough literacy to engage participants whose work lives inside these frameworks.
What’s in this module
- The three frameworks at a glance — and how they relate
- ISO 26262 — functional safety fundamentals
- ASIL classification — Severity × Exposure × Controllability
- The V-model lifecycle
- ASIL decomposition & allocation
- ASPICE — process capability for automotive software
- The six capability levels (CL0–CL5)
- ASPICE 4.0 — what’s new (2023)
- ISO/SAE 21434 — cybersecurity engineering
- UN R155 / R156 — type-approval cyber requirements
- How the three frameworks interact
- DFSS linkage — DMADV through safety / process / cyber
- Instructor facilitation pattern
- Self-check (10 questions)
1. The three frameworks at a glance
ISO 26262
“Will the product harm someone due to malfunction?”
Functional safety standard. 2nd Edition (2018). Defines ASIL classification A-D, hazard analysis (HARA), V-model lifecycle, requirements for hardware and software. Driven by potential harm to humans.
ASPICE
“Was the product built using good engineering process?”
Process capability framework. Version 4.0 (Dec 2023). Six capability levels (CL0–CL5). Most OEMs require CL2 minimum, CL3 for safety-critical software. Driven by repeatability and quality of development process.
ISO/SAE 21434
“Can an adversary harm someone by attacking the product?”
Cybersecurity engineering. Published 2021. Defines Cybersecurity Management System (CSMS), TARA (Threat Analysis & Risk Assessment), CAL (Cybersecurity Assurance Levels). Mandatory via UN R155 for new types.
Process (ASPICE) = how the team built the software — independent of the outcome.
Security (ISO 21434) = an adversary deliberately makes the product fail.
Modern programmes must address all three in parallel. They share artefacts (especially safety + cyber TARA), but they’re distinct disciplines.
2. ISO 26262 — functional safety fundamentals
ISO 26262 (“Road vehicles — Functional Safety”) is the international standard governing safety of electrical and electronic systems in vehicles. First published 2011; 2nd Edition released 2018 brought all road vehicles into scope (except mopeds), added semiconductors and motorcycles.
The standard has 12 parts:
| Part | Scope |
|---|---|
| Part 1 | Vocabulary |
| Part 2 | Management of functional safety |
| Part 3 | Concept phase (HARA & safety goals) |
| Part 4 | System-level development (highlighted for Yazaki context) |
| Part 5 | Hardware-level development |
| Part 6 | Software-level development (highlighted for software-bearing Yazaki products) |
| Part 7 | Production, operation, service, decommissioning |
| Part 8 | Supporting processes |
| Part 9 | ASIL-oriented and safety-oriented analyses |
| Part 10 | Guideline |
| Part 11 | Semiconductors (added in 2018) |
| Part 12 | Motorcycles (added in 2018) |
3. ASIL classification — the heart of ISO 26262
ASIL (Automotive Safety Integrity Level) is the central mechanism. Every safety goal gets an ASIL rating that determines how rigorous the engineering must be.
The five classifications
Quality Mgmt
No special functional-safety measures — handled by normal IATF 16949 quality processes
Lowest
e.g. interior lighting control, rear wiper, climate display
Medium
e.g. rear camera, AR-HUD overlay, taillight failure
High
e.g. ABS, airbag deployment, ESC, partial ADAS
Highest
e.g. EPS (steering), AEB (automatic emergency brake), HV pre-charge contactor weld
How ASIL is determined: the S × E × C formula
Three parameters combine to determine ASIL. Each has 3-5 levels.
| Parameter | What it measures | Levels |
|---|---|---|
| S — Severity | How badly will someone be hurt if this hazard occurs? | S0 (no injuries) → S1 (light) → S2 (severe, survivable) → S3 (life-threatening, fatal) |
| E — Exposure | How often is the vehicle in a state where this hazard could occur? | E0 (incredible) → E1 (very low) → E2 (low) → E3 (medium) → E4 (high — typical driving) |
| C — Controllability | If the hazard occurs, how easily can the driver (or others) avoid harm? | C0 (controllable in general) → C1 (simply controllable) → C2 (normally controllable) → C3 (difficult to control or uncontrollable) |
The combination is looked up in a table from ISO 26262-3. The highest ASIL combinations: S3 + E4 + C3 = ASIL D.
- HV pre-charge sequence (Module 6) — contactor weld failure: S3 (potential fire, electrocution), E4 (every key-on event), C3 (driver cannot intervene) → ASIL D
- HVIL response (Module 6) — failure to open contactors on connector disconnect during service: S3, E1, C3 → ASIL B or C
- AR-HUD misaligned overlay (Module 7) — driver follows wrong-lane arrow: S2-S3, E3, C2 → ASIL B or C
- Cabin light always-on: S0 → no ASIL required (QM)
4. The V-model lifecycle
ISO 26262 and ASPICE both build on the V-model: left side is requirements-and-design (top-down), right side is integration-and-verification (bottom-up). Each design level pairs with a corresponding verification level.
Three things matter about the V:
- Every left-side artefact has a paired right-side verification. Requirements have qualification tests. Architecture has integration tests. Detailed design has unit tests. This is non-negotiable.
- Traceability is mandatory. Every requirement traces from system level down to unit level, and every test traces back up. Tool support (DOORS, JAMA, Polarion) is standard.
- The V applies at every level of the supplier hierarchy. Yazaki’s V is nested inside the OEM’s V.
5. ASIL decomposition & allocation
One safety goal at ASIL D can be implemented by two independent ASIL B subsystems that each fail in different ways — the combination meets the ASIL D target. This is ASIL decomposition, and it’s a powerful architectural technique.
| Decomposition | Example |
|---|---|
| ASIL D → ASIL C(D) + ASIL A(D) | One channel does most of the safety work (ASIL C-grade); a simple independent channel adds the gap (ASIL A-grade) |
| ASIL D → ASIL B(D) + ASIL B(D) | Two equal independent channels |
| ASIL D → ASIL D + QM | The primary path carries the full ASIL D burden; no decomposition |
| ASIL C → ASIL B(C) + ASIL A(C) | Similar pattern at ASIL C |
6. ASPICE — process capability for automotive software
Automotive SPICE is the dominant process-assessment framework for automotive software development. Published by the VDA (German automobile association); the trademark is VDA-owned. Current version: 4.0 (released December 2023); replaced ASPICE 3.1.
The framework has two dimensions:
- Process Reference Model (PRM) — defines the processes (32 processes in 8 groups in v4.0)
- Process Assessment Model (PAM) — defines indicators for evaluating capability of each process
The processes in the PAM are grouped:
7. The six capability levels (CL0 – CL5)
Incomplete
Process not implemented or fails to achieve its purpose
Performed
Process produces outputs; not yet managed
Managed
OEM baseline. Planned, monitored, work products controlled
Established
Safety-critical baseline. Org-wide standard processes; ISO 26262 paired
Predictable
Statistically measured & controlled; rarely required
Innovating
Continuously improving; aspirational only
For each process being assessed, an evaluator rates the capability level on a 4-step ordinal scale: Not Achieved (0–15%) — Partially Achieved (15–50%) — Largely Achieved (50–85%) — Fully Achieved (85–100%).
8. ASPICE 4.0 — what’s new (December 2023)
The first major revision since 3.1 (2017). Reflects how automotive software has changed since.
| Change | Why it was added |
|---|---|
| Hardware Engineering process group (HWE.1–4) | Modern mechatronic systems are HW+SW; previously no HW process coverage in ASPICE |
| Machine Learning Engineering process group (MLE.1–4) | ADAS, autonomous, in-cabin AI — required ML-specific lifecycle |
| Strengthened cybersecurity alignment | Cross-references ISO/SAE 21434; in ASPICE 3.1, cyber was outside scope |
| Shift from “Work Products” to “Information Items” | Less prescription of specific documents; focus on the information content needed |
| Enhanced Agile / DevOps support | Modern toolchains and CI/CD aligned with assessment |
| Improved repeatability of assessments | Reduces subjectivity in assessor judgments |
9. ISO/SAE 21434 — cybersecurity engineering
Published October 2021. The cybersecurity equivalent of ISO 26262 — defines a Cybersecurity Management System (CSMS) and a development lifecycle for cybersecurity-relevant E/E systems.
Key elements:
| Concept | What it does |
|---|---|
| CSMS — Cybersecurity Management System | The organisational framework — policies, processes, roles. Required for type approval (UN R155). |
| TARA — Threat Analysis & Risk Assessment | The cyber equivalent of HARA. Identifies threats, attack paths, risk levels. |
| CAL — Cybersecurity Assurance Levels | Analogous to ASIL — defines rigour of cybersecurity engineering for a given asset |
| Security Concept | The top-level cybersecurity requirements — analogous to safety goals |
| Vulnerability management | Continuous monitoring of new vulnerabilities discovered after launch — including software updates (OTA) |
| Incident response | What happens when a cyber incident occurs — disclosure, patches, communication |
10. UN R155 / R156 — the regulatory teeth behind ISO 21434
ISO 21434 is a standard; UN Regulations 155 and 156 are the mandatory type-approval regulations that enforce its application.
| Regulation | Scope |
|---|---|
| UN R155 | Cybersecurity Management System (CSMS) — the manufacturer must have one. Implemented via ISO 21434. |
| UN R156 | Software Update Management System (SUMS) — over-the-air updates must be governed by a documented system covering integrity, authorisation, and rollback |
The phase-in:
- July 2022 — applies to new vehicle types in EU and ECE-following markets (India follows ECE)
- July 2024 — applies to all new vehicles (not just new types) — i.e. ongoing production
- Affects type approval — vehicles without CSMS/SUMS cannot be sold
11. How the three frameworks interact
In practice, all three apply simultaneously to a single software-bearing product. They share artefacts and processes.
| Activity | ISO 26262 | ASPICE | ISO 21434 |
|---|---|---|---|
| Top-level risk analysis | HARA → Safety Goals | Not directly | TARA → Security Goals |
| Classification | ASIL (A-D + QM) | Capability Level (CL0-5) | CAL |
| Lifecycle model | V-model | V-model (Process Reference Model) | V-model concept-design-implement-verify |
| Mandatory traceability | Yes — safety reqs to verification | Yes — between SYS, SWE artefacts | Yes — security reqs to mitigation |
| Independence requirements | Required for ASIL decomposition | Independent verification roles | Cybersecurity case |
| Type approval link | UN R79 (steering), R13H (brakes), etc. | None directly (process) | UN R155 (CSMS), R156 (SUMS) |
12. DFSS linkage — DMADV through safety / process / cyber
| DMADV Phase | Safety / Process / Cyber content that lands here |
|---|---|
| Define | ASIL target (from HARA); ASPICE CL target per OEM CSR; CAL target (from TARA); CSR explicitly references all three frameworks |
| Measure | Safety CTQs (e.g. failure rate ≤ 10⁻⁸/h for ASIL D random HW failures, FIT rate, single-point fault metric SPFM); ASPICE process metrics; security metrics (vulnerability response time, encrypted communication coverage) |
| Analyze | HARA, FMEDA, TARA at concept level. Architecture choices: redundancy vs simplicity, decomposition vs monolithic, integrated cyber vs HW HSM |
| Design | Detailed safety requirements (Part 4, 5, 6 of 26262); software architecture per ASPICE SWE.2; cyber architecture per 21434; FMEA-MSR for in-operation safety functions (Module 3) |
| Verify | Fault injection testing, ALT for HW failure modes, ASPICE assessment, penetration testing, cybersecurity validation testing per 21434, vulnerability scanning, type-approval testing per UN R155/156 |
13. Instructor facilitation by function
| Function | Safety / Process / Cyber angle that lands |
|---|---|
| SGM-EI / AGM-EI Software Lifecycle | Their core domain. They live in ASPICE assessments and ISO 26262 safety cases. Treat as cohort SMEs; engage strategically on framework alignment. |
| EI — System Engineering Lead | SYS process group, V-model decomposition, traceability matrices, ASIL allocation across subsystems. |
| EI — AR HUD PM | HUD overlay accuracy as an ASIL-B/C function; CAL classification of HUD content path; OTA update strategy under UN R156. |
| EI — Sensor Developer | Sensor in safety-critical chain (e.g. driver-monitoring camera for HUD eye-tracking); FMEDA for HW failure rates. |
| EI — Innovation Cell | ML/AI in ADAS context; ASPICE 4.0 MLE process group; AI safety case challenges. |
| CDDC — AGM (HV/BMS) | BMS contactor management as ASIL D function; HVIL response; CAL for BMS communication interfaces. |
| Testing Center Manager | Fault injection capacity, FMEDA test setup, cyber penetration testing, type-approval testing per UN R155/156. |
| Shared Service — Thermal/EMI/CFD | FMEDA inputs for HW failure rates; FIT (Failures-in-Time) calculations. |
| SD Coordination / Project Mgmt | ASPICE assessment timeline integration with APQP (Module 4); supplier ASPICE / 21434 compliance assessment. |
| WH / CDDC connector teams | Their products are part of the safety case — orange jacket, HVIL, last-mate-first-break (Module 6) — even though they aren’t “software”. |
Instructor self-check
Ten awareness-level questions across the three frameworks.
