Wipro’s Connected Automotive Security Our connected automotive solution Connected Auto Solutions helps you deliver an engaging digital customer experience and offer value The connected cars market is projected added services. The solution built on to exponentially grow in the next few a ‘Secure-by-Design’ approach takes years. Autonomous vehicles have care of multifaceted requirements of transformed the auto industry, but there converged digital infrastructure, are also some unique risks associated i.e. IT / OT and deliver trust based with this growth. high-assurance solution model. Today, cyber security threats for An extremely fragmented supply chain autonomous vehicles are real; with and the convergence of multiple systems OEMs facing significant challenges also add to the complexity. Multiple given the increasing product complexity global suppliers for car components and features. As autonomous vehicles and a complex supply chain further become more connected, the number enhance the risk of cyber security. of electronic control units (ECUs) Integration flaws can easily create keeps increasing to add additional vulnerabilities which can be exploited. functionalities. With millions of lines of codes in each ECU, this creates In addition, the end user may create multiple entry points for hackers to security issues by ignoring the attack an autonomous vehicle. relevant guidelines or by connecting a compromised device to the system. Attack from Remote attack downloaded apps on vehicle bus

Man-in-the-middle Compromised attack actuator

Software OBD2 vulnerabilities attack exploit

Attack on key / Malicious cert store firmware update

Malware infection Un-authorized & through USB infected mobile device connection

Weak trust & Comm security: Device-ID, FW / SW Un-authorized System internal & external & system integrity access: V2X upgradability model limitation check limitation limitation

Figure 1: Connected auto – Threat vectors Endpoint authentication

System integrity check Domain isolation Intrusion & anomaly detection

Digital twin

Test & verification Product design Test & verification System / apps

Key-store: physical / virtual Message signing + auth. Secure comm: TLS / DTLS

Secure-boot Context aware msg. filtering App bin / lib Root-CA | trust / cert mgmt. Trust federation Container runtime Key management Endpoint authentication Host OS vTPM Device enrollment & prov. Access policy verification

Code-sign (OTA) Application whitelisting

Figure 2: Wipro’s answer to the threat landscape

Enterprises are leveraging digital The solution technologies to transform their business and introduce innovative products / In the future, multi-layered security services. In the recent past, adversaries approaches will almost certainly be used have exploited products. Product to further protect connected cars from security is paramount for successful remote hacking. Indeed, various physical digital transformation and customer authentication methods such as experience vulnerabilities resulting in fingerprint and facial recognition are severe consequences such as product already in testing, working in tandem recalls, regulatory actions and loss of with onboard identity management customer confidence among others. systems to increase the security of the Wipro’s industrial and engineering whole vehicle. The end goal remains the service helps customer to design, same - protecting the legitimate owner engineer and build products / platforms and occupants of the vehicle. with inherent trust and resilience, while offering security assurance as part of product life-cycle management. and anomaly detection

Secured over-the-air Embedded security: update (firmware Trusted firmware and and software) secure boot

Identity and Connected credential life-cycle auto solutions management trust | resilience assurance

Security assurance life-cycle-management: DevSecOps

Data security and access control

Figure 3: Wipro’s connected auto solutions Trust | Resilience | Assurance Service and solutions Trust based security model Elevate identity as a new perimeter for people, Wipro: Product security engineering systems and things A trusted partner Chip-to-cloud Product / platform security Build authentication, access control, data engineering security, communication security and system integrity model for frictionless interactions Embedded device security engineering High assurance Enable and integrate security assurance within Product security assurance & product life-cycle management certification Security intelligence Leverage AI / ML for product intelligence and Solution frameworks & threat detection acceleration Industry compliance & certification Industry standard based security design for seamless product validation, compliance & certification

Years of strong Wipro’s EngineeringNXT is a set of engineering DNA 35+ offerings products, platforms & technologies that enable innovation at scale to build. Products engineered 5000+ It leverages our maturity of: • Product development methodologies Global development • Our engineering DNA centers, with 25 • Specialized talent 20,000+ engineers • Access to a diverse ecosystemv

Global customers across 10 industries 400+

Building Blocks of EngineeringNXT Program

VLSI & Software Wireless Data IoT & Product & system design platforms industry 4.0 platform security engineering Wipro Limited Wipro Limited (NYSE: WIT, BSE: strong commitment to sustainability Doddakannelli, 507685, NSE: WIPRO) is a leading and good corporate citizenship, we Sarjapur Road, global information technology, have over 175,000 dedicated Bangalore-560 035, consulting and business process employees serving clients across six India services company. We harness the continents. Together, we discover Tel: +91 (80) 2844 0011 power of cognitive computing, ideas and connect the dots to build Fax: +91 (80) 2844 0256 hyper-automation, robotics, cloud, a better and a bold new future. wipro.com analytics and emerging technologies to help our clients adapt to the digital world and make them successful. A company recognized globally for its For more information, comprehensive portfolio of services, please write to us at [email protected]

IND/TBS/MAY-DEC 2020