Cybersecurity
Key Takeaways
TL;DR — UNECE R155 has been mandatory for all new vehicles produced in EU, UK, Japan, and South Korea since 1 July 2024, and it requires a valid CSMS Certificate of Compliance plus a per-vehicle-type cybersecurity approval. This roadmap walks an architect-grade path through Annex 5 (7 threat categories spanning the commonly-cited 69 sub-entries), the CSMS audit and 3-year surveillance cadence, the type approval workflow, and the operational pitfalls that delay approvals.
- 1.UNECE R155 entered into force on 22 January 2021 and became mandatory for all new vehicle production (Categories M, N, O) in UNECE contracting parties from 1 July 2024; Category L (motorcycles, mopeds, quadricycles) follows from 1 July 2029.
- 2.The CSMS Certificate of Compliance is valid for a maximum of 3 years and is a hard prerequisite for any Vehicle Type Approval under R155.
- 3.Annex 5 organises the threat baseline into 7 high-level categories spanning back-end servers, communication channels, update procedures, unintended human actions, external connectivity, data and code, and an “other” bucket — with a list commonly cited as 69 vulnerability and attack sub-entries that every TARA must demonstrably address.
- 4.South Korea's national cybersecurity regime under MOLIT applies from 14 August 2025 for new vehicle types and from 14 August 2027 for all vehicles; Japan's MLIT enforces R155 directly via its 1958 Agreement membership.
- 5.Documentation must be retained for at least 10 years after end of production, and any change to the vehicle type's cybersecurity-relevant architecture triggers a re-assessment.
- 6.UNECE R155 (CSMS) and UNECE R156 (SUMS / Software Update Management System) are paired prerequisites; UN R157 (ALKS) inherits both for automated lane-keeping system approval.
- 7.The most common type-approval delays trace back to weak supplier traceability under Clause 7 of ISO/SAE 21434, incomplete Annex 5 mapping, and missing post-production monitoring evidence.
At a Glance
- One-Sentence Answer
- UNECE R155 readiness requires a functioning CSMS, vehicle-level cybersecurity evidence, supplier coordination, and post-production monitoring.
- Who This Is For
- OEM cybersecurity leaders, CSMS owners, homologation support teams, Tier-1 suppliers, and programme managers.
- Last Reviewed
- May 2026
- Primary References
- UNECE R155, ISO/SAE 21434, CSMS evidence, cybersecurity assessment readiness.
- Practical Use
- Use this guide to plan cybersecurity evidence activities before customer, assessor, or regulatory review.
UN Regulation No. 155 has stopped being a future-tense compliance topic. Since 1 July 2024, no Category M, N, or O vehicle can be type-approved in any UNECE 1958 Agreement contracting party that has adopted the regulation without a valid Cybersecurity Management System certificate and a per-vehicle-type cybersecurity assessment. That single sentence is now the business reality for global OEMs and the Tier-1 suppliers that feed them. The interesting question for engineering leadership is no longer “does R155 apply” — it is whether the evidence chain from threat to mitigation to post-production monitoring can survive a hostile audit by KBA, UTAC, RDW, or another technical service.
This post is a working roadmap rather than an explainer. It walks the dual-evidence model that R155 imposes, decodes Annex 5, sketches a 12–18 month sequence from gap analysis to first approval, and surfaces the operational reasons approvals slip. The aim is to give a Cybersecurity Manager or programme owner a defensible internal plan, not to summarise the regulation text.
What R155 Is and Why It Bites Now
UNECE R155 entered into force on 22 January 2021 under the 1958 Agreement and was incorporated into EU type-approval law via Regulation (EU) 2019/2144 and its delegated acts. The regulation requires two distinct pieces of evidence: a CSMS Certificate of Compliance issued to the manufacturer at the organisation level, and a Vehicle Type Approval issued per vehicle type that demonstrates Annex 5 threats have been identified and treated. Both are mandatory; neither is sufficient on its own. The consolidated text (Supplement 3, published in EUR-Lex as OJ:L_202500005, in force 10 January 2025) is the working baseline today.
The reason R155 bites now is that the transitional grace period expired. Before 1 July 2022, a manufacturer could place a new vehicle type on the market without an R155 approval. Between 1 July 2022 and 30 June 2024, existing types could continue to be produced under the prior approval. From 1 July 2024 onward, every vehicle of Categories M (passenger cars and buses), N (goods vehicles), and O (trailers) leaving an assembly line in an adopting jurisdiction must be backed by a current R155 approval. Non-adopting markets (notably the United States and parts of South-East Asia) remain unaffected, but most global OEMs build for adopting markets.
The Two Layers of Evidence: CSMS vs Vehicle Type Approval
R155 paragraph 7.2 governs the Cybersecurity Management System. The manufacturer must show that an organisation-wide CSMS covers the development, production, and post-production phases — that there are processes for governance, risk management, supplier interfaces, vulnerability handling, incident response, and lessons-learned feedback. The Certificate of Compliance is granted by the type-approval authority on the basis of a documentation review and an on-site audit, typically against ISO/SAE 21434 used as the de facto technical reference (and audited per the guidance in ISO/PAS 5112:2022). It is valid for a maximum of 3 years and is subject to ongoing surveillance.
R155 paragraph 7.3 governs the per-vehicle-type assessment. For each vehicle type the manufacturer submits a system description, a Threat Analysis and Risk Assessment, evidence that mitigations have been implemented and verified, and a post-production monitoring plan. Variants and versions of a vehicle type that share the cybersecurity-relevant architecture can usually be grouped, but any change that materially alters the attack surface (a new connectivity ECU, a different gateway, a new OTA channel) triggers an extension or a re-assessment.
The CSMS Audit Process Step by Step
CSMS certification follows a familiar stage-gate sequence. Application opens with a scope statement — which legal entities, which sites, which product lines, which lifecycle phases. Documentation review covers the Cybersecurity Policy, role allocation, the Cybersecurity Plan template, supplier and Tier-2 cascade procedures, vulnerability handling, and incident response. The on-site audit then sample-tests live programmes against those procedures: an auditor will pick a recent vehicle type and trace a specific threat from the TARA into a verification artefact and into the post-production plan. Surveillance audits, typically annual, re-test that the CSMS is still in operation. The certificate is suspended or withdrawn if surveillance reveals systemic gaps.
Two audit findings recur often enough that they should be pre-empted in any internal mock audit. The first is missing evidence of supplier capability assessment under Clause 7.4.1 of ISO/SAE 21434 — auditors expect to see, for any safety-or-cybersecurity-critical supplier, a documented capability conclusion and a referenced Cybersecurity Interface Agreement. The second is the absence of a closed-loop trail from a field vulnerability through triage and patch decision back to the next TARA cycle.
Annex 5 Decoded: 7 Categories, 69 Sub-entries
Annex 5 of UNECE R155 is the threat baseline that every TARA must demonstrably address. Part A lists 7 high-level categories of vulnerability and threat. Parts B and C list expected mitigations, organised at vehicle level (Part B) and at the level of areas outside the vehicle that affect it (Part C). The sub-entry count is widely cited as 69, but the exact number drifts slightly between consolidated revisions — practitioners should map against the EUR-Lex consolidated text current at the time of submission rather than against an older PDF. The shape of the table is what matters: every threat scenario in the TARA must be linkable to one or more Annex 5 entries, and every Annex 5 entry must be either addressed or formally argued out of scope.
| Category | Description | Typical Mitigation |
|---|---|---|
| 1. Back-end servers | Threats against telematics and OEM cloud services that affect vehicles in the field — credential abuse, broken authentication, insider data exfiltration. | Hardened backend, MFA on operator accounts, key rotation, segmentation, monitoring and SIEM, supply-chain controls on cloud vendors. |
| 2. Communication channels | Threats during vehicle-to-anything exchange — spoofing, replay, man-in-the-middle on cellular, V2X, Wi-Fi, Bluetooth, DSRC. | TLS or DTLS with mutual authentication, IEEE 1609.2 certificates for V2X, Secure Onboard Communication on in-vehicle buses, replay windows. |
| 3. Update procedures | Threats against OTA and dealer-tool firmware updates — image substitution, rollback, unauthorised flashing. | Signed images, Secure Boot, monotonic anti-rollback counters, UNECE R156 SUMS evidence, secure diagnostics under UDS 0x29. |
| 4. Unintended human actions | Misconfiguration, weak operator behaviour, social engineering of dealers and service personnel. | Role-based access control, hardware-backed credentials, training, audit logs, dual-control on cybersecurity-critical operations. |
| 5. External connectivity | Threats via connected vehicle interfaces — paired smartphones, charging infrastructure, OBD-II dongles, third-party apps. | Interface authentication, allow-listed apps, ISO 15118 plug-and-charge controls, OBD-II security gateway, hardened companion-app stacks. |
| 6. Data and code | Threats targeting vehicle data and software — extraction, tampering, privacy breach, IP theft, code injection. | Secure storage, Hardware Security Module-backed keys, GDPR / DPDP / APPI data-handling controls, code-signing, runtime integrity. |
| 7. Other (open) | Residual category covering threats not captured elsewhere — supply-chain compromise, physical tampering, side-channel, post-quantum exposure. | SBOM, tamper-evident enclosures, side-channel-resistant crypto, post-quantum readiness for firmware signing on long-life vehicles. |
Vehicle Type Approval Submission Package
The submission package for a vehicle type is the operational translation of paragraph 7.3. Its core artefacts are: a system description identifying the item under assessment; the TARA with Damage Scenarios, Threat Scenarios, Attack Paths, Attack Feasibility ratings, Risk Determination, and Risk Treatment; the mitigation evidence (design documents, code-signing pipeline, Secure Boot configuration, Secure Onboard Communication keys, Hardware Security Module integration, penetration test reports, fuzz-test summaries); the Annex 5 traceability matrix; and the post-production monitoring plan covering vulnerability triage, incident response, and lessons-learned feedback. A typical first submission for a single vehicle type runs to 800–2,000 pages of evidence; the value of process automation is mostly in keeping that pile coherent and current.
Roles: OEM, Type Approval Authority, Technical Service
R155 splits authority across three institutional roles. The type-approval authority is the regulator that issues the certificate — examples include KBA (Germany), UTAC (France), RDW (Netherlands), and VCA (United Kingdom). These bodies are named here as standards-body references, not as customers. The technical service is the assessor delegated by the authority to perform the audit and the evaluation; in many jurisdictions the same organisation that runs the audit is not the one that issues the certificate. The manufacturer owns the evidence and the lifecycle obligations. For cross-border programmes, manufacturers typically pick one lead authority and rely on UNECE mutual recognition; that choice has cost, schedule, and language implications and is best made early.
Common Reasons Approvals Are Denied or Delayed
Public regulator data on rejection rates is sparse, and specific OEM withdrawals attributed to R155 (some have been widely reported in trade press) should be referenced cautiously. The recurring patterns visible from public audit guidance and from practitioner conversations are: incomplete Annex 5 traceability, especially for category 7 residual threats; weak supplier-capability evidence under Clause 7; missing post-production monitoring procedures or only paper procedures with no field telemetry; under-specified Secure Update flows that conflate UNECE R155 and UNECE R156 evidence; and freshness or key-management gaps on Secure Onboard Communication that auditors flag as Annex 5 communication-channel deficiencies.
Regional Alignment in 2025–2026
R155 is a UNECE regulation, but the practical compliance picture is regional. The European Union enforces R155 in full under EU 2019/2144. The United Kingdom maintains mirror-alignment via the GB type-approval scheme, with the Department for Transport and the VCA acting as the operating counterparts; manufacturers should verify the latest UK divergence position with the VCA before submitting. Japan applies R155 directly through its 1958 Agreement membership, with MLIT issuing supporting circulars. South Korea's domestic regime under MOLIT took effect for new vehicle types in 2024 with phased rollout to the in-service fleet over the following years, per the gazetted Motor Vehicle Management Act amendment. Manufacturers should verify exact effective dates against MOLIT’s current announcements. China runs a parallel national rule, GB 44495:2024, published by SAC and MIIT — effective for new vehicle types from January 2026 and for all vehicles from January 2028. The standards differ in detail, but the overall direction of travel is convergent.
R155 ↔ R156 ↔ R157 Relationship
R155 does not stand alone. UNECE R156 governs the Software Update Management System and the per-software-update approval; for a connected vehicle, R155 and R156 are paired prerequisites. UN R157, which approves Automated Lane Keeping Systems, in turn requires both R155 and R156 evidence. Manufacturers building toward L3 autonomy should treat the three as a single regulatory bundle and avoid standing up parallel teams that re-build the same evidence. The ISO/SAE 21434 vs UNECE R155 comparison walks the technical-vs-regulatory split in detail.
A 12–18 Month Roadmap for the First Type Approval
The schedule below is a planning baseline drawn from the regulation's documentation expectations, ISO/PAS 5112:2022 audit guidance, and observed industry timing. Programmes that start later than month 0 against a 1 July 2026 launch should expect compressed surveillance windows and additional corrective-action cycles.
- Months 0–3 — Gap analysis. Map the existing process against ISO/SAE 21434 Clauses 5–15 and against R155 paragraphs 7.2 and 7.3. Stand up a gap register, a CSMS scope statement, and a Cybersecurity Plan template. The output is a defensible understanding of what is missing before any audit conversation begins.
- Months 3–6 — CSMS build. Implement the CSMS itself: governance, RFQ cybersecurity content, supplier capability assessment, Cybersecurity Interface Agreement template, vulnerability management, incident response, and post-production monitoring procedures. A useful internal target is to dry-run a full TARA on a pilot ECU during this window.
- Months 6–9 — CSMS audit. Submit the CSMS application, complete the documentation review, host the on-site audit, and process at least one round of corrective actions. Receive the Certificate of Compliance.
- Months 9–15 — Vehicle-type evidence. Run TARA per item, build Annex 5 traceability across all 7 categories, generate Cybersecurity Case evidence, and run verification. This is where manual versus automated TARA cycle-time differences become decisive.
- Months 15–18 — Type approval submission. Compile the vehicle-type submission package, engage the technical service for assessment, and lock the configuration baseline. Plan for an extension cycle: most first-time submissions return at least one clarification.
Parallel preparation for surveillance audits (annual) and for changes triggered by new vehicle variants is what turns a one-off approval into a sustainable compliance posture. The ISO/SAE 21434 Work Products checklist and the ISO/SAE 21434 pillar guide are the two artefacts most cited inside Agnile's CSMS readiness reviews.
Where Agnile Fits
Agnile's Automotive Cybersecurity team supports global OEMs and Tier-1 suppliers across the full R155 lifecycle — CSMS readiness reviews, Threat Analysis and Risk Assessment, Cybersecurity Interface Agreement drafting, technical evidence (Secure Boot, Hardware Security Module integration, Secure Onboard Communication), and audit support. KAVACH, Agnile's AI-native Cybersecurity Management System platform, automates Annex 5 traceability and produces the 42 ISO/SAE 21434 Work Products as structured for audit review evidence. For a deeper technical-vs-regulatory orientation, see the Threat Analysis and Risk Assessment primer.
Frequently Asked Questions
When did UNECE R155 become mandatory?
1 July 2022 for new vehicle types and 1 July 2024 for all vehicles produced in UNECE contracting parties (Categories M, N, O), per the transitional clause of UNECE R155.
How long is a CSMS certificate valid?
Up to 3 years, subject to ongoing surveillance audits and renewal. Any change to the CSMS scope or to the vehicle type's cybersecurity-relevant architecture can trigger an early re-assessment.
How many threat categories does Annex 5 define?
Seven high-level categories — back-end servers, communication channels, update procedures, unintended human actions, external connectivity, data and code, and an open “other” bucket — with a baseline commonly cited as 69 vulnerability and attack sub-entries that every Threat Analysis and Risk Assessment must consider.
Does R155 apply outside Europe?
Yes. UNECE R155 applies in all UNECE 1958 Agreement contracting parties that have adopted the regulation, including Japan, South Korea, the United Kingdom, and most EU and EEA member states. China runs a parallel national rule (GB 44495:2024) on a similar timeline.
Is ISO/SAE 21434 the same as R155?
No. ISO/SAE 21434 is the engineering standard most commonly used as the technical basis to demonstrate the Cybersecurity Management System required by R155, but R155 is a type-approval regulation and ISO/SAE 21434 is not. Conformance to ISO/SAE 21434 is a prerequisite for R155, not a substitute.
What about motorcycles?
Category L vehicles (motorcycles, mopeds, quadricycles) fall under R155 from 1 July 2029, per the regulation's transitional text. Indian two-wheeler OEMs targeting EU type approval should plan against that date.
Can ISO/SAE 21434 certification alone get R155 approval?
No. ISO/SAE 21434 evidences process maturity at the organisation level. R155 type approval still requires per-vehicle-type assessment, Annex 5 traceability, and post-production monitoring evidence on top of the CSMS Certificate of Compliance.
Want to Review This on a Real Vehicle Architecture?
KAVACH and Agnile's cybersecurity engineering team help teams connect architecture, assets, threats, attack paths, controls, and traceable cybersecurity evidence.