Skip to main content

Automotive Cybersecurity Engineering, from Architecture to Evidence.

KAVACH Cybersecurity

KAVACH is Agnile’s AI-native ISO/SAE 21434 workspace for automotive cybersecurity engineering. It helps teams model vehicle architectures, identify cybersecurity assets, develop damage and threat scenarios, generate attack paths, map controls, and prepare traceable evidence with engineer-in-the-loop review. KAVACH supports ISO/SAE 21434 workflows beyond TARA while keeping engineers responsible for review, approval, and final evidence.

Lifecycle
Evidence Workflows
33K+
Curated Reference Corpus
500+
Automotive Threat Scenarios
§5–§15
ISO/SAE 21434 Coverage

KAVACH does not replace engineering judgment. It structures and accelerates cybersecurity analysis while keeping engineers responsible for review, approval, and final evidence.

THE PROBLEM

TARA Is Still Too Disconnected from the Architecture.

In many programmes, cybersecurity analysis is performed across spreadsheets, documents, workshops, and disconnected evidence packs. Architecture changes are difficult to trace, threat coverage varies by analyst, and evidence often has to be reconstructed near review time.

KAVACH is built to make the cybersecurity workflow architecture-aware, traceable, reviewable, and easier to govern.

THE CHALLENGE

Where Manual TARA Hits Its Limits.

A modern vehicle carries 100+ ECUs, millions of lines of code, and dozens of network interfaces. Spreadsheet-based Threat Analysis can't keep pace with software-defined architectures — and UNECE R155 deadlines aren't waiting.

TARA cycles measured in weeks, not days

Threat enumeration, asset mapping, and risk scoring are still done by hand for most programs. The work is rigorous; the workflow doesn’t scale across platforms.

Lifecycle Evidence, Manual Traceability

ISO/SAE 21434 work-product evidence spans governance, concept, development, validation, production, operations, and TARA. When evidence lives across Word, Excel, and disconnected tools, traceability gaps often surface late during customer, assessor, or regulatory review.

Generic Threat Modeling tools weren’t built for vehicles

IT-grade tools don’t model ECU architectures, CAN/CAN-FD buses, automotive STRIDE, or ISO/SAE 21434 Clause 15 specifics. The gap shows up in Threat Scenarios you have to write yourself.

WORKFLOW

The KAVACH Workflow.

01

Model the architecture

Capture ECUs, interfaces, data flows, trust boundaries, communication paths, and relevant cybersecurity context.

02

Identify assets

Derive cybersecurity-relevant assets and properties from the modeled system context.

03

Develop damage scenarios

Connect compromised properties to stakeholder harms such as safety, operational, privacy, financial, and regulatory impact.

04

Generate threat scenarios

Identify plausible threat scenarios using automotive threat knowledge and architecture-specific context.

05

Build attack paths

Generate and review multi-step attack paths and attack trees that explain how threats may become feasible.

06

Map controls and evidence

Link risks to cybersecurity goals, requirements, controls, verification, and traceable cybersecurity evidence.

FEATURES

How KAVACH Stays Grounded.

Architecture-Aware TARA

TARA starts from the system model, not from a blank spreadsheet.

Curated Automotive Knowledge

Threat knowledge is grounded in automotive-specific sources, interfaces, ECUs, protocols, and attack patterns.

Engineer-in-the-Loop AI

AI assists analysis, but engineers review, edit, approve, and own the final outputs.

Traceability by Design

Assets, damage scenarios, threats, attack paths, controls, and evidence remain connected.

Deployment Flexibility

KAVACH supports desktop usage with AI inference options such as on-prem or customer-dedicated cloud VPC, depending on customer requirements.

LIFECYCLE COVERAGE

Beyond TARA: Lifecycle Evidence
Across Clauses 5 to 15.

Most approaches focus heavily on Clause 15 TARA. KAVACH supports ISO/SAE 21434 lifecycle evidence workflows across Clauses 5 to 15 — from organizational governance and project activities through concept, development, production, operations, post-development, and TARA.

Work-product labels are used as traceability anchors. Final evidence remains subject to engineering review, project tailoring, and customer approval.

§5

Organizational Cybersecurity

Policy, governance, competence management, tool management, organizational audit

WP-05-01 – WP-05-05

§6

Project Management

Cybersecurity Plan, Cybersecurity Case, Cybersecurity Assessment, release for post-development

WP-06-01 – WP-06-04

§7

Distributed Activities

Supplier Cybersecurity Interface Agreement with responsibility allocation

WP-07-01

§8

Continual Activities

Vulnerability Monitoring, cybersecurity event evaluation, managed vulnerabilities

WP-08-01 – WP-08-06

§9

Concept Phase

Item Definition, Cybersecurity Goals with CAL, Cybersecurity Claims, Cybersecurity Concept

WP-09-01 – WP-09-07

§10-11

Development & Validation

Cybersecurity Specifications, verification reports, integration testing, validation report

WP-10-01 – WP-11-01

§12

Production

Production control plan with cybersecurity manufacturing requirements

WP-12-01

§13-14

Post-Development

Incident response plan, end of cybersecurity support, decommissioning procedures

WP-13-01, WP-14-01

§15

TARA Methodology

Full AI-powered TARA — Asset Identification through Risk Treatment with Attack Trees

WP-15-01 – WP-15-08

AI-POWERED TARA PIPELINE

Five Stages. One Generation Pass. ISO/SAE 21434 lifecycle coverage.

Each stage uses domain-specific AI grounding with citation provenance. Cross-stage analysis chains pass context from Assets through Risk Treatment without rebuilding it.

01

Assets

ECUs, data flows, interfaces with cybersecurity properties. SFOP impact ratings per Annex F.

02

Threats

AI maps curated automotive Threat Scenarios. STRIDE-classified with attack vectors.

03

Attack Paths

Attack Tree generation with feasibility per Annex G — time, expertise, knowledge, opportunity, equipment.

04

Risk Treatment

Risk Determination per Annex H. Controls mapped to each risk — encryption, authentication, monitoring.

05

Work-Product Evidence

Generate ISO/SAE 21434 work-product evidence — TARA Reports, Cybersecurity Case, Cybersecurity Goals — structured for audit review.

DEPLOYMENT

Two Deployment Models. Architecture Data Stays Inside Your Boundary.

KAVACH is a desktop platform with two options for AI inference. Pick the model that fits your security review and compliance posture.

OPTION 1

On-premise

Run KAVACH and the AI inference layer entirely on your own GPU infrastructure. No external network calls during TARA runs. Suited for teams with internal MLOps capacity and the strictest data-residency requirements.

  • · Customer-provided GPU servers
  • · Air-gappable; no inference data leaves the network
  • · Customer manages the model lifecycle

OPTION 2

Customer-dedicated cloud VPC

A single-tenant VPC in the EU, provisioned per customer. Agnile runs the inference plane; you keep the data plane. Suited for teams that want managed infrastructure without sharing tenancy.

  • · Single-tenant VPC, EU residency
  • · Customer-owned encryption keys (BYOK)
  • · Architecture models and project data stay within your tenant

In both models, architecture diagrams, threat scenarios, and Work Products remain inside the customer-defined boundary. The deployment option is a per-engagement decision, not a product SKU.

THE PLATFORM

See Every Screen. Every Work Product.

Watch KAVACH walk through the ISO/SAE 21434 TARA workflow — from item definition to evidence prepared for review.

KAVACHProject Pegasus EV / Body Control ECU
AI ready
KAVACH
Project Dashboard
§5Organizational CS Management
§6Project CS Management
§7Distributed CS Activities
§8Continual CS Activities
§9Concept Phase
§10Product Development
§11Cybersecurity Validation
§12–14Post-Development
Traceability Hub
Usage Dashboard
Licensed · Enterprise
v2.2.0 · 847 credits
Project Dashboard
Pegasus EV Platform / Body Control ECU (BCM-v3.2)
Assets
12
+3 This Week
Threats Identified
47
18 High Severity
Risks
23
6 Require Treatment
Compliance
98%
ISO/SAE 21434 Coverage
Work Product ProgressISO/SAE 21434 Clauses 5–15
§5 Organizational CS Management
100%
§6 Project CS Management
85%
§9 Concept Phase + TARA
72%
§10 Product Development
45%
§11 Cybersecurity Validation
20%
Recent Activity
Quick Actions
Connected — KAVACH AI inference (your deployment)ISO/SAE 21434:2021 compliance modeAutosaved · KAVACH v2.2.0
KAVACH — AI-native CSMS platform
0:00
3:53

THE SHIFT

From Spreadsheets That Age, to Evidence That Holds.

Manual TARA

Time to first TARA

4–8 weeks per system

Threat coverage

Bound to individual recall and spreadsheet limits

Risk Scoring

Reproducibility depends on who runs the analysis

Standard coverage

Clause 15 only (TARA work products)

Review readiness

Assembled at the end, often by hand

Repeatability across programs

Each program rebuilds artefacts from a blank template

KAVACH TARA

Time to first TARA

Hours

Threat coverage

AI retrieval over a curated automotive corpus

Risk Scoring

Structured per ISO/SAE 21434 Clause 15

Standard coverage

Clauses 5–15 (ISO/SAE 21434 lifecycle work products)

Review readiness

Built throughout, structured for audit review at any point

Repeatability across programs

Reusable templates, traceable lineage

Calculate your team’s TARA time savings

FAQ

Frequently asked questions.

KAVACH Cybersecurity

See KAVACH on Your Architecture.

Bring a representative system, ECU, or feature. We’ll walk through how KAVACH moves from architecture to cybersecurity evidence.