Overview

The Compliance pillar provides structured regulatory compliance assessment, evidence management, and audit reporting for the ThreatZ platform. It enables automotive cybersecurity teams to assess their posture against ISO/SAE 21434:2021 and UNECE R155/R156, track work product completion, detect compliance violations in real time, and generate audit-ready reports with gap analysis and recommendations.

Supported Standards

StandardScopeCoverage
ISO/SAE 21434:2021Cybersecurity engineering for road vehicles15 clauses, full requirement mapping
UNECE R155Cybersecurity and CSMSVehicle category-specific, Annex 5 threats
UNECE R156Software update managementReferenced framework
ISO 26262Functional safetyFramework standard reference
SAE J3061Cybersecurity guidebookFramework standard reference
China GB 44495Vehicle cybersecurity (Clauses 7–8)Professional+ tier

Compliance Structure

The compliance framework is organized hierarchically:

Standard
  → Clause (e.g., Clause 9: Concept Phase)
    → Section (e.g., 9.3: TARA)
      → Record (e.g., RQ-09-04: Identify damage scenarios)
        • Answer (met / not met)
        • Notes (evidence description)
        • Work Products (WP links)

Requirement ID formats:

  • RQ-XX-YY — Requirement (mandatory)
  • RC-XX-YY — Recommendation (advisory)
  • PM-XX-YY — Practice (guidance)

ISO 21434 Clause Coverage

ClauseTitleFocus Area
5Organizational Cybersecurity ManagementPolicy, competence, tools, audits
6Project-Dependent Cybersecurity ManagementCybersecurity plan, case, assessment
7Distributed Cybersecurity ActivitiesInterface agreements with suppliers
8Continual Cybersecurity ActivitiesMonitoring, vulnerability management
9Concept PhaseItem definition, TARA, goals, claims
10Product DevelopmentSpecifications, design, integration, verification
11Cybersecurity ValidationValidation report
12ProductionProduction control plan
13Operations & MaintenanceIncident response plan
14End of Cybersecurity SupportDecommissioning procedures
15TARA MethodsThreat analysis, risk assessment methodology

Work Product Tracking

44 work products mapped across all clauses:

ID RangeCategoryExamples
WP-05-01 to WP-05-05Organizational ManagementCybersecurity policy, competence management, audit reports
WP-06-01 to WP-06-04Project ManagementCybersecurity plan, cybersecurity case, assessment report
WP-07-01Distributed ActivitiesCybersecurity interface agreement
WP-08-01 to WP-08-06Continual ActivitiesSources, triggers, events, vulnerabilities, analysis, evidence
WP-09-01 to WP-09-07Concept PhaseItem definition, TARA, goals, claims, verification reports
WP-10-01 to WP-10-07Product DevelopmentSpecifications, requirements, documentation, verification
WP-11-01ValidationValidation report
WP-12-01ProductionProduction control plan
WP-13-01OperationsIncident response plan
WP-14-01End of SupportEnd of support procedures
WP-15-01 to WP-15-08TARADamage scenarios, assets, threats, impact, attack paths, feasibility, risk values, treatment

Compliance Scoring

Scores are calculated bottom-up:

  • Record level: Binary (met / not met)
  • Section level: Average of record answers within the section
  • Clause level: Average of section percentages within the clause
  • Overall level: Average across all clauses

Status Interpretation

ScoreStatusMeaning
90–100%ReadyFull compliance, audit-ready
70–89%Almost ReadyMinor gaps remaining
50–69%In ProgressSignificant work needed
< 50%Early StageMajor gaps across clauses

Compliance Statuses

  • COMPLIANT (80%+)
  • PARTIAL (50–79%)
  • NON_COMPLIANT (< 50%)
  • NOT_ASSESSED

Violation Detection

The platform continuously evaluates compliance requirements as project entities change. Violations are detected for:

  • Threat Modeling requirements (RQ-15-01 through RQ-15-15): Missing assets, damage scenarios, threat scenarios, attack paths
  • Risk Assessment requirements (RQ-09-04 through RQ-09-10): Incomplete risk calculations, missing feasibility ratings
  • Risk Treatment requirements (RQ-09-08 through RQ-09-10): Missing goals, claims, or control implementations

Each violation includes the failing requirement ID, the entity type and ID causing the violation (Asset, Damage Scenario, Threat, Attack Path, Risk, Goal, Claim), a descriptive message, and a fix suggestion. Violations are grouped by Compliance Model (Threat Modeling, Risk Assessment, Risk Treatment) for targeted review.

Report Generation

ISO 21434 Report

  • Overall compliance status (Compliant / Partial / Non-Compliant)
  • Overall coverage percentage
  • Clause-by-clause coverage breakdown
  • Test summary (total runs, penetration tests, fuzz tests, conformance tests)
  • Findings summary by severity (Critical, High, Medium, Low)
  • Gap analysis with severity and recommendations
  • Evidence package (artifact count, size, types)

UNECE R155 Report

  • All ISO 21434 report fields, plus:
  • Vehicle type information (category, manufacturer, model)
  • Category coverage by threat category
  • Threat coverage (addressed / partially addressed / not addressed)

Gap Types

TypeDescription
Missing TestNo test case covers this requirement
Insufficient CoverageTest coverage below threshold
Missing EvidenceNo evidence artifacts linked
Missing MitigationNo controls or goals address this risk
Failed TestTest execution failed for this requirement

Evidence Management

Evidence is collected and linked through multiple mechanisms:

  • Claim evidence media: Files attached directly to claims
  • Test artifacts: Penetration test reports, fuzz reports, scan reports, PCAP files, conformance reports, coverage reports
  • Compliance record notes: Free-text evidence descriptions per requirement
  • Work product deliverables: Documents and reports linked to work product IDs

Integration with Other Pillars

DirectionPillarData Flow
InboundTARAAssets, threats, risks, goals, claims, controls provide evidence for Clauses 9 and 15
InboundTestingTest results and coverage update compliance scores automatically
InboundSBOMVulnerability status and component inventory feed compliance posture
InboundDesignArchitecture documentation serves as evidence for system-level work products
InboundOperationsIncident response logs provide evidence for Clause 13 work products
OutboundAll pillarsCompliance violations flag gaps that need engineering action

Compliance Models

Three compliance models map requirements to specific engineering areas:

ModelRequirementsPurpose
Threat ModelingRQ-15-01 to RQ-15-15Validates threat analysis completeness
Risk AssessmentRQ-09-04 to RQ-09-10Validates risk scoring and feasibility
Risk TreatmentRQ-09-08 to RQ-09-10Validates mitigation completeness

These models enable targeted violation checking — when an asset is modified, only Threat Modeling requirements are re-evaluated; when a risk score changes, only Risk Assessment requirements are checked.