SDS Cyber-Physical Security


Cyber-physical security in Software-Defined Systems (SDS) focuses on protecting the bridge between software and the physical world. A compromise in vehicles, robots, depots, energy assets, or industrial systems can cause real, physical harm. Security must therefore be designed alongside safety, not bolted on later.

This page outlines core threat categories, trust boundaries, controls, and incident-response patterns shared across Software-Defined Vehicles (SDV), Robotics (SDR), Infrastructure (SDI), Energy (SDE), and Industrial Operations (SDIO).


Cyber-Physical Threat Categories

SDS assets face a mix of IT-like and OT-specific threats. The table below groups major threat types.

Threat Category Description Examples
Remote compromiseAttacks delivered over networks, often via the internetExploiting telematics, cloud APIs, depot controllers, VPN gateways
Local and proximity attacksAttacks requiring physical or RF proximityMalicious USB, Wi-Fi/Bluetooth exploits, local network access
Supply-chain tamperingCompromise of hardware, firmware, or software before deploymentBackdoored firmware, compromised third-party components, insecure images
Insider and misuseMalicious or careless actions by authorized personnelMisconfiguration, bypassed safety, intentional sabotage
Ransomware and disruptionAttacks that deny service or extort operatorsLocking depot controllers, plant HMIs, or orchestrators

Trust Boundaries in SDS

Effective cyber-physical security starts by identifying trust boundaries: where data, control, and responsibility cross between domains or actors.

Boundary Description Security Focus
External network to site or fleetInternet or carrier networks into depots, plants, or control roomsFirewalls, VPNs, API gateways, DDoS protections
IT to OTEnterprise systems into operational networksSegmentation, data diodes, strict access control and monitoring
Cloud or backend to assetsFleet management and OTA systems into vehicles, robots, or DERsMutual authentication, signed commands, rate limiting
Safety-critical to non-critical domainsBrake, steering, and protection systems vs infotainment or analyticsNetwork isolation, one-way flows, strict message validation
Engineer / operator accessHuman access to consoles, tools, and devicesStrong identity, least privilege, audit logging

Security Objectives for Cyber-Physical Systems

Cyber-physical security extends classic confidentiality, integrity, and availability (CIA) to include safety, control, and resilience objectives.

Objective Description Examples
SafetyPrevent harm to people, environment, and equipmentSafe states on fault, independent safety channels, physical interlocks
IntegrityPrevent unauthorized changes to code, data, and commandsSigned firmware, authenticated control messages, checksum checks
AvailabilityMaintain acceptable operation under attack or failureRedundant links, backups, graceful degradation strategies
ConfidentialityProtect sensitive operational and personal dataEncrypted telemetry, data minimization, access controls
AccountabilityEnsure actions can be traced to entities and eventsAudit logs, signed changes, incident timelines

Key Controls and Building Blocks

SDS platforms use a layered set of controls to protect devices, networks, software, and operations.

Control Area Control Purpose
Device and firmwareSecure boot and hardware root of trustEnsure only signed, trusted code runs on devices
Device and firmwareFirmware signing and verificationProtect against tampered or unauthorized images
NetworkSegmentation and firewallsLimit lateral movement and isolate safety-critical domains
NetworkEncrypted channels with strong authenticationProtect integrity and confidentiality of commands and data
Access controlLeast-privilege roles and just-in-time accessRestrict capabilities and reduce attack surface from insiders
MonitoringSecurity and anomaly detectionDetect unusual patterns on CAN, TSN, or OT networks
Configuration and OTAChange control, approvals, and rollbackPrevent unsafe or untested changes from reaching the field

Safety and Security Interaction

Safety and security must be designed together. Security controls should reinforce, not obstruct, safe behavior.

Aspect Security Concern Safety Interaction
Safety functionsSpoofed or blocked safety messagesIndependent safety channels, authentication, redundant paths
Fail-safe statesAdversary triggering safe state at wrong timeDefine safe but predictable degradation modes
Diagnostics and maintenanceUse of privileged modes to bypass protectionsControlled access, session recording, time-limited privileges
Performance optimizationAI or optimization engines overriding safety marginsHard safety limits enforced below optimization layers

Domain-Specific Considerations

The same security patterns apply across domains but with different emphasis.

Domain Primary Concerns Examples
Software-Defined Vehicles (SDV)Vehicle takeover, remote control, privacyTelematics hardening, in-vehicle network IDS, secure OTA
Software-Defined Robotics (SDR)Worker safety, robot path manipulationSafety-rated controls, access separation between programming and operation
Software-Defined Infrastructure (SDI)Depot disruption, charge control tamperingSecure chargers, site segmentation, protection of depot schedulers
Software-Defined Energy (SDE)Grid stability, energy theft, protection misoperationSecure inverter controls, protection relay hardening, secure DER aggregation
Software-Defined Industrial Ops (SDIO)Production outages, unsafe machine operationOT network security, secure PLC programming, layered safety systems

Incident Response and Resilience

SDS security planning must assume that incidents will occur. Response and recovery plans determine how much damage is sustained and how quickly operations can resume.

Element Role Examples
DetectionNotice anomalies quicklyAlarms on unusual traffic, repeated faults, configuration drift
ContainmentLimit the spread of an incidentIsolate networks, disable remote access, lock down OTA
Eradication and recoveryRemove malicious artifacts and restore operationRe-image devices from trusted sources, roll back configurations
Post-incident learningPrevent recurrence and strengthen controlsRoot-cause analysis, control updates, training and playbook refinement

Design Questions for Cyber-Physical Security

Security design for SDS should start with a small set of high-value questions that shape architecture and operations.

Question Design Impact
What is the worst realistic physical outcome of a cyber incident?Defines safety requirements, segmentation depth, and response plans
Which components must be trusted under all circumstances?Identifies roots of trust, safety-critical devices, and hardening priorities
How can you operate safely in a degraded or partially compromised state?Drives fallback modes, isolation strategies, and manual overrides
What evidence will you need after an incident?Shapes logging, traceability, and forensics capabilities
How will you maintain and test your security posture over time?Requires regular assessments, exercises, and validation as systems evolve

Cyber-physical security is a continuous practice, not a one-time design step. In SDS, it must align with OTA, central compute, data pipelines, and safety engineering to keep vehicles, robots, depots, energy systems, and industrial sites operating safely and predictably under real-world conditions.