logo
stripes
logo
stripes

Records & Traceability

UNECE R156 requires complete, accurate, and tamper-resistant records for every software update. This page outlines how to establish end-to-end traceability from change request to in-field result, so you can demonstrate conformity during audits and incident investigations.

Purpose

  • Prove that updates were authorized, secure, eligible, and correctly installed.
  • Enable root-cause analysis, rollback decisions, and regulatory reporting.
  • Maintain per-VIN and per-software-item history across the lifecycle.

Traceability Model (End-to-End)

Maintain bidirectional links between these entities (stable IDs, timestamps, owners):

  • ChangeBuildPackage & SignatureCampaignEligibility DecisionVIN/ECU OutcomePost-Update Validation
  • Include toolchain versions, hashes, key IDs, and approver identities at each step.

Minimum Record Set (Per Campaign)

  • Authorization: approvals, roles, segregation evidence, policy references.
  • Artifacts: binaries, manifests, SBOM, hashes, signatures, signer IDs, timestamps.
  • Eligibility: rules used, VIN/ECU targeting snapshots, dependency checks, market constraints.
  • Rollout: cohorts, start/stop times, pause/resume/rollback triggers and decisions.
  • Validation: acceptance criteria, results, dashboards/screenshots with dates.
  • Comms: dealer bulletins, customer notices, authority filings (ids, dates, locales).

Minimum Record Set (Per VIN / ECU)

  • VIN, ECU ID, software item ID, prior version → new version.
  • Eligibility decision (rule version, dependency status) with timestamp.
  • Install outcome (success/fail/partial), error codes, retries, duration.
  • Signature/verification result, anti-rollback counter state.
  • Post-update health snapshot (key DTC summary, self-tests).
  • Rollback/abort flag and linkage to incident ticket if applicable.

Integrity, Authenticity & Non-Repudiation

  • Store hashes of artifacts and signature metadata (algorithm, key ID, time).
  • Protect logs at rest (append-only/WORM or signed logs); keep clock sync evidence.
  • Retain key lifecycle events (rotation, revocation) that affect verification.

Retention & Access Control

  • Define retention per market (vehicle lifetime + legal buffer); document purging rules.
  • Restrict access on a least-privilege basis; audit all access and exports.
  • Encrypt sensitive fields (e.g., device credentials) and separate PII from technical logs when possible.

Privacy & Data Minimization

  • Log only what is necessary to prove conformance and support investigations.
  • Maintain a data inventory and DPIA/records of processing where required.
  • Expose self-service export/delete pathways where mandated by local law.

Tooling & Process Controls

  • Evidence Index: single, navigable index of all artifacts with stable IDs and owners.
  • Versioned schemas: strict schemas for campaign/VIN records; validate on write.
  • Automation: auto-attach signatures, hashes, and tool versions from CI/CD.
  • Backups: immutable, geo-redundant backups; periodic restoration drills.

Reporting & Dashboards

  • Per-campaign KPIs: success rate, retry/abort rate, install duration, post-update incident rate.
  • Compliance widgets: % VINs updated, lagging cohorts, unresolved failures, rollback count.
  • Export packs: time-stamped snapshots for authorities (PDF/CSV with manifest and hashes).

Practical Do / Don’t

Do

  • Use immutable IDs for artifacts and link them everywhere.
  • Capture signer identity and tool versions at packaging time.
  • Snapshot eligibility rules used for each VIN decision.
  • Auto-attach health/DTC summaries to the per-VIN record.
  • Time-box exports for audits with a signed manifest of files and hashes.

Don’t

  • Rely on mutable spreadsheets as the system of record.
  • Store excessive PII in telemetry when technical IDs suffice.
  • Mix dev/test artifacts with production records.
  • Let key rotations break replay of historical verifications—retain old trust anchors.

Typical Outputs / Evidence

  • Evidence Index (IDs, owners, versions, applicability) and schema definitions.
  • Campaign archives (artifacts, manifests, hashes, signatures, approvals).
  • Eligibility snapshots and per-VIN/ECU outcomes with validation results.
  • Immutable logs/WORM snapshots; key lifecycle and clock-sync records.
  • Privacy/retention policy, access control audit logs, and export packs for authorities.
Disclaimer: This page summarizes records and traceability expectations under UNECE R156. For authoritative requirements, consult the regulation text and your approval authority’s guidance.