Software Update Process (End-to-End)
Under UNECE R156, each software update must follow a controlled, documented, and traceable process from planning to post-deployment validation. This page outlines a practical, compliant flow that aligns with ISO 24089 and the cybersecurity expectations of R155.
1) Plan
- Scope & objectives: affected ECUs/software items, functions, markets, VIN cohorts.
- Risk review: safety (ISO 26262), cybersecurity (R155/ISO 21434), EMC (R10), legal/privacy.
- Eligibility & dependencies: required versions, power/charging, connectivity, inter-ECU order.
- Rollback criteria: technical triggers and business thresholds to abort or revert.
- Communications plan: dealers/customers/regulators; instructions and timing windows.
2) Package
- Build artifacts: binaries, metadata, SBOM, release notes, known issues.
- Sign packages: apply approved signing policy; record hashes, versions, and signer IDs.
- Provenance: capture source/commit, tool versions, pipeline run IDs (reproducibility where feasible).
- Anti-rollback: set monotonic versioning/counters; encode prerequisites.
3) Approve
- Gate reviews: security, safety, compliance, localization/market checks.
- Segregation of duties: distinct author, reviewer, approver; dual-control for keys.
- Freeze dossier: lock campaign package (artifacts, eligibility rules, rollout plan).
4) Deliver
Delivery may be OTA or via service tools, but must enforce the same chain of trust.
- Eligibility checks: VIN/ECU targeting, dependencies, battery/network conditions.
- Secure transport: authenticated channels; integrity verification at rest and in transit.
- Staged rollout: canary cohorts → phased expansion; pause on threshold breaches.
5) Install
- Verification: signature and integrity verification on-vehicle; version checks, anti-rollback.
- Transactional update: fail-safe/atomic install patterns; power loss and recovery strategy.
- Audit trail: time-stamped logs; store minimal but sufficient evidence for auditability.
6) Validate (Post-Update)
- Acceptance tests: functional/safety smoke tests, DTC scans, health metrics.
- Telemetry: success/fail/partial, retry rates, error codes; integrity-protected logs.
- Issue handling: link defects/incidents to PSIRT (R155) and corrective follow-ups.
7) Record & Trace
Maintain end-to-end traceability and records for each campaign and VIN:
- Change ⇄ build ⇄ package/signature ⇄ campaign ⇄ VIN/ECU outcome ⇄ post-update validation.
- Timestamps, approvers, hashes, toolchain versions, eligibility decisions, rollback/abort logs.
- Retention according to regulatory and corporate policy; protect against tampering.
8) Rollback / Abort
- Triggers: predefined failure rates, health KPI breaches, critical incidents.
- Mechanisms: known-good images, dual bank/slot strategy, signed rollback packages.
- Comms & evidence: notify impacted parties; capture rationale and timestamps.
9) Improve
- Metrics: success/abort rates, MTTR, verification failures, pre-vs-post defect detection.
- Lessons learned: feed into SUMS/CSMS, update risk criteria, adjust test depth (e.g., fuzzing).
- Training: refresh role-based training and playbooks based on outcomes.
Cross-Cutting Requirements
Security & Compliance
- Chain of trust (signing, verification, anti-rollback, eligibility) — see Integrity & Authenticity.
- Alignment with R155 risk treatment and incident handling (PSIRT linkage).
- Safety impact coordination with ISO 26262; EMC checks (R10) where applicable.
- Privacy/data minimization for telemetry and records; retention & lawful basis.
Operations & Suppliers
- Dealer tooling hardening; authenticated access and audit logs.
- Supplier coordination: shared eligibility rules, signing specs, SBOM updates, fixes SLAs.
- Campaign governance: approvals, pause/resume controls, roll-forward plan after rollback.
Typical Outputs / Evidence
- Campaign dossier: scope, risk reviews, eligibility, dependencies, rollout plan, comms templates.
- Signed package set: binaries, metadata, SBOM, hashes, signature records.
- Gate approvals & segregation records; toolchain inventory and approvals.
- Deployment logs: VIN/ECU outcomes, retries, error codes; post-update validation results.
- Rollback/abort records; lessons-learned and CAPA items; updated training logs.
Disclaimer: This page summarizes the update process expectations under UNECE R156.
For authoritative requirements, consult the regulation text and your approval authority’s guidance.