logo
stripes
logo
stripes

Software Update Process (End-to-End)

Under UNECE R156, each software update must follow a controlled, documented, and traceable process from planning to post-deployment validation. This page outlines a practical, compliant flow that aligns with ISO 24089 and the cybersecurity expectations of R155.

1) Plan

  • Scope & objectives: affected ECUs/software items, functions, markets, VIN cohorts.
  • Risk review: safety (ISO 26262), cybersecurity (R155/ISO 21434), EMC (R10), legal/privacy.
  • Eligibility & dependencies: required versions, power/charging, connectivity, inter-ECU order.
  • Rollback criteria: technical triggers and business thresholds to abort or revert.
  • Communications plan: dealers/customers/regulators; instructions and timing windows.

2) Package

  • Build artifacts: binaries, metadata, SBOM, release notes, known issues.
  • Sign packages: apply approved signing policy; record hashes, versions, and signer IDs.
  • Provenance: capture source/commit, tool versions, pipeline run IDs (reproducibility where feasible).
  • Anti-rollback: set monotonic versioning/counters; encode prerequisites.

3) Approve

  • Gate reviews: security, safety, compliance, localization/market checks.
  • Segregation of duties: distinct author, reviewer, approver; dual-control for keys.
  • Freeze dossier: lock campaign package (artifacts, eligibility rules, rollout plan).

4) Deliver

Delivery may be OTA or via service tools, but must enforce the same chain of trust.

  • Eligibility checks: VIN/ECU targeting, dependencies, battery/network conditions.
  • Secure transport: authenticated channels; integrity verification at rest and in transit.
  • Staged rollout: canary cohorts → phased expansion; pause on threshold breaches.

5) Install

  • Verification: signature and integrity verification on-vehicle; version checks, anti-rollback.
  • Transactional update: fail-safe/atomic install patterns; power loss and recovery strategy.
  • Audit trail: time-stamped logs; store minimal but sufficient evidence for auditability.

6) Validate (Post-Update)

  • Acceptance tests: functional/safety smoke tests, DTC scans, health metrics.
  • Telemetry: success/fail/partial, retry rates, error codes; integrity-protected logs.
  • Issue handling: link defects/incidents to PSIRT (R155) and corrective follow-ups.

7) Record & Trace

Maintain end-to-end traceability and records for each campaign and VIN:

  • Change ⇄ build ⇄ package/signature ⇄ campaign ⇄ VIN/ECU outcome ⇄ post-update validation.
  • Timestamps, approvers, hashes, toolchain versions, eligibility decisions, rollback/abort logs.
  • Retention according to regulatory and corporate policy; protect against tampering.

8) Rollback / Abort

  • Triggers: predefined failure rates, health KPI breaches, critical incidents.
  • Mechanisms: known-good images, dual bank/slot strategy, signed rollback packages.
  • Comms & evidence: notify impacted parties; capture rationale and timestamps.

9) Improve

  • Metrics: success/abort rates, MTTR, verification failures, pre-vs-post defect detection.
  • Lessons learned: feed into SUMS/CSMS, update risk criteria, adjust test depth (e.g., fuzzing).
  • Training: refresh role-based training and playbooks based on outcomes.

Cross-Cutting Requirements

Security & Compliance

  • Chain of trust (signing, verification, anti-rollback, eligibility) — see Integrity & Authenticity.
  • Alignment with R155 risk treatment and incident handling (PSIRT linkage).
  • Safety impact coordination with ISO 26262; EMC checks (R10) where applicable.
  • Privacy/data minimization for telemetry and records; retention & lawful basis.

Operations & Suppliers

  • Dealer tooling hardening; authenticated access and audit logs.
  • Supplier coordination: shared eligibility rules, signing specs, SBOM updates, fixes SLAs.
  • Campaign governance: approvals, pause/resume controls, roll-forward plan after rollback.

Typical Outputs / Evidence

  • Campaign dossier: scope, risk reviews, eligibility, dependencies, rollout plan, comms templates.
  • Signed package set: binaries, metadata, SBOM, hashes, signature records.
  • Gate approvals & segregation records; toolchain inventory and approvals.
  • Deployment logs: VIN/ECU outcomes, retries, error codes; post-update validation results.
  • Rollback/abort records; lessons-learned and CAPA items; updated training logs.
Disclaimer: This page summarizes the update process expectations under UNECE R156. For authoritative requirements, consult the regulation text and your approval authority’s guidance.