ISO 24089:2023
(Main)Road vehicles - Software update engineering
Road vehicles - Software update engineering
This document specifies requirements and recommendations for software update engineering for road vehicles on both the organizational and the project level. This document is applicable to road vehicles whose software can be updated. The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs, infrastructure, and the assembly and deployment of software update packages after the initial development. This document is applicable to organizations involved in software update engineering for road vehicles. Such organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners. This document establishes a common understanding for communicating and managing activities and responsibilities among organizations and related parties. The development of software for vehicle functions, except for software update engineering, is outside the scope of this document. Finally, this document does not prescribe specific technologies or solutions for software update engineering.
Véhicules routiers — Ingénierie de mise à jour du logiciel
General Information
- Status
- Published
- Publication Date
- 07-Feb-2023
- Technical Committee
- ISO/TC 22/SC 32 - Electrical and electronic components and general system aspects
- Drafting Committee
- ISO/TC 22/SC 32/WG 12 - Software update
- Current Stage
- 6060 - International Standard published
- Start Date
- 08-Feb-2023
- Due Date
- 28-Dec-2022
- Completion Date
- 08-Feb-2023
Relations
- Effective Date
- 29-Jul-2023
Overview
ISO 24089:2023 - Road vehicles - Software update engineering defines requirements and recommendations for engineering processes that govern software updates for road vehicles. It applies across the supply chain - vehicle manufacturers, Tier‑1/ Tier‑2 suppliers, service providers and infrastructure operators - and covers organizational and project levels, vehicle and system functions, ECUs, infrastructure, software update packages and update campaigns. The standard establishes a common vocabulary and process framework to manage safety, cybersecurity and quality when software in vehicles is updated. It does not prescribe specific technologies or tools.
Key topics and technical requirements
ISO 24089 structures software update engineering into clear domains and work products. Important technical topics include:
- Organizational governance and continuous improvement
- Establishing policies, roles, auditing and information sharing for update engineering.
- Project-level management and tailoring
- Project planning, tailoring of processes, and rationale for decisions for each update project.
- Interoperability and integrity
- Ensuring updates are compatible with vehicle systems and ECUs; maintaining data integrity during assembly and deployment.
- Risk management
- Identifying and managing safety and cybersecurity risks related to update operations.
- Vehicle and infrastructure functions
- Defining and using vehicle and infrastructure capabilities to support update campaigns (e.g., communication, configuration reporting).
- Software update package assembly
- Identification of targets and contents, package assembly, verification, validation and release approval.
- Software update campaign lifecycle
- Preparation, execution (including OTA or workshop methods) and completion, with traceability and campaign communication.
- Configuration management and communication
- Maintaining individual vehicle configuration information and communicating campaign details to relevant parties.
These topics are reflected in the standard’s clauses on objectives, requirements/recommendations and work products for organizational, project, infrastructure, vehicle, package and campaign levels.
Practical applications - who uses this standard
ISO 24089 is intended for:
- OEMs and vehicle system integrators that plan and deliver software updates.
- Suppliers and ECU vendors that produce updatable software components.
- Service providers and infrastructure operators managing update delivery and campaign orchestration.
- Safety and cybersecurity teams ensuring updates don’t introduce hazards or vulnerabilities.
Benefits include improved update quality, consistent cross‑company communication, clearer roles and responsibilities, and stronger alignment of safety and cybersecurity in update operations.
Related standards
- ISO 26262 (Functional safety) - relevant for software safety aspects.
- ISO/SAE 21434 (Road vehicles - Cybersecurity engineering) - relevant for managing cybersecurity risks during updates.
Keywords: ISO 24089, software update engineering, road vehicles, OTA updates, vehicle cybersecurity, software update package, software update campaign, ECUs, vehicle systems.
ISO 24089:2023 - Road vehicles — Software update engineering Released:10/17/2022
ISO 24089:2023 - Road vehicles — Software update engineering Released:2/8/2023
REDLINE ISO 24089:2023 - Road vehicles — Software update engineering Released:10/17/2022
Frequently Asked Questions
ISO 24089:2023 is a standard published by the International Organization for Standardization (ISO). Its full title is "Road vehicles - Software update engineering". This standard covers: This document specifies requirements and recommendations for software update engineering for road vehicles on both the organizational and the project level. This document is applicable to road vehicles whose software can be updated. The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs, infrastructure, and the assembly and deployment of software update packages after the initial development. This document is applicable to organizations involved in software update engineering for road vehicles. Such organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners. This document establishes a common understanding for communicating and managing activities and responsibilities among organizations and related parties. The development of software for vehicle functions, except for software update engineering, is outside the scope of this document. Finally, this document does not prescribe specific technologies or solutions for software update engineering.
This document specifies requirements and recommendations for software update engineering for road vehicles on both the organizational and the project level. This document is applicable to road vehicles whose software can be updated. The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs, infrastructure, and the assembly and deployment of software update packages after the initial development. This document is applicable to organizations involved in software update engineering for road vehicles. Such organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners. This document establishes a common understanding for communicating and managing activities and responsibilities among organizations and related parties. The development of software for vehicle functions, except for software update engineering, is outside the scope of this document. Finally, this document does not prescribe specific technologies or solutions for software update engineering.
ISO 24089:2023 is classified under the following ICS (International Classification for Standards) categories: 43.040.15 - Car informatics. On board computer systems. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO 24089:2023 has the following relationships with other standards: It is inter standard links to ISO 24089:2023/Amd 1:2024. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
You can purchase ISO 24089:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
FINAL
INTERNATIONAL ISO/FDIS
DRAFT
STANDARD 24089
ISO/TC 22/SC 32
Road vehicles — Software update
Secretariat: JISC
engineering
Voting begins on:
2022-10-31
Véhicules routiers — Ingénierie de mise à jour du logiciel
Voting terminates on:
2022-12-26
RECIPIENTS OF THIS DRAFT ARE INVITED TO
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPOR TING
DOCUMENTATION.
IN ADDITION TO THEIR EVALUATION AS
Reference number
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO-
ISO/FDIS 24089:2022(E)
LOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN-
DARDS TO WHICH REFERENCE MAY BE MADE IN
NATIONAL REGULATIONS. © ISO 2022
ISO/FDIS 24089:2022(E)
FINAL
INTERNATIONAL ISO/FDIS
DRAFT
STANDARD 24089
ISO/TC 22/SC 32
Road vehicles — Software update
Secretariat: JISC
engineering
Voting begins on:
Véhicules routiers — Ingénierie de mise à jour du logiciel
Voting terminates on:
© ISO 2022
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
RECIPIENTS OF THIS DRAFT ARE INVITED TO
ISO copyright office
SUBMIT, WITH THEIR COMMENTS, NOTIFICATION
OF ANY RELEVANT PATENT RIGHTS OF WHICH
CP 401 • Ch. de Blandonnet 8
THEY ARE AWARE AND TO PROVIDE SUPPOR TING
CH-1214 Vernier, Geneva
DOCUMENTATION.
Phone: +41 22 749 01 11
IN ADDITION TO THEIR EVALUATION AS
Reference number
Email: copyright@iso.org
BEING ACCEPTABLE FOR INDUSTRIAL, TECHNO
ISO/FDIS 24089:2022(E)
Website: www.iso.org
LOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON
Published in Switzerland
OCCASION HAVE TO BE CONSIDERED IN THE
LIGHT OF THEIR POTENTIAL TO BECOME STAN
DARDS TO WHICH REFERENCE MAY BE MADE IN
ii
NATIONAL REGULATIONS. © ISO 2022
ISO/FDIS 24089:2022(E)
Contents Page
Foreword .v
Introduction . vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
3.1 General terminology . 1
3.2 Terms related to the software update operation. 5
4 Organizational level requirements . 5
4 .1 Obje c t i ve s . 5
4.2 General . 5
4.3 Requirements and recommendations . 6
4.3.1 Governance . 6
4 . 3 . 2 C ont i nuou s i mpr ovement . 6
4.3.3 Information sharing . 6
4.3.4 Supporting processes . 7
4.3.5 Auditing . 8
4.4 Work products . 8
5 Project level requirements .8
5 .1 Obje c t i ve s . 8
5.2 General . 8
5.3 Requirements and recommendations . 9
5.3.1 Project management . 9
5.3.2 Tailoring and rationale . 9
5.3.3 Interoperability . 9
5.3.4 Integrity . 10
5.4 Work products . 10
6 Infrastructure level requirements .10
6 .1 Obje c t i ve s . 10
6.2 General . 10
6.3 Requirements and recommendations . 11
6.3.1 Managing risk . . 11
6.3.2 Managing vehicle configuration information . 11
6.3.3 Communicating software update campaign information . 11
6.3.4 Processing software update packages.12
6.4 Work products .12
7 Vehicle and vehicle systems level requirements .13
7.1 Obje c t i ve s . 13
7.2 General .13
7.3 Requirements and recommendations . 13
7.3.1 Managing risks . 13
7.3.2 Managing vehicle configuration information . 14
7.3.3 Communicating software update campaign information . 14
7.3.4 Processing software update packages. 14
7.4 Work products . 16
8 Software update package requirements .16
8 .1 Obje c t i ve s . 16
8.2 General . 17
8.3 Requirements and recommendations . 17
8.3.1 Identification of targets and the contents for the software update package . 17
8.3.2 Assembly of the software update package . 18
8.3.3 Verification and validation of the software update package . 18
iii
ISO/FDIS 24089:2022(E)
8.3.4 Approval for release of the software update package . 18
8.4 Work products . 19
9 Software update campaign requirements .19
9.1 Obje c t i ve s . 19
9.2 General . 19
9.3 Requirements and recommendations . 19
9.3.1 Software update campaign preparation . 19
9.3.2 Software update campaign execution . 21
9.3.3 Software update campaign completion . 23
9.4 Work products . 23
Bibliography .24
iv
ISO/FDIS 24089:2022(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and nongovernmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 22, Road Vehicles, Subcommittee SC 32,
Electrical and electronic components and general system aspects.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
v
ISO/FDIS 24089:2022(E)
Introduction
Electronic control units and software of increasing complexity have become essential to the operation
of road vehicles in recent years. This software is often updated to increase functionality and maintain
the safety and cybersecurity of road vehicles.
Today, in-vehicle software is updated in a workshop by skilled persons or automatically over-the-air by
the vehicle user. With the increased frequency of software update campaigns, it is important to have
individual vehicle configuration information. Therefore, the establishment and application of software
update engineering is important to ensure software quality, cybersecurity, and safety.
Software update engineering activities occur throughout the life cycle of vehicles.
This document provides vocabulary, objectives, requirements, and guidelines related to software
update engineering as a foundation for common understanding throughout the supply chain. By
applying requirements and recommendations in this document, the following benefits can be achieved
for software update engineering:
— safety and cybersecurity are addressed in software update operations in road vehicles;
— establishment of processes, including goal setting, planning, auditing, process monitoring, process
measurement, and process improvement;
— shared awareness of safety and cybersecurity among related parties.
Figure 1 shows the overview of this document.
Figure 1 — Overview of this document
In this document, clauses are structured using the following approach:
— each process is defined and implemented before it is executed;
— each process is established, documented and maintained.
vi
ISO/FDIS 24089:2022(E)
This document describes the following activities:
— implementation of organizational level processes for software update engineering;
— implementation of software update project level processes for each software update project;
— definitions of functions for the vehicle and infrastructure to support the activities and processes of
this document;
— assembly of software update packages using functions in the infrastructure;
— preparation and execution of software update campaigns using functions in the vehicle and
infrastructure.
vii
FINAL DRAFT INTERNATIONAL STANDARD ISO/FDIS 24089:2022(E)
Road vehicles — Software update engineering
1 Scope
This document specifies requirements and recommendations for software update engineering for road
vehicles on both the organizational and the project level.
This document is applicable to road vehicles whose software can be updated.
The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs,
infrastructure, and the assembly and deployment of software update packages after the initial
development.
This document is applicable to organizations involved in software update engineering for road vehicles.
Such organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners.
This document establishes a common understanding for communicating and managing activities and
responsibilities among organizations and related parties.
The development of software for vehicle functions, except for software update engineering, is outside
the scope of this document.
Finally, this document does not prescribe specific technologies or solutions for software update
engineering.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 262626, Road vehicles — Functional safety — Part 6: Product development at the software level
ISO 262628, Road vehicles — Functional safety — Part 8: Supporting processes
ISO/SAE 21434, Road vehicles — Cybersecurity engineering
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1 General terminology
3.1.1
compatibility
capability of software (3.1.15) to be executable on vehicle systems (3.1.25) without conflicts
Note 1 to entry: Compatibility can be checked by vehicle configuration information (3.1.24).
ISO/FDIS 24089:2022(E)
3.1.2
condition
criteria required for a software update operation (3.1.19) to be completed successfully
Note 1 to entry: Conditions can include compatibility (3.1.1), safe vehicle state (3.1.13), in-vehicle resources (3.1.11),
and external resources.
EXAMPLE The presence of a skilled person (3.1.14) during a software update operation.
3.1.3
corrective action
action to eliminate or contain a problem or failure
3.1.4
cybersecurity
road vehicle cybersecurity
context in which assets are sufficiently protected against threat scenarios to vehicle systems (3.1.25) of
road vehicles and infrastructure (3.1.10) required to support software update engineering (3.1.18)
Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle
cybersecurity.
[SOURCE: ISO/SAE 21434:2021, 3.1.9, modified — “to items of road vehicles, their functions and their
electrical or electronic components” has been replaced by “to vehicle systems of road vehicles and
infrastructure required to support software update engineering” and the Note 1 to entry has been
modified.]
3.1.5
cybersecurity risk
effect of uncertainty on cybersecurity (3.1.4) expressed in terms of attack feasibility and impact
[SOURCE: ISO/SAE 21434:2021, 3.1.29]
3.1.6
dependency
effect of software (3.1.15) for one vehicle system (3.1.25) on the same or other vehicle systems (3.1.25)
Note 1 to entry: A dependency can generate a condition (3.1.2) in the metadata of a software update package
(3.1.20).
EXAMPLE A communication interface between two electronic control units (ECUs) (3.1.7).
3.1.7
ECU
electronic control unit
embedded device in a vehicle whose software (3.1.15) can be updated
3.1.8
functional safety
absence of unreasonable risk due to hazards caused by malfunctioning behaviour of vehicle systems
(3.1.25)
[SOURCE: ISO 26262-1:2018, 3.67, modified — “E/E” was replaced by “vehicle”.]
3.1.9
functional safety risk
combination of the probability of occurrence of harm and the severity of that harm
[SOURCE: ISO 26262-1:2018, 3.128, modified — The term has been modified from “risk” to “functional
safety risk” for the scope of this document.]
ISO/FDIS 24089:2022(E)
3.1.10
infrastructure
processes and information systems managing any combination of software update operations (3.1.19),
software update campaigns (3.1.16), documentation, and vehicle configuration information (3.1.24),
including both digital and manual activities
Note 1 to entry: Infrastructure can include any combination of servers, tools, and manual activities used in the
software update operation.
3.1.11
in-vehicle resource
vehicle or electronic control unit (ECU) (3.1.7) available properties relevant for software update
engineering (3.1.18)
EXAMPLE Available or remaining computational power, network capacity, RAM capacity, storage capacity,
or battery capacity.
3.1.12
recipient
individual instance of a vehicle, vehicle system (3.1.25), or electronic control unit (ECU) (3.1.7) that
receives a software update package (3.1.20) during a software update campaign (3.1.16)
3.1.13
safe vehicle state
vehicle operating mode based on conditions (3.1.2) for performing software update operations (3.1.19)
without an unreasonable level of risk
Note 1 to entry: Safe vehicle state can be different depending on the conditions (3.1.2) required for the software
update package (3.1.20).
Note 2 to entry: Safe vehicle state can vary based on the software update operation step being performed.
EXAMPLE The motor is off, the parking brake is applied.
3.1.14
skilled person
individual with relevant technical education, training or experience to execute software update
operations (3.1.19)
Note 1 to entry: A skilled person can be a mechanic in a workshop.
Note 2 to entry: A skilled person can be authorized or certified for their specialized training or be a skilled vehicle
user (3.1.26).
[SOURCE: ISO 10209:2022, 3.14.36, modified — The phrase “to enable them to perceive risks and
avoid hazards occurring during use of a product” has been replaced by “to execute software update
operations”.]
3.1.15
software
computer programs and associated data intended for installation (3.2.2) on vehicles, vehicle systems
(3.1.25), or electronic control units (ECUs) (3.1.7), that may be dynamically written or modified during
execution
[SOURCE: NIST SP 800-53, modified — The phrase “intended for installation on vehicles, vehicle
systems, or electronic control units (ECUs)” was added.]
3.1.16
software update campaign
sequence of identifying targets (3.1.23) and resolving recipients (3.1.12); distributing software update
packages (3.1.20); and monitoring and documenting results of software update operations (3.1.19)
ISO/FDIS 24089:2022(E)
3.1.17
software update distribution method
mechanism for delivery of a software update package (3.1.20) during a software update campaign
(3.1.16)
Note 1 to entry: The software update distribution method can be wired (e.g. tool, USB flash drive), wireless (e.g.
cellular or WiFi) or hardware replacement.
Note 2 to entry: Hardware replacement can be replacing an electronic control unit (ECU) (3.1.7) with the effect of
software (3.1.15) version replacement.
3.1.18
software update engineering
application of a systematic and managed approach to the processes of planning, development, and
deployment of software update packages (3.1.20)
[SOURCE: ISO/IEC/IEEE 24765:2017, 3.3810, modified — “disciplined, quantifiable” was replaced by
“and managed”, and “development, operation and maintenance of software” was replaced by “processes
of development, planning, and deployment of software update packages”.]
3.1.19
software update operation
steps involved in receipt (3.2.1), installation (3.2.2) and activation (3.2.3) of software update packages
(3.1.20) in a vehicle, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.20
software update package
set of software (3.1.15) and associated metadata that is intended to be deployed to one or more vehicles,
vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.21
software update project
set of software update engineering (3.1.18) activities for one or more targets (3.1.23)
Note 1 to entry: Activities can include developing or adapting the infrastructure (3.1.10), vehicle capabilities, or
processes described in this document.
Note 2 to entry: A software update project can encompass multiple software update campaigns (3.1.16).
3.1.22
tailor
to omit or perform an activity in a different manner compared to its description in this document
[SOURCE: ISO/SAE 21434:2021, 3.1.32]
3.1.23
target
one or more classes of vehicles, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
determined by vehicle configuration information (3.1.24)
3.1.24
vehicle configuration information
comprehensive accounting of hardware versions, software (3.1.15) versions and configuration
parameters in a vehicle
3.1.25
vehicle system
functional group of one or more electronic control units (ECUs) (3.1.7) and attached hardware
Note 1 to entry: Attached hardware can be, for example, a sensor, actuator or light, that is not an ECU.
EXAMPLE Braking system or infotainment system.
ISO/FDIS 24089:2022(E)
3.1.26
vehicle user
person operating, driving, owning or managing a vehicle
Note 1 to entry: A vehicle user can be a skilled person (3.1.14).
3.2 Terms related to the software update operation
3.2.1
receipt
step in the software update operation (3.1.19) when a tool, vehicle, vehicle system (3.1.25), or electronic
control unit (ECU) (3.1.7) receives a software update package (3.1.20)
EXAMPLE 1 Downloading a software update package.
EXAMPLE 2 Transferring a software update package using a tool.
3.2.2
installation
step in the software update operation (3.1.19) when the relevant parts of a software update package
(3.1.20) are written to a vehicle, vehicle system (3.1.25), or electronic control unit (ECU) (3.1.7) but are
not yet activated (3.2.3)
3.2.3
activation
step in the software update operation (3.1.19) when the relevant parts of an installed (3.2.2) software
update package (3.1.20) become executable on a vehicle, vehicle system (3.1.25), or electronic control unit
(ECU) (3.1.7)
EXAMPLE 1 A new automated driving function is installed (3.2.2) and ready for execution, but is only executed
after the vehicle user (3.1.26) starts the function.
EXAMPLE 2 The relevant parts of a software update package for a vehicle, vehicle system, or ECU (3.1.7) are
installed and executed immediately after activation without user interaction.
4 Organizational level requirements
4.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) establishing organization-specific rules and processes for software update engineering;
b) adopting quality management, functional safety management and cybersecurity management for
software update engineering;
c) instituting and maintaining a continuous improvement process for software update engineering;
d) establishing an information sharing policy for software update engineering; and
e) performing an organizational audit for process compliance.
4.2 General
This clause covers the responsibility of the organization engaged in software update engineering to
have governance in place so that the processes for software update engineering can conform to the
requirements of this document. Governance includes compliance with required ISO standards as well
as organizational activities such as continuous improvement, information sharing, and supporting
processes. This clause also establishes auditing requirements for this document.
ISO/FDIS 24089:2022(E)
4.3 Requirements and recommendations
4.3.1 Governance
4.3.1.1 If the organization performs software update engineering activities, then this document
applies.
4.3.1.2 The organization shall establish, document, and maintain rules and processes for software
update engineering to:
— enable the implementation of the requirements of this document;
— support the execution of the corresponding activities, including the assignment of resources and
responsibilities across all those involved in the software update engineering activities;
— confirm conformance with the requirements of this document.
NOTE 1 These rules and processes cover vehicle systems that are affected by software update engineering
activities.
NOTE 2 These rules and processes cover the infrastructure used for software update engineering activities.
EXAMPLE Process definitions, technical rules, guidelines, methods, and templates.
4.3.1.3 The organization shall establish, implement and maintain software update engineering
activities in accordance with applicable content of:
— ISO/SAE 21434;
— ISO 26262-6;
— ISO 262628.
NOTE Other parts of ISO 26262 series can provide guidance on how to identify applicable content and how
to conform with ISO 262626 and ISO 262628.
EXAMPLE ISO 262623 can be used to show that ISO 262626 is not applicable if the software update
operation is classification QM (quality management).
4.3.2 Continuous improvement
4.3.2.1 The organization shall establish, perform and maintain a continuous improvement process
for software update engineering activities.
EXAMPLE 1 Evaluating, applying and communicating lessons learned.
EXAMPLE 2 Improvements from previous or similar software update projects, field monitoring and
observations.
EXAMPLE 3 Key performance indicator (KPI) for continuous improvement process is the number of failures.
4.3.2.2 The organization shall establish, perform and maintain a process to verify that after any
change to its software update engineering processes, the processes still meet the requirements of this
document.
4.3.3 Information sharing
4.3.3.1 The organization shall establish, perform and maintain a policy for sharing information both
inside and outside the organization concerning software update engineering activities.
ISO/FDIS 24089:2022(E)
NOTE The policy can include what information is shared, with whom the information is shared, when the
information is shared, and how to permit sharing of information.
EXAMPLE Information being shared can include:
— schedule for the software update campaign;
— content description;
— possible implication of the software update campaign including safety or cybersecurity-relevant items;
— duration the vehicle or its functions are unavailable;
— reason for the software update campaign;
— treatment of sensitive or personal information;
— documentation about the software update campaign;
— license and intellectual property information.
4.3.4 Supporting processes
4.3.4.1 The organization shall establish, implement and maintain a document management process
for software update engineering activities to handle the work products required by this document.
EXAMPLE IATF 16949 can be applied.
4.3.4.2 The organization shall establish, implement, and maintain a requirements management
process for software update engineering activities.
EXAMPLE ISO/IEC 26551.
4.3.4.3 The organization should consider privacy implications of the activities required by this
document.
NOTE Activities in this document can involve personal information.
EXAMPLE 1 Information on privacy can be found in ISO/IEC 27701 and ISO/IEC 29100.
EXAMPLE 2 Customer personally identifiable information included in software update campaigns.
4.3.4.4 The organization shall establish, implement and maintain a configuration management
process.
NOTE Software update engineering activities involve configuration information for software update
packages, vehicles and infrastructure.
EXAMPLE 1 ISO 10007 can be used for a configuration management process.
EXAMPLE 2 ISO/IEC/IEEE 15288 can be applied for configuration management on system life cycle
management.
4.3.4.5 The organization shall establish, implement and maintain a quality management process for
software update engineering activities.
EXAMPLE 1 IATF 16949, ISO 9001 and ISO/IEC 25000 can be used for quality management process.
EXAMPLE 2 Maintenance of the infrastructure.
4.3.4.6 The organization shall establish, implement and maintain a change management process for
software update engineering activities.
ISO/FDIS 24089:2022(E)
EXAMPLE ISO 9001 can be used for change management process.
4.3.5 Auditing
4.3.5.1 An audit shall be performed to determine that the organizational processes for software
update engineering achieve the objectives of this document.
NOTE 1 Such an audit can be included in, or combined with, an audit according to a quality management
system standard.
NOTE 2 The audit can be performed by an internal or external organization.
NOTE 3 To ensure the organizational processes remain appropriate for software update engineering, an audit
can be performed periodically.
NOTE 4 In a distributed development, right to audit can be included in the contract.
4.4 Work products
4.4.1 Organizational rules and processes resulting from the requirements of 4.3.1.1, 4.3.1.2, 4.3.4.1,
4.3.4.3, 4.3.4.4, 4.3.4.5, and 4.3.4.6.
4.4.2 Records of organizational management resulting from the requirements of 4.3.1.3, 4.3.4.2, and
4.3.4.5.
4.4.3 Documentation of continuous improvement resulting from the requirement of 4.3.2.1 and
4.3.2.2.
4.4.4 Information sharing policy resulting from the requirement of 4.3.3.1.
4.4.5 Audit report resulting from the requirement of 4.3.5.1.
5 Project level requirements
5.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) planning for a software update project, including assigning roles and responsibilities;
b) managing and storing of information regarding a software update project;
c) providing justifications for any tailoring of a software update project;
d) confirming interoperability of the infrastructure and the vehicle functions for a software update
project; and
e) preserving integrity of software, and either metadata or software update packages, or both.
5.2 General
This clause covers organizational requirements for software update projects including planning for
software update projects, and managing information related to software update projects. In addition,
this clause includes requirements on tailoring software update projects and interoperability between
the parts of software update projects.
ISO/FDIS 24089:2022(E)
5.3 Requirements and recommendations
5.3.1 Project management
5.3.1.1 The organization shall develop, implement and maintain a plan for each software update
project that covers all necessary activities.
NOTE 1 This plan can include activities involving the development and adaptation of vehicle or infrastructure
functions, as well as any process described in this document.
NOTE 2 A software update project can encompass multiple software update campaigns.
EXAMPLE A software update project for a vehicle model; a software update project for a vehicle system; a
software update project for a single type of ECU.
5.3.1.2 The organization shall manage and store documentation for each software update project.
NOTE Relevant processes are defined in 4.3.4.1 and 4.3.4.2.
5.3.1.3 The organization shall establish, assign and maintain the roles and responsibilities for each
software update project.
NOTE Documentation of roles and responsibilities can be included in the plan in 5.3.1.1.
EXAMPLE A software update engineering responsibility is assigned to a department.
5.3.2 Tailoring and rationale
5.3.2.1 A software update project may be tailored.
EXAMPLE 1 A tailored software update project identifies applicable content of ISO 26262-6, ISO 26262-8 and
ISO/SAE 21434 in the context of software update engineering activities.
EXAMPLE 2 A body builder tailors a software update project to conform with functional safety standards
such as either ISO 13849 or the IEC 61508 series, or both.
5.3.2.2 If a software update project is tailored, then a rationale shall be provided as to how the
tailored activities achieve the applicable objectives of this document.
NOTE 1 An activity is tailored if it is omitted or performed in a different manner compared to its description
in this document.
NOTE 2 Software update engineering activities in this document that are performed by another entity in the
supply chain are considered distributed activities rather than tailored activities.
EXAMPLE 1 Distributed cybersecurity activities under ISO/SAE 21434.
NOTE 3 The organization can consult with their suppliers on which clauses of this document are applicable to
the supplier’s work.
EXAMPLE 2 A supplier creates a new version of software for an organization to distribute to a vehicle.
5.3.3 Interoperability
5.3.3.1 The organization shall establish, implement and maintain a process to confirm the
interoperability of the functions developed in accordance with the requirements from Clause 6 and
Clause 7.
NOTE Since the infrastructure and the vehicle system can be implemented separately, it is important to
confirm the interoperability between them to achieve a successful software update campaign.
ISO/FDIS 24089:2022(E)
EXAMPLE Maintenance of the infrastructure for preserving interoperability.
5.3.4 Integrity
5.3.4.1 The organization shall establish, implement and maintain processes to preserve the integrity
of software, and either metadata or software update packages, or both, during distribution in the
context of interoperability:
— within the infrastructure of organizations;
— between organizations within the supply chain;
— from organizations to vehicles;
— within the vehicle and between vehicle systems.
NOTE 1 The organization distributing software to vehicles can be an OEM, a supplier or other authorized
entity.
NOTE 2 The riskbased approaches in ISO/SAE 21434 and the ISO 26262 series can be used to select measures
to preserve integrity.
5.4 Work products
5.4.1 Software update project plan resulting from the requirements of 5.3.1.1 and 5.3.1.3.
5.4.2 Documentation of software update project resulting from the requirement of 5.3.1.2.
5.4.3 Rationale for tailored activities, if applicable, resulting from the requirement of 5.3.2.2.
5.4.4 Documentation of confirmation of interoperability resulting from 5.3.3.1.
5.4.5 Documentation of processes to preserve integrity from 5.3.4.1.
6 Infrastructure level requirements
6.1 Objectives
The objectives of this clause are to ensure that the following are developed:
a) management of cybersecurity risks for the infrastructure;
b) functionality for collecting and managing vehicle configuration information for the infrastructure;
c) functionality for collecting and distributing information about software update campaigns; and
d) functionality for creating, managing, and distributing software update packages.
6.2 General
This clause includes the requirements for the development of infrastructure that is used for software
update campaigns. The requirements cover the functions that are assigned to the infrastructure
for the software update campaigns, such as distribution, communication, information storage, and
cybersecurity. Functions described in this clause support the software update campaigns in the
infrastructure. Such functions can be on or off the vehicle depending on the architectural decisions of
the organization.
ISO/FDIS 24089:2022(E)
6.3 Requirements and recommendations
6.3.1 Managing risk
6.3.1.1 The organization shall manage the cybersecurity risks of the infrastructure.
EXAMPLE 1 Application of the ISO/IEC 27000 series.
EXAMPLE 2 Application of ISO/SAE 21434 for cybersecurity risks in the vehicle.
6.3.2 Managing vehicle configuration information
6.3.2.1 The infrastructure shall have one or more functions for receiving, storing and processing of
vehicle configuration information.
6.3.2.2 The infrastructure shall have one or more functions to maintain the integrity of the collected
vehicle configuration information.
6.3.2.3 The infrastructure shall have one or more functions to distribute vehicle configuration
information to related parties.
NOTE 1 Distribution functions can be manual (i.e. paperbased).
NOTE 2 Vehicle configuration information can be distributed before, during or after a software update
campaign.
EXAMPLE Vehicle configuration information is distributed to regulatory entities or suppliers.
6.3.2.4 The infrastructure shall have one or more functions to support the identification of
dependencies for software update packages.
NOTE 1 This can be done on the vehicle or in the infrastructure or a combination of both.
NOTE 2 This function is used in Clause 8.
EXAMPLE 1 Dependencies that affect intelligent traffic systems or communication with consumer devices.
EXAMPLE 2 Dependencies that affect electric vehicle charging or map data processing.
6.3.2.5 The infrastructure shall have one or more functions to check compatibility of a software
update package.
6.3
...
INTERNATIONAL ISO
STANDARD 24089
First edition
2023-02
Road vehicles — Software update
engineering
Véhicules routiers — Ingénierie de mise à jour du logiciel
Reference number
© ISO 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
Contents Page
Foreword .v
Introduction . vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
3.1 General terminology . 1
3.2 Terms related to the software update operation. 5
4 Organizational level . 5
4.1 Objectives . 5
4.2 General . 5
4.3 Requirements and recommendations . 6
4.3.1 Governance . 6
4 . 3 . 2 C ont i nuou s i mpr ovement . 6
4.3.3 Information sharing . 6
4.3.4 Supporting processes . 7
4.3.5 Auditing . 8
4.4 Work products . 8
5 Project level . 8
5.1 Ob jectives . 8
5.2 General . 8
5.3 Requirements and recommendations . 9
5.3.1 Project management . 9
5.3.2 Tailoring and rationale . 9
5.3.3 Interoperability . 9
5.3.4 Integrity . 10
5.4 Work products . 10
6 Infrastructure level .10
6.1 Objectives . 10
6.2 General . 10
6.3 Requirements and recommendations . 11
6.3.1 Managing risk . . 11
6.3.2 Managing vehicle configuration information . 11
6.3.3 Communicating software update campaign information . 11
6.3.4 Processing software update packages.12
6.4 Work products .12
7 Vehicle and vehicle systems level.13
7.1 Ob jectives . 13
7.2 General .13
7.3 Requirements and recommendations . 13
7.3.1 Managing risks . 13
7.3.2 Managing vehicle configuration information . 14
7.3.3 Communicating software update campaign information . 14
7.3.4 Processing software update packages. 14
7.4 Work products . 16
8 Software update package .16
8.1 Objectives . 16
8.2 General . 17
8.3 Requirements and recommendations . 17
8.3.1 Identification of targets and the contents for the software update package . 17
8.3.2 Assembly of the software update package . 18
8.3.3 Verification and validation of the software update package . 18
iii
8.3.4 Approval for release of the software update package . 18
8.4 Work products . 19
9 Software update campaign .19
9.1 Ob jectives . 19
9.2 General . 19
9.3 Requirements and recommendations . 19
9.3.1 Software update campaign preparation . 19
9.3.2 Software update campaign execution . 21
9.3.3 Software update campaign completion . 23
9.4 Work products . 23
Bibliography .24
iv
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 22, Road Vehicles, Subcommittee SC 32,
Electrical and electronic components and general system aspects.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
v
Introduction
Electronic control units and software of increasing complexity have become essential to the operation
of road vehicles in recent years. This software is often updated to increase functionality and maintain
the safety and cybersecurity of road vehicles.
Today, in-vehicle software is updated in a workshop by a skilled person or automatically over-the-air
by the vehicle user. With the increased frequency of software update campaigns, it is important to have
individual vehicle configuration information. Therefore, the establishment and application of software
update engineering is important to ensure software quality, cybersecurity, and safety.
Software update engineering activities occur throughout the life cycle of vehicles.
This document provides terminology, objectives, requirements, and guidelines related to software
update engineering as a foundation for common understanding throughout the supply chain. By
applying requirements and recommendations in this document, the following benefits can be achieved
for software update engineering:
— safety and cybersecurity are addressed in software update operations in road vehicles;
— establishment of processes, including goal setting, planning, auditing, process monitoring, process
measurement, and process improvement;
— shared awareness of safety and cybersecurity among related parties.
Figure 1 shows the overview of this document.
Figure 1 — Overview of this document
In this document, clauses are structured using the following approach:
— each process is defined and implemented before it is executed;
— each process is established, documented and maintained.
vi
This document describes the following activities:
— implementation of organizational level processes for software update engineering;
— implementation of software update project level processes for each software update project;
— definitions of functions for the vehicle and infrastructure to support the activities and processes of
this document;
— assembly of software update packages using functions in the infrastructure;
— preparation and execution of software update campaigns using functions in the vehicle and
infrastructure.
vii
INTERNATIONAL STANDARD ISO 24089:2023(E)
Road vehicles — Software update engineering
1 Scope
This document specifies requirements and recommendations for software update engineering for road
vehicles on both the organizational and the project level.
This document is applicable to road vehicles whose software can be updated.
The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs,
infrastructure, and the assembly and deployment of software update packages after the initial
development.
This document is applicable to organizations involved in software update engineering for road vehicles.
Such organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners.
This document establishes a common understanding for communicating and managing activities and
responsibilities among organizations and related parties.
The development of software for vehicle functions, except for software update engineering, is outside
the scope of this document.
Finally, this document does not prescribe specific technologies or solutions for software update
engineering.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 26262-6, Road vehicles — Functional safety — Part 6: Product development at the software level
ISO 26262-8, Road vehicles — Functional safety — Part 8: Supporting processes
ISO/SAE 21434, Road vehicles — Cybersecurity engineering
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1 General terminology
3.1.1
compatibility
capability of software (3.1.15) to be executable on vehicle systems (3.1.25) without conflicts
Note 1 to entry: Compatibility can be checked by vehicle configuration information (3.1.24).
3.1.2
condition
criteria required for a software update operation (3.1.19) to be completed successfully
Note 1 to entry: Conditions can include compatibility (3.1.1), safe vehicle state (3.1.13), in-vehicle resources (3.1.11),
and external resources.
EXAMPLE The presence of a skilled person (3.1.14) during a software update operation.
3.1.3
corrective action
action to eliminate or contain a problem or failure
3.1.4
cybersecurity
road vehicle cybersecurity
context in which assets are sufficiently protected against threat scenarios to vehicle systems (3.1.25) of
road vehicles and infrastructure (3.1.10) required to support software update engineering (3.1.18)
Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle
cybersecurity.
[SOURCE: ISO/SAE 21434:2021, 3.1.9, modified — “to items of road vehicles, their functions and their
electrical or electronic components” has been replaced by “to vehicle systems of road vehicles and
infrastructure required to support software update engineering” and the Note 1 to entry has been
modified.]
3.1.5
cybersecurity risk
effect of uncertainty on cybersecurity (3.1.4) expressed in terms of attack feasibility and impact
[SOURCE: ISO/SAE 21434:2021, 3.1.29]
3.1.6
dependency
effect of software (3.1.15) for one vehicle system (3.1.25) on the same or other vehicle systems (3.1.25)
Note 1 to entry: A dependency can generate a condition (3.1.2) in the metadata of a software update package
(3.1.20).
EXAMPLE A communication interface between two electronic control units (ECUs) (3.1.7).
3.1.7
ECU
electronic control unit
embedded device in a vehicle whose software (3.1.15) can be updated
3.1.8
functional safety
absence of unreasonable risk due to hazards caused by malfunctioning behaviour of vehicle systems
(3.1.25)
[SOURCE: ISO 26262-1:2018, 3.67, modified — “E/E” was replaced by “vehicle”.]
3.1.9
functional safety risk
combination of the probability of occurrence of harm and the severity of that harm
[SOURCE: ISO 26262-1:2018, 3.128, modified — The term has been modified from “risk” to “functional
safety risk” for the scope of this document.]
3.1.10
infrastructure
processes and information systems managing any combination of software update operations (3.1.19),
software update campaigns (3.1.16), documentation, and vehicle configuration information (3.1.24),
including both digital and manual activities
Note 1 to entry: Infrastructure can include any combination of servers, tools, and manual activities used in the
software update operation.
3.1.11
in-vehicle resource
vehicle or electronic control unit (ECU) (3.1.7) available properties relevant for software update
engineering (3.1.18)
EXAMPLE Available or remaining computational power, network capacity, RAM capacity, storage capacity,
or battery capacity.
3.1.12
recipient
individual instance of a vehicle, vehicle system (3.1.25), or electronic control unit (ECU) (3.1.7) that
receives a software update package (3.1.20) during a software update campaign (3.1.16)
3.1.13
safe vehicle state
vehicle operating mode based on conditions (3.1.2) for performing software update operations (3.1.19)
without an unreasonable level of risk
Note 1 to entry: Safe vehicle state can be different depending on the conditions (3.1.2) required for the software
update package (3.1.20).
Note 2 to entry: Safe vehicle state can vary based on the software update operation step being performed.
EXAMPLE The motor is off, the parking brake is applied.
3.1.14
skilled person
individual with relevant technical education, training or experience to execute software update
operations (3.1.19)
Note 1 to entry: A skilled person can be a mechanic in a workshop.
Note 2 to entry: A skilled person can be authorized or certified for their specialized training or be a skilled vehicle
user (3.1.26).
[SOURCE: ISO 10209:2022, 3.14.36, modified — The phrase “to enable them to perceive risks and
avoid hazards occurring during use of a product” has been replaced by “to execute software update
operations”.]
3.1.15
software
computer programs and associated data intended for installation (3.2.2) on vehicles, vehicle systems
(3.1.25), or electronic control units (ECUs) (3.1.7), that may be dynamically written or modified during
execution
[SOURCE: NIST SP 800-53, modified — The phrase “intended for installation on vehicles, vehicle
systems, or electronic control units (ECUs)” was added.]
3.1.16
software update campaign
sequence of identifying targets (3.1.23) and resolving recipients (3.1.12); distributing software update
packages (3.1.20); and monitoring and documenting results of software update operations (3.1.19)
3.1.17
software update distribution method
mechanism for delivery of a software update package (3.1.20) during a software update campaign
(3.1.16)
Note 1 to entry: The software update distribution method can be wired (e.g. tool, USB flash drive), wireless (e.g.
cellular or Wi-Fi) or hardware replacement.
Note 2 to entry: Hardware replacement can be replacing an electronic control unit (ECU) (3.1.7) with the effect of
software (3.1.15) version replacement.
3.1.18
software update engineering
application of a systematic and managed approach to the processes of planning, development, and
deployment of software update packages (3.1.20)
[SOURCE: ISO/IEC/IEEE 24765:2017, 3.3810, modified — “disciplined, quantifiable” was replaced by
“and managed”, and “development, operation and maintenance of software” was replaced by “processes
of development, planning, and deployment of software update packages”.]
3.1.19
software update operation
steps involved in receipt (3.2.1), installation (3.2.2) and activation (3.2.3) of software update packages
(3.1.20) in a vehicle, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.20
software update package
set of software (3.1.15) and associated metadata that is intended to be deployed to one or more vehicles,
vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.21
software update project
set of software update engineering (3.1.18) activities for one or more targets (3.1.23)
Note 1 to entry: Activities can include developing or adapting the infrastructure (3.1.10), vehicle capabilities, or
processes described in this document.
Note 2 to entry: A software update project can encompass multiple software update campaigns (3.1.16).
3.1.22
tailor
to omit or perform an activity in a different manner compared to its description in this document
[SOURCE: ISO/SAE 21434:2021, 3.1.32]
3.1.23
target
one or more classes of vehicles, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
determined by vehicle configuration information (3.1.24)
3.1.24
vehicle configuration information
comprehensive accounting of hardware versions, software (3.1.15) versions and configuration
parameters in a vehicle
3.1.25
vehicle system
functional group of one or more electronic control units (ECUs) (3.1.7) and attached hardware
Note 1 to entry: Attached hardware can be, for example, a sensor, actuator or light, that is not an ECU.
EXAMPLE Braking system or infotainment system.
3.1.26
vehicle user
person operating, driving, owning or managing a vehicle
Note 1 to entry: A vehicle user can be a skilled person (3.1.14).
3.2 Terms related to the software update operation
3.2.1
receipt
step in the software update operation (3.1.19) when a tool, vehicle, vehicle system (3.1.25), or electronic
control unit (ECU) (3.1.7) receives a software update package (3.1.20)
EXAMPLE 1 Downloading a software update package.
EXAMPLE 2 Transferring a software update package using a tool.
3.2.2
installation
step in the software update operation (3.1.19) when the relevant parts of a software update package
(3.1.20) are written to a vehicle, vehicle system (3.1.25), or electronic control unit (ECU) (3.1.7) but are
not yet activated (3.2.3)
3.2.3
activation
step in the software update operation (3.1.19) when the relevant parts of an installed (3.2.2) software
update package (3.1.20) become executable on a vehicle, vehicle system (3.1.25), or electronic control unit
(ECU) (3.1.7)
EXAMPLE 1 A new automated driving function is installed (3.2.2) and ready for execution, but is only executed
after the vehicle user (3.1.26) starts the function.
EXAMPLE 2 The relevant parts of a software update package for a vehicle, vehicle system, or ECU (3.1.7) are
installed and executed immediately after activation without user interaction.
4 Organizational level
4.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) establishing organization-specific rules and processes for software update engineering;
b) adopting quality management, functional safety management and cybersecurity management for
software update engineering;
c) instituting and maintaining a continuous improvement process for software update engineering;
d) establishing an information sharing policy for software update engineering; and
e) conducting an organizational audit for process compliance.
4.2 General
This clause covers the responsibility of the organization engaged in software update engineering to
have governance in place so that the processes for software update engineering can conform to the
requirements of this document. Governance includes compliance with required ISO standards as well
as organizational activities such as continuous improvement, information sharing, and supporting
processes. This clause also establishes auditing requirements for this document.
4.3 Requirements and recommendations
4.3.1 Governance
4.3.1.1 If the organization performs software update engineering activities, then this document
applies.
4.3.1.2 The organization shall establish, document, and maintain rules and processes for software
update engineering to:
— enable the implementation of the requirements of this document;
— support the execution of the corresponding activities, including the assignment of resources and
responsibilities across all those involved in the software update engineering activities;
— confirm conformance with the requirements of this document.
NOTE 1 These rules and processes cover vehicle systems that are affected by software update engineering
activities.
NOTE 2 These rules and processes cover the infrastructure used for software update engineering activities.
EXAMPLE Process definitions, technical rules, guidelines, methods, and templates.
4.3.1.3 The organization shall establish, implement and maintain software update engineering
activities in accordance with applicable content of:
— ISO/SAE 21434;
— ISO 26262-6;
— ISO 26262-8.
NOTE Other parts of ISO 26262 series can provide guidance on how to identify applicable content and how
to conform with ISO 26262-6 and ISO 26262-8.
EXAMPLE ISO 26262-3 can be used to show that ISO 26262-6 is not applicable if the software update
operation is classification QM (quality management).
4.3.2 Continuous improvement
4.3.2.1 The organization shall establish, perform and maintain a continuous improvement process
for software update engineering activities.
EXAMPLE 1 Evaluating, applying and communicating lessons learned.
EXAMPLE 2 Improvements from previous or similar software update projects, field monitoring and
observations.
EXAMPLE 3 Key performance indicator (KPI) for continuous improvement process is the number of failures.
4.3.2.2 The organization shall establish, perform and maintain a process to verify that after any
change to its software update engineering processes, the processes still meet the requirements of this
document.
4.3.3 Information sharing
4.3.3.1 The organization shall establish, perform and maintain a policy for sharing information both
inside and outside the organization concerning software update engineering activities.
NOTE The policy can include what information is shared, with whom the information is shared, when the
information is shared, and how to permit sharing of information.
EXAMPLE Information being shared can include:
— schedule for the software update campaign;
— content description;
— possible implication of the software update campaign including safety or cybersecurity-relevant items;
— duration the vehicle or its functions are unavailable;
— reason for the software update campaign;
— treatment of sensitive or personal information;
— documentation about the software update campaign;
— license and intellectual property information.
4.3.4 Supporting processes
4.3.4.1 The organization shall establish, implement and maintain a document management process
for software update engineering activities to handle the work products required by this document.
EXAMPLE IATF 16949 can be applied.
4.3.4.2 The organization shall establish, implement, and maintain a requirements management
process for software update engineering activities.
EXAMPLE ISO/IEC 26551.
4.3.4.3 The organization should consider privacy implications of the activities required by this
document.
NOTE Activities in this document can involve personal information.
EXAMPLE 1 Information on privacy can be found in ISO/IEC 27701 and ISO/IEC 29100.
EXAMPLE 2 Customer personally identifiable information included in software update campaigns.
4.3.4.4 The organization shall establish, implement and maintain a configuration management
process.
NOTE Software update engineering activities involve configuration information for software update
packages, vehicles and infrastructure.
EXAMPLE 1 ISO 10007 can be used for a configuration management process.
EXAMPLE 2 ISO/IEC/IEEE 15288 can be applied for configuration management on system life cycle
management.
4.3.4.5 The organization shall establish, implement and maintain a quality management process for
software update engineering activities.
EXAMPLE 1 IATF 16949, ISO 9001 and ISO/IEC 25000 can be used for quality management process.
EXAMPLE 2 Maintenance of the infrastructure.
4.3.4.6 The organization shall establish, implement and maintain a change management process for
software update engineering activities.
EXAMPLE ISO 9001 can be used for change management process.
4.3.5 Auditing
4.3.5.1 An audit shall be performed to determine that the organizational processes for software
update engineering achieve the objectives of this document.
NOTE 1 Such an audit can be included in, or combined with, an audit according to a quality management
system standard.
NOTE 2 The audit can be performed by an internal or external organization.
NOTE 3 To ensure the organizational processes remain appropriate for software update engineering, an audit
can be performed periodically.
NOTE 4 In a distributed development, right to audit can be included in the contract.
4.4 Work products
4.4.1 Organizational rules and processes resulting from the requirements of 4.3.1.1, 4.3.1.2, 4.3.4.1,
4.3.4.3, 4.3.4.4, 4.3.4.5, and 4.3.4.6.
4.4.2 Records of organizational management resulting from the requirements of 4.3.1.3, 4.3.4.2, and
4.3.4.5.
4.4.3 Documentation of continuous improvement resulting from the requirement of 4.3.2.1 and
4.3.2.2.
4.4.4 Information sharing policy resulting from the requirement of 4.3.3.1.
4.4.5 Audit report resulting from the requirement of 4.3.5.1.
5 Project level
5.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) planning for a software update project, including assigning roles and responsibilities;
b) managing and storing of information regarding a software update project;
c) providing justifications for any tailoring of a software update project;
d) confirming interoperability of the infrastructure and the vehicle functions for a software update
project; and
e) preserving integrity of software, and either metadata or software update packages, or both.
5.2 General
This clause covers organizational requirements for software update projects including planning for
software update projects, and managing information related to software update projects. In addition,
this clause includes requirements on tailoring software update projects and interoperability between
the parts of software update projects.
5.3 Requirements and recommendations
5.3.1 Project management
5.3.1.1 The organization shall develop, implement and maintain a plan for each software update
project that covers all necessary activities.
NOTE 1 This plan can include activities involving the development and adaptation of vehicle or infrastructure
functions, as well as any process described in this document.
NOTE 2 A software update project can encompass multiple software update campaigns.
EXAMPLE A software update project for a vehicle model; a software update project for a vehicle system; a
software update project for a single type of ECU.
5.3.1.2 The organization shall manage and store documentation for each software update project.
NOTE Relevant processes are defined in 4.3.4.1 and 4.3.4.2.
5.3.1.3 The organization shall establish, assign and maintain the roles and responsibilities for each
software update project.
NOTE Documentation of roles and responsibilities can be included in the plan in 5.3.1.1.
EXAMPLE A software update engineering responsibility is assigned to a department.
5.3.2 Tailoring and rationale
5.3.2.1 A software update project may be tailored.
EXAMPLE 1 A tailored software update project identifies applicable content of ISO 26262-6, ISO 26262-8 and
ISO/SAE 21434 in the context of software update engineering activities.
EXAMPLE 2 A body builder tailors a software update project to conform with functional safety standards
such as either ISO 13849 or the IEC 61508 series, or both.
5.3.2.2 If a software update project is tailored, then a rationale shall be provided as to how the
tailored activities achieve the applicable objectives of this document.
NOTE 1 An activity is tailored if it is omitted or performed in a different manner compared to its description
in this document.
NOTE 2 Software update engineering activities in this document that are performed by another entity in the
supply chain are considered distributed activities rather than tailored activities.
EXAMPLE 1 Distributed cybersecurity activities under ISO/SAE 21434.
NOTE 3 The organization can consult with their suppliers on which clauses of this document are applicable to
the supplier’s work.
EXAMPLE 2 A supplier creates a new version of software for an organization to distribute to a vehicle.
5.3.3 Interoperability
5.3.3.1 The organization shall establish, implement and maintain a process to confirm the
interoperability of the functions developed in accordance with the requirements from Clause 6 and
Clause 7.
NOTE Since the infrastructure and the vehicle system can be implemented separately, it is important to
confirm the interoperability between them to achieve a successful software update campaign.
EXAMPLE Maintenance of the infrastructure for preserving interoperability.
5.3.4 Integrity
5.3.4.1 The organization shall establish, implement and maintain processes to preserve the integrity
of software, and either metadata or software update packages, or both, during distribution in the
context of interoperability:
— within the infrastructure of organizations;
— between organizations within the supply chain;
— from organizations to vehicles;
— within the vehicle and between vehicle systems.
NOTE 1 The organization distributing software to vehicles can be an OEM, a supplier or other authorized
entity.
NOTE 2 The risk-based approaches in ISO/SAE 21434 and the ISO 26262 series can be used to select measures
to preserve integrity.
5.4 Work products
5.4.1 Software update project plan resulting from the requirements of 5.3.1.1 and 5.3.1.3.
5.4.2 Documentation of software update project resulting from the requirement of 5.3.1.2.
5.4.3 Rationale for tailored activities, if applicable, resulting from the requirement of 5.3.2.2.
5.4.4 Documentation of confirmation of interoperability resulting from 5.3.3.1.
5.4.5 Documentation of processes to preserve integrity from 5.3.4.1.
6 Infrastructure level
6.1 Objectives
The objectives of this clause are to ensure that the following are developed:
a) management of cybersecurity risks for the infrastructure;
b) functionality for collecting and managing vehicle configuration information for the infrastructure;
c) functionality for collecting and distributing information about software update campaigns; and
d) functionality for creating, managing, and distributing software update packages.
6.2 General
This clause includes the requirements for the development of infrastructure that is used for software
update campaigns. The requirements cover the functions that are assigned to the infrastructure
for the software update campaigns, such as distribution, communication, information storage, and
cybersecurity. Functions described in this clause support the software update campaigns in the
infrastructure. Such functions can be on or off the vehicle depending on the architectural decisions of
the organization.
6.3 Requirements and recommendations
6.3.1 Managing risk
6.3.1.1 The organization shall manage the cybersecurity risks of the infrastructure.
EXAMPLE 1 Application of the ISO/IEC 27000 series.
EXAMPLE 2 Application of ISO/SAE 21434 for cybersecurity risks in the vehicle.
6.3.2 Managing vehicle configuration information
6.3.2.1 The infrastructure shall have one or more functions for receiving, storing and processing of
vehicle configuration information.
6.3.2.2 The infrastructure shall have one or more functions to maintain the integrity of the collected
vehicle configuration information.
6.3.2.3 The infrastructure shall have one or more functions to distribute vehicle configuration
information to related parties.
NOTE 1 Distribution functions can be manual (e.g. paper-based).
NOTE 2 Vehicle configuration information can be distributed before, during or after a software update
campaign.
EXAMPLE Vehicle configuration information is distributed to regulatory entities or suppliers.
6.3.2.4 The infrastructure shall have one or more functions to support the identification of
dependencies for software update packages.
NOTE 1 This can be done on the vehicle or in the infrastructure or a combination of both.
NOTE 2 This function is used in Clause 8.
EXAMPLE 1 Dependencies that affect intelligent traffic systems or communication with consumer devices.
EXAMPLE 2 Dependencies that affect electric vehicle charging or map data processing.
6.3.2.5 The infrastructure shall have one or more functions to check compatibility of a software
update package.
6.3.3 Communicating software update campaign information
6.3.3.1 The infrastructure shall have one or more functions to provide notifications as required by
this document.
NOTE 1 This infrastructure notification function can be used to notify vehicle users instead of an in-vehicle
notification function.
NOTE 2 These functions support notification requirements in Clause 9.
6.3.3.2 The infrastructure shall have one or more functions to receive, store, process and distribute
results of software update campaigns.
NOTE See requirements concerning results of software update campaigns in Clause 9.
EXAMPLE The infrastructure receives success or failure from vehicles during a software update campaign.
6.3.4 Processing software update packages
6.3.4.1 The infrastructure shall have one or more functions to create, process, receive and store
software update packages.
EXAMPLE The infrastructure receives a software update package from another organization in the supply
chain.
6.3.4.2 The infrastructure shall have one or more functions to associate software update packages
with targets.
6.3.4.3 The infrastructure shall have one or more functions to resolve targets into recipients for
software update campaigns.
6.3.4.4 The infrastruct
...
2022-09-06
ISO/DISFDIS 24089:2022(E)
2022-10-12
ISO TC 22/SC 32/WG 12
Secretariat: JISC
Road vehicles – Software update engineering
DIS stage
Warning for WDs and CDs
This document is not an ISO International Standard. It is distributed for review and comment. It is subject to change
without notice and may not be referred to as an International Standard.
Recipients of this draft are invited to submit, with their comments, notification of any relevant patent rights of which
they are aware and to provide supporting documentation.
ISO/DISFDIS 24089:2022(E)
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of
this publication may be reproduced or utilized otherwise in any form or by any means, electronic or
mechanical, including photocopying, or posting on the internet or an intranet, without prior written
permission. Permission can be requested from either ISO at the address below or ISO’s member body in the
country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.orgwww.iso.org
Published in Switzerland
ii © ISO 2022 – All rights reserved
ISO/DISFDIS 24089:2022(E)
Contents
Foreword . iv
Introduction . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
3.1 General terminology . 1
3.2 Terms related to the software update operation . 5
4 Organizational level requirements . 5
4.1 Objectives . 5
4.2 General . 6
4.3 Requirements and recommendations . 6
4.4 Work products . 9
5 Project level requirements . 9
5.1 Objectives . 9
5.2 General . 9
5.3 Requirements and recommendations . 9
5.4 Work products . 11
6 Infrastructure level requirements . 11
6.1 Objectives . 11
6.2 General . 11
6.3 Requirements and recommendations . 11
6.4 Work products . 13
7 Vehicle and vehicle systems level requirements . 13
7.1 Objectives . 13
7.2 General . 14
7.3 Requirements and recommendations . 14
7.4 Work products . 17
8 Software update package requirements . 17
8.1 Objectives . 17
8.2 General . 17
8.3 Requirements and recommendations . 18
8.4 Work products . 20
9 Software update campaign requirements . 20
9.1 Objectives . 20
9.2 General . 20
9.3 Requirements and recommendations . 20
9.4 Work products . 25
Bibliography . 26
reserved
ISO/DISFDIS 24089:2022(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out through
ISO technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types of
ISO documents should be noted. This document was drafted in accordance with the editorial rules of the
ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of any patent rights
identified during the development of the document will be in the Introduction and/or on the ISO list of patent
declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www.iso.org/iso/foreword.html.
This document was prepared by Technical Committee ISO/TC 22, Road Vehicles, Subcommittee SC 32,
Electrical and electronic components and general system aspects.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
iv © ISO 2022 – All rights reserved
ISO/DISFDIS 24089:2022(E)
Introduction
Electronic control units and software of increasing complexity have become essential to the operation of road
vehicles in recent years. This software is often updated to increase functionality and maintain the safety and
cybersecurity of road vehicles.
Today, in-vehicle software is updated in a workshop by skilled persons or automatically over-the-air by the
vehicle user. With the increased frequency of software update campaigns, it is important to have individual
vehicle configuration information. Therefore, the establishment and application of software update
engineering is important to ensure software quality, cybersecurity, and safety.
Software update engineering activities occur throughout the lifecyclelife cycle of vehicles.
This document provides vocabulary, objectives, requirements, and guidelines related to software update
engineering as a foundation for common understanding throughout the supply chain. By applying
requirements and recommendations in this document, the following benefits can be achieved for software
update engineering:
-— safety and cybersecurity are addressed in software update operations in road vehicles;
-— establishment of processes, including goal setting, planning, auditing, process monitoring, process
measurement, and process improvement;
-— shared awareness of safety and cybersecurity among related parties.
Figure 1 shows the overview of this document.
Organizational processes
Software update project processes
Vehicle &
Infrastructure
vehicle system
functions
functions
Software update package assembly
Software update campaign
Preparation Execution
reserved
ISO/DISFDIS 24089:2022(E)
Figure 1 – — Overview of this document
In this document, clauses are structured using the following approach:
-— each process is defined and implemented before it is executed;
-— each process is established, documented, and maintained.
This document describes the following activities:
-— implementation of organizational level processes for software update engineering;
-— implementation of software update project level processes for each software update project;
-— definitions of functions for the vehicle and infrastructure to support the activities and processes of this
document;
-— assembly of software update packages using functions in the infrastructure;
-— preparation and execution of software update campaigns using functions in the vehicle and infrastructure.
vi © ISO 2022 – All rights reserved
FINAL DRAFT INTERNATIONAL STANDARD ISO/FDIS 24089:2022(E)
Road vehicles – Software update engineering
1 Scope
This document specifies requirements and recommendations for software update engineering for road
vehicles on both the organizational and the project level.
This document is applicable to road vehicles whose software can be updated.
The requirements and recommendations in this document apply to vehicles, vehicle systems, ECUs,
infrastructure, and the assembly and deployment of software update packages after the initial development.
This document is applicable to organizations involved in software update engineering for road vehicles. Such
organizations can include vehicle manufacturers, suppliers, and their subsidiaries or partners.
This document establishes a common understanding for communicating and managing activities and
responsibilities among organizations and related parties.
The development of software for vehicle functions, except for software update engineering, is outside the
scope of this document.
Finally, this document does not prescribe specific technologies or solutions for software update engineering.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO 26262-6, Road Vehicles ---vehicles — Functional Safety ---safety — Part 6: Product development at the
software level
ISO 26262-8, Road Vehicles ---vehicles — Functional Safety ---safety — Part 8: Supporting processes
ISO/SAE 21434, Road vehicles ---— Cybersecurity Engineering engineering
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https://www.iso.org/obp
— IEC Electropedia: available at https://www.electropedia.org/
3.1 General terminology
3.1.1
compatibility
capability of software (3.1.15) to be executable on vehicle systems (3.1.25) without conflicts
Note 1 to entry: Compatibility can be checked by vehicle configuration information (3.1.24).
ISO/FDIS 24089:2022(E)
3.1.2
condition
criteria required for a software update operation (3.1.19) to be completed successfully
Note 1 to entry: Conditions can include compatibility (3.1.1), safe vehicle state (3.1.13), in-vehicle resources (3.1.11), and
external resources.
EXAMPLE The presence of a skilled person (3.1.14) during a software update operation (3.1.19).
3.1.3
corrective action
action to eliminate or contain a problem or failure
3.1.4
cybersecurity
road vehicle cybersecurity
context in which assets are sufficiently protected against threat scenarios to vehicle systems (3.1.25) of road
vehicles and infrastructure (3.1.10) required to support software update engineering (3.1.18)
Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle
cybersecurity.
[SOURCE: ISO/SAE 21434:2021, 3.1.9, modified – "— “to items of road vehicles, their functions and their
electrical or electronic components"” has been replaced by "“to vehicle systems of road vehicles and
infrastructure required to support software update engineering"” and the Note 1 to entry has been modified.]
3.1.5
cybersecurity risk
effect of uncertainty on cybersecurity (3.1.4) expressed in terms of attack feasibility and impact
[SOURCE: ISO/SAE 21434:2021, 3.1.29]
3.1.6
dependency
effect of software (3.1.15) for one vehicle system (3.1.25) on the same or other vehicle systems (3.1.25)
Note 1 to entry: A dependency can generate a condition (3.1.2) in the metadata of a software update package (3.1.20).
EXAMPLE A communication interface between two electronic control units (ECUs) (3.1.7).
3.1.7
ECU
electronic control unit
ECU
embedded device in a vehicle whose software (3.1.15) can be updated
3.1.8
functional safety
absence of unreasonable risk due to hazards caused by malfunctioning behaviour of vehicle systems (3.1.25)
2 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
[SOURCE: ISO 26262-1:2018, 3.67, modified –— “E/E” was replaced "E/E" with "by “vehicle"]”.]
3.1.9
functional safety risk
combination of the probability of occurrence of harm and the severity of that harm
[SOURCE: ISO 26262-1:2018, 3.128, modified –— The term has been modified from "“risk"” to "“functional
safety risk"” for the scope of this document].]
3.1.10
infrastructure
processes and information systems managing any combination of software update operations (3.1.19),
software update campaigns (3.1.16), documentation, and vehicle configuration information (3.1.24), including
both digital and manual activities
Note 1 to entry: Infrastructure can include any combination of servers, tools, and manual activities used in the software
update operation (3.1.19).
3.1.11
in-vehicle resource
vehicle or electronic control unit (ECU) (3.1.47) available properties relevant for software update engineering
(3.1.18)
EXAMPLE Available or remaining computational power, network capacity, RAM capacity, storage capacity, or battery
capacity.
3.1.12
recipient
individual instance of a vehicle, vehicle system (3.1.25), or ECUelectronic control unit (ECU) (3.1.7) that receives
a software update package (3.1.20) during a software update campaign (3.1.16)
3.1.13
safe vehicle state
vehicle operating mode based on conditions (3.1.2) for performing software update operations (3.1.19) without
an unreasonable level of risk
Note 1 to entry: Safe vehicle state can be different depending on the conditions (3.1.2) required for the software update
package (3.1.20).
Note 2 to entry: Safe vehicle state can vary based on the software update operation (3.1.19) step being performed.
EXAMPLE The motor is off, the parking brake is applied.
3.1.14
skilled person
individual with relevant technical education, training or experience to execute software update operations
(3.1.19)
Note 1 to entry: A skilled person can be a mechanic in a workshop.
reserved
ISO/FDIS 24089:2022(E)
Note 2 to entry: A skilled person can be authorized or certified for their specialisedspecialized training or be a skilled
vehicle user (3.1.26).
[SOURCE: ISO 10209:2022, 3.14.36, modified – the— The phrase “to enable them to perceive risks and avoid
hazards occurring during use of a product” has been replaced by “to execute software update operations”]”.]
3.1.15
software
computer programs and associated data intended for installation (3.2.2) on vehicles, vehicle systems (3.1.25),
or electronic control units (ECUs) (3.1.7), that may be dynamically written or modified during execution
[SOURCE: NIST SP 800-53, modified - added "— The phrase “intended for installation on vehicles, vehicle
systems, or electronic control units (ECUs"])” was added.]
3.1.16
software update campaign
sequence of identifying targets (3.1.23) and resolving recipients (3.1.12); distributing software update
packages (3.1.20); and monitoring and documenting results of software update operations (3.1.19)
3.1.17
software update distribution method
mechanism for delivery of a software update package (3.1.20) during a software update campaign (3.1.16)
Note 1 to entry: The software update distribution method can be wired (e.g. tool, USB flash drive), wireless (e.g. cellular
or Wi-Fi) or hardware replacement.
Note 2 to entry: Hardware replacement can be replacing an ECUelectronic control unit (ECU) (3.1.7) with the effect of
software (3.1.15) version replacement.
3.1.18
software update engineering
application of a systematic and managed approach to the processes of planning, development, and
deployment of software update packages (3.1.20)
[SOURCE: ISO/IEC/IEEE 24765:2017, 3.3810, modified - changed "— “disciplined, quantifiable" to "” was
replaced by “and managed",”, and changed "“development, operation and maintenance of software" to "” was
replaced by “processes of development, planning, and deployment of software update packages"]”.]
3.1.19
software update operation
steps involved in receipt (3.2.1), installation (3.2.2),) and activation (3.2.3) of software update packages
(3.1.20) in a vehicle, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.20
software update package
set of software (3.1.15) and associated metadata that is intended to be deployed to one or more vehicles,
vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7)
3.1.21
software update project
4 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
set of software update engineering (3.1.18) activities for one or more targets (3.1.23)
Note 1 to entry: Activities can include developing or adapting the infrastructure (3.1.10), vehicle capabilities, or processes
described in this document.
Note 2 to entry: A software update project can encompass multiple software update campaigns (3.1.16).
3.1.22
tailor, verb
to omit or perform an activity in a different manner compared to its description in this document
[SOURCE: ISO/SAE 21434:2021, 3.1.32]
3.1.23
target
one or more classes of vehicles, vehicle systems (3.1.25), or electronic control units (ECUs) (3.1.7) determined
by vehicle configuration information (3.1.24)
3.1.24
vehicle configuration information
comprehensive accounting of hardware versions, software (3.1.15) versions, and configuration parameters in
a vehicle
3.1.25
vehicle system
functional group of one or more electronic control units (ECUs) (3.1.7) and attached hardware
Note 1 to entry: Attached hardware can be, for example, a sensor, actuator, or light, etc. that is not an ECU (3.1.7).
EXAMPLE Braking system or infotainment system.
3.1.26
vehicle user
person operating, driving, owning or managing a vehicle
Note 1 to entry: A vehicle user can be a skilled person (3.1.14).
3.2 Terms related to the software update operation
3.2.1
receipt
step in the software update operation (3.1.19) when a tool, vehicle, vehicle system (3.1.25), or ECUelectronic
control unit (ECU) (3.1.7) receives a software update package (3.1.20)
EXAMPLE 1 Downloading a software update package (3.1.20).
EXAMPLE 2 Transferring a software update package (3.1.20) using a tool.
3.2.2
installation
reserved
ISO/FDIS 24089:2022(E)
step in the software update operation (3.1.19) when the relevant parts of a software update package (3.1.20)
are written to a vehicle, vehicle system (3.1.25), or ECUelectronic control unit (ECU) (3.1.7) but are not yet
activated (3.2.3)
3.2.3
activation
step in the software update operation (3.1.19) when the relevant parts of an installed (3.2.2) software update
package (3.1.20) become executable on a vehicle, vehicle system (3.1.25), or ECUelectronic control unit (ECU)
(3.1.7)
EXAMPLE 1 A new automated driving function is installed (3.2.2) and ready for execution, but is only executed after the
vehicle user (3.1.26) starts the function.
EXAMPLE 2 The relevant parts of a software update package (3.1.20) for a vehicle, vehicle system (3.1.25),, or ECU
(3.1.7) are installed (3.2.2) and executed immediately after activation without user interaction.
4 Organizational level requirements
4.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) establishing organization-specific rules and processes for software update engineering;
b) adopting quality management, functional safety management, and cybersecurity management for
software update engineering;
c) instituting and maintaining a continuous improvement process for software update engineering;
d) establishing an information sharing policy for software update engineering; and
e) performing an organizational audit for process compliance.
4.2 General
This clause covers the responsibility of the organization engaged in software update engineering to have
governance in place so that the processes for software update engineering can conform to the requirements
of this document. Governance includes compliance with required ISO standards as well as organizational
activities such as continuous improvement, information sharing, and supporting processes. This clause also
establishes auditing requirements for this document.
4.3 Requirements and recommendations
4.3.1 Governance
4.3.1.1 If the organization performs software update engineering activities, then this document applies.
4.3.1.2 The organization shall establish, document, and maintain rules and processes for software update
engineering to:
- — enable the implementation of the requirements of this document;
6 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
- — support the execution of the corresponding activities, including the assignment of resources and
responsibilities across all those involved in the software update engineering activities;
- — confirm conformance with the requirements of this document.
NOTE 1 These rules and processes cover vehicle systems that are affected by software update engineering activities.
NOTE 2 These rules and processes cover the infrastructure used for software update engineering activities.
EXAMPLE Process definitions, technical rules, guidelines, methods, and templates.
4.3.1.3 The organization shall establish, implement, and maintain software update engineering activities in
accordance with applicable content of:
- — ISO/SAE 21434;
- — ISO 26262-6;
- — ISO 26262-8.
NOTE Other parts of ISO 26262 series can provide guidance on how to identify applicable content and how to conform
with ISO 26262-6 and ISO 26262-8.
EXAMPLE ISO 26262-3 can be used to show that ISO 26262-6 is not applicable if the software update operation is
classification QM (quality management).
4.3.2 Continuous improvement
4.3.2.1 The organization shall establish, perform, and maintain a continuous improvement process for
software update engineering activities.
EXAMPLE 1 Evaluating, applying, and communicating lessons learned.
EXAMPLE 2 Improvements from previous or similar software update projects, field monitoring and observations.
EXAMPLE 3 Key performance indicator (KPI) for continuous improvement process is the number of failures.
4.3.2.2 The organization shall establish, perform, and maintain a process to verify that after any change to its
software update engineering processes, the processes still meet the requirements of this document.
4.3.3 Information sharing
4.3.3.1 The organization shall establish, perform, and maintain a policy for sharing information both inside
and outside the organization concerning software update engineering activities.
NOTE The policy can include what information is shared, with whom the information is shared, when the information
is shared, and how to permit sharing of information.
EXAMPLE Information being shared can include:
- — schedule for the software update campaign;
- — content description;
reserved
ISO/FDIS 24089:2022(E)
- — possible implication of the software update campaign including safety or cybersecurity-relevant items;
- — duration the vehicle or its functions are unavailable;
- — reason for the software update campaign;
- — treatment of sensitive or personal information;
- — documentation about the software update campaign;
- — license and intellectual property information.
4.3.4 Supporting processes
4.3.4.1 The organization shall establish, implement, and maintain a document management process for
software update engineering activities to handle the work products required by this document.
EXAMPLE IATF 16949 can be applied.
4.3.4.2 The organization shall establish, implement, and maintain a requirements management process for
software update engineering activities.
EXAMPLE ISO/IEC 26551.
4.3.4.3 The organization should consider privacy implications of the activities required by this document.
NOTE Activities in this document can involve personal information.
EXAMPLE 1 Information on privacy can be found in ISO/IEC 27701 and ISO/IEC 29100.
EXAMPLE 2 Customer personally identifiable information included in software update campaigns.
4.3.4.4 The organization shall establish, implement, and maintain a configuration management process.
NOTE Software update engineering activities involve configuration information for software update packages,
vehicles, and infrastructure.
EXAMPLE 1 ISO 10007 can be used for a configuration management process.
EXAMPLE 2 ISO/IEC/IEEE 15288 can be applied for configuration management on system life cycle management.
4.3.4.5 The organization shall establish, implement, and maintain a quality management process for software
update engineering activities.
EXAMPLE 1 IATF 16949, ISO 9001 and ISO/IEC 25000 can be used for quality management process.
EXAMPLE 2 Maintenance of the infrastructure.
4.3.4.6 The organization shall establish, implement, and maintain a change management process for software
update engineering activities.
EXAMPLE ISO 9001 can be used for change management process.
8 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
4.3.5 Auditing
4.3.5.1 An audit shall be performed to determine that the organizational processes for software update
engineering achieve the objectives of this document.
NOTE 1 Such an audit can be included in, or combined with, an audit according to a quality management system
standard.
NOTE 2 The audit can be performed by an internal or external organization.
NOTE 3 To ensure the organizational processes remain appropriate for software update engineering, an audit can be
performed periodically.
NOTE 4 In a distributed development, right to audit can be included in the contract.
4.4 Work products
4.4.1 Organizational rules and processes resulting from the requirements of 4.3.1.1, 4.3.1.2, 4.3.4.1, 4.3.4.3,
4.3.4.4, 4.3.4.5, and 4.3.4.6.
4.4.2 Records of organizational management resulting from the requirements of 4.3.1.3, 4.3.4.2, and 4.3.4.5.
4.4.3 Documentation of continuous improvement resulting from the requirement of 4.3.2.1 and 4.3.2.2.
4.4.4 Information sharing policy resulting from the requirement of 4.3.3.1.
4.4.5 Audit report resulting from the requirement of 4.3.5.1.
5 Project level requirements
5.1 Objectives
The objectives of this clause are to ensure that the following are performed:
a) planning for a software update project, including assigning roles and responsibilities;
b) managing and storing of information regarding a software update project;
c) providing justifications for any tailoring of a software update project;
d) confirming interoperability of the infrastructure and the vehicle functions for a software update project;
and
e) preserving integrity of software, and either metadata , and/or software update packages, or both.
5.2 General
This clause covers organizational requirements for software update projects including planning for software
update projects, and managing information related to software update projects. In addition, this clause
includes requirements on tailoring software update projects and interoperability between the parts of
software update projects.
reserved
ISO/FDIS 24089:2022(E)
5.3 Requirements and recommendations
5.3.1 Project management
5.3.1.1 The organization shall develop, implement, and maintain a plan for each software update project that
covers all necessary activities.
NOTE 1 This plan can include activities involving the development and adaptation of vehicle or infrastructure functions,
as well as any process described in this document.
NOTE 2 A software update project can encompass multiple software update campaigns.
EXAMPLE A software update project for a vehicle model; a software update project for a vehicle system; a software
update project for a single type of ECU.
5.3.1.2 The organization shall manage and store documentation for each software update project.
NOTE Relevant processes are defined in 4.3.4.1 and 4.3.4.2.
5.3.1.3 The organization shall establish, assign, and maintain the roles and responsibilities for each software
update project.
NOTE Documentation of roles and responsibilities can be included in the plan in 5.3.1.1.
EXAMPLE A software update engineering responsibility is assigned to a department.
5.3.2 Tailoring and rationale
5.3.2.1 A software update project may be tailored.
EXAMPLE 1 A tailored software update project identifies applicable content of ISO26262ISO 26262-6,
ISO26262ISO 26262-8 and ISO/SAE 21434 in the context of software update engineering activities.
EXAMPLE 2 A body builder tailors a software update project to conform with functional safety standards such as either
ISO 13849 or the IEC 61508 series, or both.
5.3.2.2 If a software update project is tailored, then a rationale shall be provided as to how the tailored
activities achieve the applicable objectives of this document.
NOTE 1 An activity is tailored if it is omitted or performed in a different manner compared to its description in this
document.
NOTE 2 Software update engineering activities in this document that are performed by another entity in the supply
chain are considered distributed activities rather than tailored activities.
EXAMPLE 1 Distributed cybersecurity activities under ISO/SAE 21434.
NOTE 3 The organization can consult with their suppliers on which clauses of this document are applicable to the
supplier’s work.
EXAMPLE 2 A supplier creates a new version of software for an organization to distribute to a vehicle.
10 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
5.3.3 Interoperability
5.3.3.1 The organization shall establish, implement, and maintain a process to confirm the interoperability
of the functions developed in accordance with the requirements from Clause 6 and Clause 7.
NOTE Since the infrastructure and the vehicle system can be implemented separately, it is important to confirm the
interoperability between them to achieve a successful software update campaign.
EXAMPLE Maintenance of the infrastructure for preserving interoperability.
5.3.4 Integrity
5.3.4.1 The organization shall establish, implement, and maintain processes to preserve the integrity of
software, and either metadata , and/or software update packages, or both, during distribution in the context
of interoperability:
- — within the infrastructure of organizations;
- — between organizations within the supply chain;
- — from organizations to vehicles;
- — within the vehicle and between vehicle systems.
NOTE 1 The organization distributing software to vehicles can be an OEM, a supplier, or other authorisedauthorized
entity.
NOTE 2 The risk-based approaches in ISO/SAE 21434 and the ISO 26262 series can be used to select measures to
preserve integrity.
5.4 Work products
5.4.1 Software update project plan resulting from the requirements of 5.3.1.1 and 5.3.1.3.
5.4.2 Documentation of software update project resulting from the requirement of 5.3.1.2.
5.4.3 Rationale for tailored activities, if applicable, resulting from the requirement of 5.3.2.2.
5.4.4 Documentation of confirmation of interoperability resulting from 5.3.3.1.
5.4.5 Documentation of processes to preserve integrity from 5.3.4.1.
6 Infrastructure level requirements
6.1 Objectives
The objectives of this clause are to ensure that the following are developed:
a) management of cybersecurity risks for the infrastructure;
b) functionality for collecting and managing vehicle configuration information for the infrastructure;
reserved
ISO/FDIS 24089:2022(E)
c) functionality for collecting and distributing information about software update campaigns; and
d) functionality for creating, managing, and distributing software update packages.
6.2 General
This clause includes the requirements for the development of infrastructure that is used for software update
campaigns. The requirements cover the functions that are assigned to the infrastructure for the software
update campaigns, such as distribution, communication, information storage, and cybersecurity. Functions
described in this clause support the software update campaigns in the infrastructure. Such functions can be
on or off the vehicle depending on the architectural decisions of the organization.
6.3 Requirements and recommendations
6.3.1 Managing risk
6.3.1.1 The organization shall manage the cybersecurity risks of the infrastructure.
EXAMPLE 1 Application of the ISO/IEC 27000 series of standards.
EXAMPLE 2 Application of ISO/SAE 21434 for cybersecurity risks in the vehicle.
6.3.2 Managing vehicle configuration information
6.3.2.1 The infrastructure shall have one or more functions for receiving, storing, and processing of vehicle
configuration information.
6.3.2.2 The infrastructure shall have one or more functions to maintain the integrity of the collected vehicle
configuration information.
6.3.2.3 The infrastructure shall have one or more functions to distribute vehicle configuration information
to related parties.
NOTE 1 Distribution functions can be manual (i.e. paper-based).
NOTE 2 Vehicle configuration information can be distributed before, during, or after a software update campaign.
EXAMPLE Vehicle configuration information is distributed to regulatory entities or suppliers.
6.3.2.4 The infrastructure shall have one or more functions to support the identification of dependencies for
software update packages.
NOTE 1 This can be done on the vehicle or in the infrastructure or a combination of both.
NOTE 2 This function is used in Clause 8.
EXAMPLE 1 Dependencies that affect intelligent traffic systems or communication with consumer devices.
EXAMPLE 2 Dependencies that affect electric vehicle charging or map data processing.
12 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
6.3.2.5 The infrastructure shall have one or more functions to check compatibility of a software update
package.
6.3.3 Communicating software update campaign information
6.3.3.1 The infrastructure shall have one or more functions to provide notifications as required by this
document.
NOTE 1 This infrastructure notification function can be used to notify vehicle users instead of an in-vehicle notification
function.
NOTE 2 These functions support notification requirements in Clause 9.
6.3.3.2 The infrastructure shall have one or more functions to receive, store, process, and distribute results
of software update campaigns.
NOTE See requirements concerning results of software update campaigns in Clause 9.
EXAMPLE The infrastructure receives success or failure from vehicles during a software update campaign.
6.3.4 Processing software update packages
6.3.4.1 The infrastructure shall have one or more functions to create, process, receive, and store software
update packages.
EXAMPLE The infrastructure receives a software update package from another organization in the supply chain.
6.3.4.2 The infrastructure shall have one or more functions to associate software update packages with
targets.
6.3.4.3 The infrastructure shall have one or more functions to resolve targets into recipients for software
update campaigns.
6.3.4.4 The infrastructure shall have one or more functions to support software update distribution methods.
6.3.4.5 The infrastructure should have one or more functions to determine whether there are sufficient in-
vehicle resources to apply the software update package to the recipients.
6.3.4.6 The infrastructure shall have one or more functions to maintain the integrity of software update
packages and their contents:
- — within the infrastructure; and
- — from the infrastructure to vehicles.
6.3.4.7 The infrastructure should have one or more functions to initiate actions if the infrastructure is
notified of the failure of a software update operation.
NOTE A software update operation failure can be mitigated either by functions in the vehicle or by a skilled person, or
both.
EXAMPLE Infrastructure sends notice of failure to dealership or local mechanic to pick up the vehicle.
reserved
ISO/FDIS 24089:2022(E)
6.4 Work products
6.4.1 Documentation of managing cybersecurity risk resulting from 6.3.1.1.
6.4.2 Documentation of functions for managing vehicle configuration information resulting from 6.3.2.1 to
6.3.2.5.
6.4.3 Documentation of functions for performing software update campaigns resulting from 6.3.3.1 and
6.3.3.2.
6.4.4 Documentation of functions for processing software update packages resulting from 6.3.4.1 to 6.3.4.6.
6.4.5 Documentation of functions for performing actions in the event of software update operation failure
resulting from 6.3.4.7.
7 Vehicle and vehicle systems level requirements
7.1 Objectives
The objectives of this clause are to establish the following functionality in and for vehicles or vehicle systems:
a) managing safety and cybersecurity risks for software update operations;
b) managing vehicle configuration information;
c) communicating software update campaign information; and
d) enabling software update operations, verifying software update packages, and managing failures during
software update campaigns.
7.2 General
This clause contains the requirements for the functions needed for vehicles and vehicle systems to support
software update campaigns. These functions include communications, generating necessary vehicle
configuration information, and enabling software update operations in vehicles.
Functions described in this clause support the software update operation in the vehicle. Such functions can be
implemented in one or both of the vehicle and the infrastructure depending on the architectural decisions of
the organization.
7.3 Requirements and recommendations
7.3.1 Managing risks
7.3.1.1 Functional safety risks of software update operations in the vehicle shall be managed.
NOTE 1 Management includes identification, analysis, evaluation, and treatment of risks.
NOTE 2 The ISO 26262 series provides guidance on achieving functional safety through appropriate requirements and
processes.
14 © ISO 2022 – All rights reserved
ISO/FDIS 24089:2022(E)
EXAMPLE 1 An OEM performs an assessment of potential safety impacts of a software update package for a brake
system and decides, based on that assessment, whether a skilled person is necessary for the software update operation.
EXAMPLE 2 The architecture of the vehicle and the bo
...


















Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...