Summary of "UN Regulation No. 155 is in force: Requirements affecting the supply chain [Full Recorded Webcast]"

UN Regulation No. 155 (UNR155) requires a Cyber Security Management System (CSMS) and an organizational Certificate of Compliance (CoC) as prerequisites for vehicle type approval. This materially changes commercial, legal and supplier relationships across the automotive supply chain.

High-level summary (business focus)

Key frameworks, standards and reference documents (playbook)

Typical CSMS playbook (recommended sequence)

  1. Current-state assessment / gap analysis vs. UNR155 and ISO/SAE 21434.
  2. Define scope (which vehicles, items, lifecycle phases).
  3. Create prioritized action plan (process design, roles, tooling).
  4. Implement CSMS (process owners, production control plans, item definitions).
  5. Pilot for one project/vehicle type, train stakeholders, iterate.
  6. Internal audit and readiness checks.
  7. Undergo CoC audit by a technical service; obtain CoC → apply for type approval.
  8. Continuous improvement and CoC renewal cycles.

Requirements, processes and organizational tactics (operational detail)

Lifecycle coverage

Vehicle-level requirements

Penetration testing

Supplier management

TARA and artifact practices

Post-production lifecycle and support

Certifications & audits

KPIs, timelines and numeric targets referenced

Concrete examples & operational cases

Actionable recommendations (what companies should do now)

Immediate steps for any company (OEM or supplier)

  1. Run an urgent current-state assessment vs. UNR155 and ISO/SAE 21434.
  2. Define which vehicle types/items and lifecycle phases are in scope.
  3. Build a prioritized remediation/action plan with timelines tied to OEM product launches and regulatory deadlines.
  4. Implement a CSMS covering lifecycle, supplier management and incident response; designate process owners and users.
  5. Run internal audits and pilot projects to validate processes before technical-service audit.
  6. Prepare artifacts for TARA, verification/validation, penetration tests and supplier evidence packages.
  7. Negotiate supplier contracts to clarify lifecycle support obligations and contractual evidence requirements to avoid open-ended exposure.

Supplier-specific tactics

Competency mix recommended

Risk & strategic considerations for leadership

Tools, documents and training resources cited

Presenters / sources

Category ?

Business


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video