European Tier-1 Supplier — 4 Domain-Controller ECUs, 1 Global EV SUV Program
Engineered to ISO/SAE 21434, UNECE R155, and GB 44495 from a single ThreatZ knowledge graph. Customer name and OEM identity withheld at the customer's request; all metrics below are extracted directly from the customer's ThreatZ tenant.
- Vehicle
- B-segment EV SUV
- Global program — EU, China, ROW
- OEM customer
- Premium European OEM
- Single OEM, multi-region SOP
- Tier-1 scope
- 4 domain controllers
- CGW · VDC · ADC · BMS
- Compliance regimes
- ISO/SAE 21434 · R155 · GB 44495
- 21434 process assessed at the Tier-1; the OEM holds the R155 CSMS certificate with KBA
- Sub-tier suppliers
- 23 onboarded
- SoC, OS, AUTOSAR stacks, V2X, sensors
- Engineering team
- 22 engineers
- 4 cyber leads + 18 ECU embedded engineers
- Project award
- 2024-Q2
- ThreatZ adopted 2024-09
- Start of production
- 2026-Q4 (target)
- Type-approval submission 2026-Q2
A central gateway routes all backbone traffic between three domain controllers (vehicle, ADAS, body) and isolates the high-voltage battery domain over a private CAN-FD link. The Tier-1's scope covers all four ECUs plus the cellular, V2X, and high-power charging interfaces. Buses shown: Automotive Ethernet 1000BASE-T1 backbone (solid teal), CAN-FD (dashed grey), private CAN-FD HV-isolation link (dotted cyan).
The four domain controllers had to ship with a synchronised cybersecurity case to the OEM's CSMS auditor: a single TARA covering all four ECUs and their interactions, threat-driven security requirements traceable to test evidence, SBOM coverage of every binary across 23 sub-tier suppliers, and continuous CVE monitoring through SOP and into series production. The previous approach — a TARA spreadsheet per ECU plus a shared Polarion module for requirements — created four siloed views that missed cross-ECU attack chains and produced inconsistent evidence between the ISO/SAE 21434 audit and the R155 / GB 44495 type-approval packs.
ThreatZ Enterprise was deployed eight weeks after architecture freeze. ARXML, DBC, and SysML XMI exports from the four ECU teams were imported in a single 3-day workshop, producing a unified system model with 1,840 signals across the four buses shown above. The TARA was performed once across all four ECUs together, with the AI-assist surfacing 14 cross-ECU attack paths the per-ECU TARAs had missed. Sub-tier SBOMs flowed in via the supplier portal in CycloneDX (preferred) or SPDX, normalised to a single internal representation. The same underlying knowledge graph generated three distinct evidence packs — ISO/SAE 21434 work-product set, UNECE R155 type-approval annex, and GB 44495 cybersecurity report — with section-by-section traceability.