WP 29 Cybersecurity Beyond Europe: What Global Automotive OEMs Must Do Next

WP 29 Cybersecurity Beyond Europe: What Global Automotive OEMs Must Do Next

When UNECE WP.29 cybersecurity regulations came into force, many automotive manufacturers initially viewed them as a European compliance requirement. In 2025, that perspective is no longer sufficient. WP.29 has become a global benchmark, influencing how connected vehicles are designed, secured, and maintained throughout their lifecycle. The regulation has a profound impact on the entire automotive sector, shaping cybersecurity practices and compliance requirements across multiple countries worldwide.

The WP.29 regulation was formally adopted by the United Nations world forum on June 25, 2020, after two years of preparations and revisions.

For OEMs operating across multiple regions, the challenge is no longer how to comply with WP.29 in Europe, but how to apply its principles consistently across global vehicle fleets. As of July 2024, these regulations are mandatory for all new vehicles produced in over 60 countries, including the EU, UK, Japan, and South Korea. The answer lies in treating cybersecurity as a lifecycle discipline built on strong, automated identity management.

Introduction to the Automotive Industry and WP 29

The automotive industry is experiencing a profound shift as connected, autonomous, and electric vehicles become the new standard. This transformation brings unprecedented opportunities, but also introduces complex cybersecurity challenges that threaten vehicle security and global vehicle safety. As vehicles become more reliant on software and connectivity, the risk of cyber threats—such as vehicle hacking, data breaches, and attacks on critical systems—grows exponentially.

To address these emerging risks, the United Nations Economic Commission for Europe (UNECE) established the WP.29 regulation, setting a new benchmark for cybersecurity management in the automotive ecosystem. WP.29 requires automotive manufacturers to implement a comprehensive Cybersecurity Management System (CSMS) that proactively identifies, manages, and mitigates cybersecurity risks throughout the entire vehicle lifecycle. This regulation is designed to protect consumers, ensure the safety and privacy of vehicle data, and maintain trust in the rapidly evolving automotive industry.

For automotive manufacturers, establishing a robust CSMS is no longer optional—it is essential for safeguarding vehicles against cyber threats and ensuring compliance with international standards. As electric vehicles and connected technologies become more prevalent, WP.29 serves as a critical framework for managing cybersecurity challenges and protecting the future of mobility.

What WP.29 Really Requires

At its core, WP.29 requires manufacturers to demonstrate that cybersecurity risks are identified, managed, and mitigated across the entire vehicle lifecycle. The key principles of WP.29 provide a foundational, flexible framework for compliance, focusing on processes, governance, continuous risk management, and lifecycle security rather than prescribing specific technical measures. This includes design, development, production, operation, and decommissioning.

Unlike traditional automotive standards, WP.29 explicitly addresses cyber threats arising from connectivity. Vehicles are no longer isolated mechanical systems; they are software-defined platforms that communicate continuously with backend services, infrastructure, and other vehicles.

To meet WP.29 requirements, OEMs must show that they can control which systems and devices are trusted, how access is granted, and how risks are addressed when conditions change. WP.29 mandates the establishment of a Cybersecurity Management System (CSMS) and a Software Update Management System (SUMS) for vehicle manufacturers, ensuring formalized processes for managing cybersecurity and software updates throughout the vehicle lifecycle. These cybersecurity requirements are part of broader vehicle regulations that apply to specific vehicle categories, including M, N, and O, and have been extended to motorcycles and electric bicycles as of January 2024. Non-compliance with WP.29 regulations can lead to the denial of type approval for vehicles, impacting manufacturers’ ability to sell in certain markets.

Why WP.29 Has Global Impact

Although WP.29 originated in Europe, its influence extends far beyond EU borders. Many global OEMs build vehicles for multiple markets using shared platforms and architectures. Implementing different security models for different regions is costly, complex, and risky.

India’s automotive market is one of the world’s largest and fastest digitizing. India’s evolving regulations increasingly mirror and intensify WP.29 principles, driving the adoption of robust cybersecurity frameworks and best practices across the industry. Similarly, China’s influence on vehicle cybersecurity is significant due to its enormous domestic market and strong regulatory stance on data protection. China has introduced sweeping requirements for managing supply chain and third-party suppliers to ensure overall security.

As a result, WP.29 has become a de facto global standard. Regulators in other regions are aligning their expectations with its principles, and customers increasingly expect consistent security regardless of where a vehicle is sold. Regulators in India and China now expect continuous assurance in automotive cybersecurity, not static documentation. The regulatory changes in India and China are introducing new cybersecurity challenges that require updated cybersecurity frameworks to address emerging threats.

For OEMs, this means that WP.29 compliance is no longer optional or regional—it is foundational.

The Vehicle Lifecycle Security Challenge

One of the most significant implications of WP.29 is its emphasis on lifecycle security. Vehicles may remain in service for 10 to 15 years, during which time threats, software, and connectivity models evolve.

OEMs must be able to securely onboard vehicles during production, authenticate them throughout their operational life, and manage updates and access over time. Vehicle cybersecurity must be maintained continuously throughout the vehicle’s lifecycle to adapt to evolving threats and regulatory requirements. As new vulnerabilities and threats emerge, OEMs must implement processes to mitigate risks and ensure ongoing protection. When vulnerabilities are discovered, trust must be adjusted quickly and reliably.

Continuous monitoring and vulnerability management are necessary to maintain a vehicle’s cybersecurity integrity post-production.

This is impossible without automated processes that can operate at the scale of modern vehicle fleets.

Machine Identity as the Backbone of Vehicle Security

In connected vehicles, every electronic control unit, gateway, and backend service represents a machine identity. These identities authenticate communications, authorise updates, and enforce policy.

WP.29 implicitly depends on the ability to manage these identities securely. Without unique, verifiable identities, OEMs cannot demonstrate control over vehicle communications or enforce least-privilege access. To comply with WP.29, OEMs and their suppliers must develop secure automotive products in line with relevant standards such as ISO/SAE 21434, ensuring that cybersecurity measures meet industry regulations.

Automated machine identity management provides the foundation for secure vehicle-to-cloud and vehicle-to-infrastructure interactions, supporting both security and compliance.

Over-the-Air Updates and Trust Management

Over-the-air updates are now standard in modern vehicles, enabling OEMs to deploy new features and security fixes remotely. Regular software updates for vehicle software are essential to maintain security, functionality, and compliance with regulations such as WP.29. However, OTA updates also introduce risk if trust is not managed correctly.

WP.29 requires manufacturers to ensure that updates are authentic, authorised, and protected against tampering. Secure boot mechanisms are essential for ensuring the integrity and authenticity of software updates and protecting against unauthorized modifications to vehicle software, especially within critical components like infotainment systems and ECUs. Software Update Management Systems (SUMS) are critical for ensuring secure and compliant management of over-the-air updates for vehicles. This depends on robust identity verification and secure key management.

Automating these processes reduces the risk of human error and ensures that updates can be deployed quickly without compromising safety.

Managing Supply Chain and Third-Party Risk

Modern vehicles rely on complex supply chains, with software and components sourced from multiple vendors. The automotive supply chain spans thousands of components and dozens of suppliers, necessitating robust cybersecurity measures for automotive companies. WP.29 extends accountability to these relationships, requiring OEMs to manage cybersecurity risk across suppliers. OEMs are increasingly responsible for managing the trust and security of their supply chains, including third-party suppliers, and data protection is a key concern. Suppliers are mandated to adhere to cybersecurity best practices in the design and development of their components. The regulation delineates clear expectations for Tier 1 and Tier 2 suppliers, underscoring their pivotal role in the cybersecurity ecosystem.

Identity-based security enables OEMs to control how third-party components authenticate and interact with vehicle systems. Compromised or non-compliant components can be isolated or restricted without affecting the entire fleet.

This granular control is essential for managing supply chain risk at scale.

Implementing UNECE WP 29 Regulations and Type Approval

Successfully implementing UNECE WP 29 regulations is a pivotal step for automotive manufacturers aiming to achieve regulatory compliance and maintain a competitive edge in the global market. WP.29 mandates the establishment of both a Cybersecurity Management System (CSMS) and a Software Update Management System (SUMS), ensuring that cybersecurity risks are managed and vehicle security is maintained across the entire vehicle lifecycle.

A key component of WP.29 compliance is the type approval process, which verifies that vehicles meet all regulatory requirements, including stringent cybersecurity standards. Without type approval, manufacturers cannot legally sell vehicles in regulated markets, making compliance a business-critical priority. The process involves rigorous risk assessment, threat modeling, and the implementation of continuous monitoring to detect and mitigate cyber threats as they arise.

To meet these regulatory requirements, automotive manufacturers must adopt a lifecycle approach to cybersecurity—one that encompasses design, production, operation, and post-production phases. This includes integrating secure communication protocols, robust risk assessment methodologies, and ongoing monitoring to ensure that vehicles remain protected against evolving threats. By implementing a comprehensive CSMS and SUMS, manufacturers not only achieve compliance with UNECE WP 29 but also strengthen their security posture, protect their brand reputation, and deliver safer vehicles to consumers worldwide.

Beyond Compliance: Competitive Advantage

While WP.29 is often framed as a regulatory burden, it also presents an opportunity. OEMs that implement robust, automated cybersecurity architectures can differentiate themselves on trust, safety, and reliability.

Consumers and fleet operators increasingly consider cybersecurity as part of vehicle quality. Demonstrating compliance and resilience can become a competitive advantage, particularly as connectivity and autonomy increase.

Preparing for What Comes Next

WP.29 is unlikely to be the last regulation of its kind. As vehicles become more autonomous and connected, cybersecurity expectations will continue to evolve.

OEMs that invest now in scalable, identity-driven security architectures will be better positioned to adapt to future requirements without major redesigns.

This forward-looking approach reduces long-term cost and risk while supporting innovation.

Final Thoughts

WP.29 has fundamentally changed how automotive cybersecurity is approached. It has elevated security from a technical concern to a lifecycle responsibility that spans design, production, operation, and beyond.

For global OEMs, the path forward lies in adopting automated, identity-first security models that can scale across regions and vehicle generations. Compliance, security, and innovation are no longer separate goals—they are interdependent.

Platforms developed by companies such as Device Authority are designed to support this lifecycle approach, helping automotive manufacturers meet WP.29 requirements while building resilient, future-ready connected vehicle ecosystems.