Typical cyber threats in agricultural technology
- Remote access to networked machines: Unauthorised remote access to tractors or combine harvesters can lead to the manipulation of vehicle settings (e.g. dosage of pesticides, driving speed), the theft of sensitive operating data or the paralysis of the machine.
- GPS spoofing and jamming: Manipulation of position data in precision farming applications can lead to massive crop failures, incorrect sowing or inefficient fertilisation.
- Sabotage of autonomous field robots: Autonomous systems rely on correct sensor technology and control signals. Compromising these can lead to malfunctions, collisions or destruction of cultivated areas.
- Data theft and manipulation: Yield data, soil data, machine configurations – this information is valuable and a sought-after target for attackers.
- Manipulation of software updates: Malware introduced via insecure update processes can enable control over entire fleets.
This makes it clear that ‘classic safety’, i.e. functional safety, which is primarily concerned with protection against malfunctions and failures, is no longer sufficient. Cybersecurity addresses deliberate manipulation by attackers and requires its own specialised approach.
The agricultural sector is part of critical infrastructure – availability and reliability are top priorities. This is precisely where ISO 24882 comes in: it explicitly takes operational continuity into account.
What manufacturers need to bear in mind in the context of ISO 24882
ISO 24882 requires manufacturers to consider cybersecurity as an integral part of the entire product life cycle – from design and development to production, maintenance and decommissioning. Key aspects are:
- Establish a Cybersecurity Management System (CSMS): Similar to the requirements in the automotive industry (according to ISO/SAE 21434), organisations must define and implement processes and responsibilities for managing cybersecurity risks. This includes risk analyses, security concepts, test strategies and incident response plans.
- Performing risk analyses (e.g. TARA): Systematic threat analysis and risk assessment (TARA) is essential for identifying potential threats and vulnerabilities and evaluating their risks. Concrete security measures are derived from this.
- Security requirements throughout the product life cycle: From secure coding practices in software development to secure communication interfaces and secure over-the-air (OTA) update mechanisms (Software Update Management System, SUMS) – especially with OTA, we know from experience that updates can be installed during field use, which can lead to unplanned machine downtime – sometimes with serious operational consequences. Security and availability must be considered simultaneously.
- Documentation and verification requirements: The standard requires comprehensive documentation of the analyses performed, measures taken and verified security features. This serves not only for internal quality assurance, but also as evidence for third parties.
- Competence building and awareness raising: Employees must be trained and made aware of cybersecurity issues so that they can take security aspects into account in their daily work.
Our experience from the automotive world for agricultural technology
At msg, we have many years of in-depth experience working with leading automotive and commercial vehicle manufacturers (OEMs) and suppliers. We have accompanied and helped shape the evolution of vehicle software and the growing requirements for functional safety and cybersecurity from the very beginning.
We apply this expertise precisely to the requirements of ISO 24882 in agricultural technology:
Proven methods such as TARA, HARA (Hazard Analysis and Risk Assessment), Secure Coding Guidelines, Model-Based Systems Engineering (MBSE), a model-based development approach for specifying safe systems, and the implementation of robust CSMS and SUMS processes are all part of our service portfolio.
We understand the complexity of modern vehicle architectures, know how to integrate safety systematically and efficiently without slowing down the pace of innovation, and can look back on successful audits that we have prepared with our customers.