{"id":105353,"date":"2025-07-24T08:37:50","date_gmt":"2025-07-24T08:37:50","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=105353"},"modified":"2025-08-18T09:41:14","modified_gmt":"2025-08-18T09:41:14","slug":"access-control-in-autosar","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","title":{"rendered":"Access control in AUTOSAR"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"105353\" class=\"elementor elementor-105353\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57fa48a gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57fa48a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d55f79 gg-tablet-view\" data-id=\"7d55f79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cce7a0b gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"cce7a0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the age of <a href=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/software-defined-vehicle\/\">Software-Defined Vehicles (SDV) <\/a>\u00a0and <a href=\"https:\/\/expleo.com\/global\/en\/insights\/campaigns\/autonomous-driving-adas\/\">autonomous driving<\/a>, vehicles are no longer isolated machines. They are interconnected systems that continuously communicate with cloud platforms, mobile apps, and other vehicles. This will increase also the feasibility for cybersecurity attack. AUTOSAR, is as a major software architecture platform for automotive and provides a framework and the building blocks to address various security aspects, including cryptography, secure communication, access control, intrusion detection, and others.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-007a007 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"007a007\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The blog article gives an overview of how access control features such as IAM, SOME\/IP-ACL, and firewall integration could be part of a comprehensive security strategy of AUTOSAR developers and OEMs. \u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e21643 elementor-widget elementor-widget-image\" data-id=\"4e21643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-1024x576.jpg\" class=\"attachment-large size-large wp-image-105356\" alt=\"A smartphone screen displays &quot;AUTOSAR Access Control&quot; with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured-768x432.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b48c41 gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"7b48c41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding access control in AUTOSAR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a033952 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"a033952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the AUTOSAR ecosystem &#8211; both Classic and Adaptive platforms &#8211; access control mechanisms are being expanded and refined to meet the needs of SDVs, connected and autonomous vehicles.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4901856 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"4901856\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These mechanisms ensure that only trusted entities can access critical services and data, preventing unauthorized access and privilege escalation, both of which can have serious safety and operational implications.<\/p><p>Access control refers to the policies and mechanisms that govern which users or systems can access specific data, services, or APIs &#8211; and under what conditions. AUTOSAR supports a layered approach to access control, allowing it to be enforced locally at the application level, at the service interface, or even at the network edge. Three major features stand out: <strong>Identity and Access Management (IAM)<\/strong>, <strong>SOME\/IP-ACL<\/strong>, and <strong>Firewall integration<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8a197b gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"f8a197b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and access management (IAM) on AUTOSAR Adaptive<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdaae99 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"cdaae99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>IAM is the core access control mechanism for the AUTOSAR Adaptive platform.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ef4154 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"2ef4154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is designed to regulate how applications &#8211; either running locally on the same ECU or remotely over the network &#8211; access critical services and resources.<\/p><p>This process begins at design time, where application developers define their intended access needs using the \u2018GrantDesign\u2019 model. These access intents are reviewed during integration, where system integrators decide whether to accept them and create explicit grant entities in the deployment model. Grants specify both the subject (an application or process) and the object (the service or resource it wants to access), forming a tightly controlled access relationship.<\/p><p>IAM supports both <strong>local access control<\/strong>, which governs how processes interact with services on the same ECU, and <strong>remote access control<\/strong>, when the subject application and object service are on different ECUs and the communication will go through the network, which requires robust authentication mechanisms such as TLS or IPsec to authenticate the identity of the communication partner (other ECUs) and then authorize or not the access based on the defined policy.<\/p><p>In addition, IAM plays a vital role in <strong>cryptographic key management<\/strong>. Keyslots &#8211; logical containers for cryptographic keys &#8211; can be shared among multiple users or dedicated to a single owner. IAM defines and enforces which application can use which keyslot, and under what constraints, adding another layer of protection around sensitive cryptographic operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f4c7ac gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"2f4c7ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Service-oriented access control with SOME\/IP-ACL<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4fc69f gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"d4fc69f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>On the Classic platform, AUTOSAR leverages SOME\/IP-ACL (Access Control List) to restrict which communication partners can interact with specific services.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f500de4 elementor-widget elementor-widget-text-editor\" data-id=\"f500de4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>SOME\/IP is the backbone of service-oriented communication in AUTOSAR Classic, and without proper access control, it could become a gateway for unauthorized or malicious access.<\/p><p>SOME\/IP-ACL works by associating each service instance with a list of approved IP addresses. When a service receives a request &#8211; such as a subscription to an event group &#8211; it checks whether the requesting client is on its ACL. If not, the request is ignored and logged as a potential security incident.<\/p><p>This dynamic policy enforcement ensures that only trusted ECUs can participate in this service communication, even if another node on the network has been compromised. Authentication mechanisms such as port-based checks, IPsec, or MACsec further strengthen the identity verification of each communication partner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d621df5 gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d621df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Firewall integration across platforms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-907b74f gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"907b74f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Firewalls play a complementary role in access control by managing traffic at the network level.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18aa66b elementor-widget elementor-widget-text-editor\" data-id=\"18aa66b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In AUTOSAR, firewall functionality can be implemented on both Adaptive and Classic platforms and even deployed on smart switches equipped with dedicated processing units.<\/p><p>Firewall support a variety of inspection techniques &#8211; stateless, stateful, and deep packet inspection &#8211; to enforce granular communication rules. Firewall can allow or block traffic based on predefined criteria, filter messages depending on the vehicle\u2019s operational state, or rate-limit excessive data to prevent denial-of-service scenarios.<\/p><p>In the Adaptive platform, the firewall is managed through a dedicated function cluster (ara::fw), which reads configuration data from the machine manifest and configures the firewall engine and raises alerts for any suspicious activity. On the Classic side, the firewall integrates with modules like LSduR (for packet inspection), BswM (for vehicle state management), and IdsM (to report security events).<\/p><p>These firewalls also support standard ARXML-based configuration, allowing developers to model filter rules using AUTOSAR-compliant tools and generate allowlists directly from the communication matrix.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d66b64a gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d66b64a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The AUTOSAR road ahead<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f88a638 elementor-widget elementor-widget-text-editor\" data-id=\"f88a638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As SDVs continue to evolve, the importance of structured, multi-layered access control will only grow.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c4ca61 gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"2c4ca61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>IAM, SOME\/IP-ACL, and firewall integration are not just isolated features &#8211; they form a comprehensive defence-in-depth strategy that addresses access control from the application layer to the hardware level.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60862c6 elementor-widget elementor-widget-text-editor\" data-id=\"60862c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Expleo, we are proud to be actively contributing to the development of these technologies as <a href=\"https:\/\/www.autosar.org\/about\/partners\/premium-partner\">AUTOSAR premium partner<\/a> through our participation in <a href=\"https:\/\/www.autosar.org\/working-groups\/cross-standard\">AUTOSAR Lead Working Group Security (WG-SEC)<\/a>. With deep domain expertise in embedded software development and a global presence, we support OEMs and suppliers in integrating these security features into production systems &#8211; helping shape the secure, connected, and autonomous vehicles of tomorrow.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d03960a gg-font-v4 gg-custom-dark-purple-color elementor-widget elementor-widget-heading\" data-id=\"d03960a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to learn more about how Expleo can support your SDV and AD &amp; ADAS development? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a607cf gg-font-v9 gg-class-for-iphone8  elementor-widget elementor-widget-text-editor\" data-id=\"7a607cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Let\u2019s talk about how we can help bring your platform up to compliance &#8211; and ahead of the curve.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcaf49 elementor-widget elementor-widget-embed-pardot-form\" data-id=\"8dcaf49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"embed-pardot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gg-embed-pardot-form\">\n            <iframe src=\"https:\/\/go.expleo.com\/l\/997821\/2025-07-17\/3k75g\" style=\"width: 100%; border: none;\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" class=\"g-analytics-pardot-form\"><\/iframe>        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Securing the future of Software-Defined Vehicles and autonomous driving<\/p>\n","protected":false},"author":81,"featured_media":105356,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_angie_page":false,"footnotes":""},"topic":[164,147,150],"insights-single-templates":[],"industry-taxonomy":[33],"content-type":[23],"country":[141],"service":[216,360],"class_list":["post-105353","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-artificial-intelligence-and-robotics","topic-innovation-and-r-and-d","topic-mobility","industry-taxonomy-automotive","content-type-blog","country-global","service-digital-transformation","service-data-analytics-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AUTOSAR access control features for SDVs<\/title>\n<meta name=\"description\" content=\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access control in AUTOSAR\" \/>\n<meta property=\"og:description\" content=\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T09:41:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/\",\"name\":\"AUTOSAR access control features for SDVs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"datePublished\":\"2025-07-24T08:37:50+00:00\",\"dateModified\":\"2025-08-18T09:41:14+00:00\",\"description\":\"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/autosar-access-control_featured.jpg\",\"width\":1280,\"height\":720,\"caption\":\"A smartphone screen displays \\\"AUTOSAR Access Control\\\" with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/access-control-in-autosar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Access control in AUTOSAR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AUTOSAR access control features for SDVs","description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","og_locale":"en_GB","og_type":"article","og_title":"Access control in AUTOSAR","og_description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","og_url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","og_site_name":"Global EN","article_modified_time":"2025-08-18T09:41:14+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","name":"AUTOSAR access control features for SDVs","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","datePublished":"2025-07-24T08:37:50+00:00","dateModified":"2025-08-18T09:41:14+00:00","description":"How access control features in AUTOSAR support a comprehensive security strategy for SDVs and autonomous driving","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2025\/04\/autosar-access-control_featured.jpg","width":1280,"height":720,"caption":"A smartphone screen displays \"AUTOSAR Access Control\" with a lock icon. Next to it is a digital wireframe illustration of a car, conveying smart vehicle security and access control via mobile device."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"Access control in AUTOSAR"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/insights\/blog\/autosar-zugriffskontrolle\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":105353,"url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/access-control-in-autosar\/","language":"en","default":true},{"blogId":6,"blogIsHidden":false,"postId":40839,"url":"https:\/\/expleo.com\/global\/de\/insights\/blog\/autosar-zugriffskontrolle\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/105353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/81"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/105353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/105356"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=105353"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=105353"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=105353"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=105353"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=105353"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=105353"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=105353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}