The United States government has finalized stringent new regulations to prohibit the use of technology originating from China and Russia in connected vehicles sold within the country. The rules, issued by the Department of Commerce's Bureau of Industry and Security, are a direct response to growing national security concerns that foreign adversaries could exploit vehicle connectivity to conduct espionage or even sabotage. The regulations will force a monumental and complex overhaul of the global automotive supply chain. The ban will be phased in, starting with software and certain components in the 2027 model year and expanding to include a wider range of hardware by 2029, presenting a significant challenge for automakers and their suppliers.
The new rules are designed to secure the increasingly complex ecosystem of connected vehicles, which are often referred to as 'computers on wheels.' Modern cars contain numerous systems—such as cameras, GPS, microphones, and advanced driver-assistance systems (ADAS)—that collect vast amounts of data and can often be controlled remotely.
The regulations will have a profound impact on the entire global automotive industry.
Automakers face the daunting task of tracing the digital lineage of every line of code and every microchip in their vehicles. This is what Hilary Cain of the Alliance for Automotive Innovation describes as "one of the most consequential and complex auto regulations in decades."
Automakers and suppliers must take immediate action:
The regulation forces a comprehensive asset management program for both software (SBOM) and hardware (HBOM) in the automotive supply chain.
This is a direct implementation of supply chain risk management, where technology from specific high-risk countries is prohibited.
To comply with the new regulations, automakers must conduct extensive system file analysis across their entire software supply chain. This goes beyond simple virus scanning; it requires creating a comprehensive Software Bill of Materials (SBOM) for every component in the vehicle, from the infotainment system to the ADAS controller. This SBOM must be used to trace the provenance of all code to ensure no software originates from banned entities in China or Russia. Automakers will need to invest in automated tools that can scan source code and binaries to identify libraries, dependencies, and their origins. This process is complicated by proprietary code from suppliers, so automakers must now use their purchasing power to demand this level of transparency from their entire supply chain as a condition of doing business.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats