Understanding and Auditing Autonomous and Electric Vehicles Standards for IATF 16949 - Seminar
This two-day seminar is designed to provide an overview of the standards for Functional Safety (ISO 26262:2018), Automotive SPICE® (VDA), and Cybersecurity (ISO/SAE 21434) and the impact of these standards on the IATF 16949 Quality Management System and its processes. Participants will also gain the knowledge required to conduct an IATF 16949 audit on a management system that includes Automotive SPICE®, ISO 26262 and/or ISO/SAE 21434.
Who Should Attend
This course is designed for 3rd party IATF 16949 auditors.
Recommended Training and/or Experience
Participants should be active IATF 16949 auditors.
Seminar Materials
Each participant will receive a seminar manual including breakout exercises and case studies. Quizzes and an overall exam will test learning objectives tied to specific competencies.
Seminar Goals
- Electric Vehicle architecture and Autonomous Driving
- V-Model and impact on APQP
- Understanding of ASPICE
- VDA Processes
- Common Processes with IATF 16949
- Understanding of ISO 26262
- Overlap with IATF 16949 – Processes and Work Products
- Understanding of ASIL Levels and Special Characteristics
- Understanding the Cybersecurity Landscape
- Impact and Overlap with IATF 16949
- Give IATF 16949 auditors the ability to audit automotive systems that include ASPICE, ISO 26262, and ISO/SAE 21434
- Evaluate Process Maps
- New Product Development (APQP) process
- Improve the effectiveness of organizations operating in silos versus integrated systems
- Provide numerous scenarios auditors face when conducting IATF 16949 management systems that include ASPICE, Functional Safety and Cybersecurity
Seminar Agenda
Understanding Autonomous and Electric Vehicle Standards for IATF 16949
Introduction to IATF 16949 and Its Interactions with EV & AV Standards
- Trends in Electric Vehicles
- Electric Vehicle Systems
- Automation and ADAS- Sensors, Cameras and Perception Systems
- Why Software, Safety and Cybersecurity Standards?
- SAE Chart on Autonomous Driving
IATF 16949 and EV/AV Standards
- Requirements for ASPICE in IATF 16949
- Product Safety and Functional Safety
- Key Interactions Between IATF 16949 Clauses/Requirements and EV/AV Standards
Automotive SPICE (VDA)
- What is ASPICE?
- What is the VDA Scope?
- Maturity Model – Level 1 to Level 5
- Key Concepts
- Base Practices and Generic Practices
- Impact of ASPICE Processes on IATF 16949
Functional Safety (ISO 26262)
- What is Functional Safety?
- ISO 26262 Part 1 to Part 11 and Alignment with IATF 16949
- ASIL Levels and Impact of ASIL on ISO 26262 Requirements
- Product Certification – Safety Case, Assessment and Audit
- Impact of Functional Safety on IATF 16949
Cybersecurity (ISO/IEC 21434)
- What is Cybersecurity (ISO/SAE 21434, TISAX/ISO 27001 and UNECE R-155)?
- ISO/SAE 21434 Clauses and Alignment with IATF 16949
- CAL Levels and Impact on ISA/SAE 21434 Requirements
- Product Certification – Safety Case, Assessment and Audit
- Impact of Cybersecurity on IATF 16949
Exam
Auditing Autonomous and Electric Vehicle Standards for IATF 1694
Introduction to IATF 16949 and Interactions with EV & AV Standards
- Expectations for the Process Map
- Expectations for Processes and Documentation
Automotive SPICE (VDA)
- ASPICE Processes and Interactions/Overlap with IATF 16949 Processes
- Breakout Exercise 1: Impact of VDA Scope on an IATF 16949-based Process Map
- Expectations of IATF 16949 Processes with ASPICE
- Breakout Exercise 2: Nonconformity Case Studies
Functional Safety (ISO 26262)
- Functional Safety Processes and Interactions/Overlap with IATF 16949 Processes
- Breakout Exercise 3: Impact of Functional Safety on an IATF 16949-based Process Map
- Expectations of IATF 16949 Processes with Functional Safety
- Breakout Exercise 4: Nonconformity Case Studies
Cybersecurity (ISO/SAE 21434)
- Cybersecurity Processes and Interactions/Overlap with IATF 16949 Processes
- Breakout Exercise 5: Impact of Cybersecurity on an IATF 16949-based Process Map
- Expectations of IATF 16949 Processes with Cybersecurity
- Breakout Exercise 6: Nonconformity Case Studies