Sibros’ Certificate Authority (CA) delivers secure, scalable, and resilient digital trust for every vehicle, device, and cloud service. Simple to adopt. Built on modern cryptography. Ready for global fleets.
Our Vehicle Security Operations Center operates as a 24/7 nerve center, enabling OEMs, fleet operators, and city mobility platforms to gain deep visibility into vehicle security telemetry and respond to incidents before they escalate.
Strong Identity
Verify authentic devices and vehicles across fleets and partners.
Secure OTA
Validate software & firmware with signature‑backed trust.
Protected Telemetry
End‑to‑end encryption for vehicle ↔ cloud communications.
Compliance Ready
Aligned with ISO 21434 and UNECE WP.29 expectations.
Sibros CA Architecture at a Glance
Global and Segregated
Three independent PKIs in the US, EU, and APAC. Isolated cloud accounts with whitelisted network access. Mutual TLS over HTTPS only.
Keys You Can Trust
Offline Root CA. Intermediates protected by Cloud KMS. Signing runs in an isolated enclave accessible only to provisioners.
Secure Issuance
Provisioner (Pandora) authenticates via mTLS. PKI issues a single‑use token per unique CN, signs the CSR, and returns the full chain.
Operational Guardrails
Validity never exceeds its issuing intermediate. Revocation & rotation supported at any time if compromise is suspected.
Sibros provides and manages a certificate management system that issues certificates, usage policies, and configurations for use with an MQTT broker. Devices use MQTT(s) with mutual TLS to publish/subscribe securely. HTTPS is used for downloading binaries (firmware images), ensuring integrity and confidentiality end‑to‑end.
MQTT(s) Trust
- Per‑device client certificates for broker authN/authZ - Policy‑based topic access and session handling - Operational logging for certificate use and anomalies
Firmware over HTTPS
- TLS 1.2/1.3 for binary downloads - Digest checks + signature verification at the vehicle - Separation of telemetry (MQTT) and content delivery (HTTPS)
Optional In‑Vehicle PKI
For securing in‑vehicle communications between Sibros components, Sibros can optionally provide certificates and manage associated keys in partnership with customer‑provided hardware and software capabilities. This is particularly useful when a vehicle hosts multiple high‑performance compute units with networks of varying trust. This configuration is available on request.
Key Custody Keys stored and used with customer HSM/TEE where available; Sibros integrates with your in‑vehicle security architecture.
Component mTLS Certificates enable authenticated, encrypted comms among Sibros components over potentially insecure in‑vehicle networks.
Policy Control Usage policies and certificate lifecycles aligned to your partitioning, domains, and safety/security goals.
OTA Key Management (SOTA/FOTA)
Keys for Software‑Over‑The‑Air (SOTA) and Firmware‑Over‑The‑Air (FOTA) are handled securely across the vehicle, cloud, and CI/EOL systems as applicable. Multiple private–public key pairs are used: vehicles verify manifest authenticity and integrity and validate the authenticity and validity of update instructions. Ownership aligns with your program’s Uptane key‑ownership model.
Key Set (example)
Held By
Purpose
Transport (MQTT client cert)
Device/Vehicle
mTLS to broker, authenticated telemetry & commands
Signature‑based validation for firmware and software packages.
Monitoring
Operational logging with dashboards (Prometheus/Grafana).
Onboarding
Zero‑touch enrollment for devices and vehicles using PKI.
Why Sibros PKI
End‑to‑End Security
From secure onboarding to encrypted communications and trusted OTA.
Proven at Scale
Horizontally scalable architecture for global fleets.
Automotive‑Grade
Practices aligned with ISO 21434 and UNECE WP.29.
Easy to Adopt
Drop‑in integrations for IoT, IAM, OTA, and telemetry pipelines.
FAQs
Frequently Asked Questions
Answers to common questions about deployment, security, and integration for automotive programs.
Our certificate lifecycle integrates with industry-standard protocols (e.g., EST, SCEP, ACME, CMP) to
streamline enrollment, rotation, and revocation. Keys are safeguarded by HSM/TEE where available, and
policies are centrally governed for program-level compliance.
We support RSA (2048–4096), ECDSA (P-256/P-384/P-521), and EdDSA (Ed25519/Ed448) for signing and TLS
handshakes. Post-quantum signature schemes (e.g., CRYSTALS-Dilithium) are available in preview for
forward-looking programs.
Yes. Typical integrations include Jenkins/GitLab/GitHub Actions for release signing, Prometheus/Grafana/
Datadog/Splunk for telemetry, and SAML/OAuth2/LDAP/Active Directory for enterprise identity. Our APIs and
webhooks accelerate pipeline automation and audit readiness.
Our VSOC-aligned detections monitor diagnostic flows, firmware signatures, and policy compliance. Events
such as OBD-II misuse, signature mismatches, or version downgrades are flagged, correlated, and routed to
response playbooks.
We support cloud-hosted, on-prem, and hybrid deployment models. Data residency, network topology, and PKI
anchoring are configured to satisfy OEM, Tier-1, and regulatory requirements.
Yes. Every enrollment, rotation, and signing action is recorded with tamper-evident logs. Export pipelines
help furnish auditors with precise evidence across development, release, and in-vehicle operations.
Secure Every Vehicle with Sibros PKI
From identity to OTA, Sibros PKI gives OEMs the foundation for trusted, compliant connected mobility. Let’s tailor it to your program.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.