{"id":24868,"date":"2024-12-13T09:17:40","date_gmt":"2024-12-13T08:17:40","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=24868"},"modified":"2024-12-13T09:17:41","modified_gmt":"2024-12-13T08:17:41","slug":"electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/","title":{"rendered":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">With the European Union\u2019s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, <\/span><b><span data-contrast=\"auto\">electric vehicle charging infrastructures<\/span><\/b><span data-contrast=\"auto\"> (EVCI) are developing at a fast pace: cumulative investments by 2030 could reach \u20ac50 billion for private chargers and \u20ac30 billion for public chargers.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, unlike traditional gas stations, these are highly <\/span><b><span data-contrast=\"auto\">computerized and connected systems<\/span><\/b><span data-contrast=\"auto\">. Indeed, digitalization allows for a <\/span><b><span data-contrast=\"auto\">smart<\/span><\/b> <b><span data-contrast=\"auto\">ecosystem <\/span><\/b><span data-contrast=\"auto\">and<\/span> <span data-contrast=\"auto\">direct <\/span><b><span data-contrast=\"auto\">operational gains<\/span><\/b><span data-contrast=\"auto\">. This includes features such as <\/span><b><span data-contrast=\"auto\">smart charging<\/span><\/b><span data-contrast=\"auto\">, which allows for financial and energy savings by optimizing electricity consumption depending on grid strain. The<\/span><b><span data-contrast=\"auto\"> driver\u2019s experience<\/span><\/b><span data-contrast=\"auto\"> is also improved, as they can use their smartphone to easily locate connected chargers and interact with them.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">All these functionalities present <\/span><b><span data-contrast=\"auto\">specific cybersecurity challenges<\/span><\/b><span data-contrast=\"auto\"> that we will analyze in this article. We will outline strategies that <\/span><b><span data-contrast=\"auto\">Charging Point Operators<\/span><\/b><span data-contrast=\"auto\"> (<\/span><b><span data-contrast=\"auto\">CPOs<\/span><\/b><span data-contrast=\"auto\">) can implement, focusing on <\/span><b><span data-contrast=\"auto\">public charging stations<\/span><\/b><span data-contrast=\"auto\">. Indeed, public chargers are more exposed and thus, are the most complex case study from both operational and cybersecurity perspectives.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1><b><span data-contrast=\"auto\">What are the cyber risks in the charging ecosystem?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Why are cyber risks significant, and what is their nature? To understand this, we need to examine the charging ecosystem.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The central player in this ecosystem is the CPO, who is on the <\/span><b><span data-contrast=\"auto\">front line of cyber risks<\/span><\/b><span data-contrast=\"auto\">. CPOs are responsible for the direct operation of charging stations, both on-site and remotely. Typically, they use a cloud-hosted software solution called a <\/span><b><span data-contrast=\"auto\">CSMS (Charging Station Management System)<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The role of the CSMS has been highly standardized thanks to efforts by the <\/span><b><span data-contrast=\"auto\">Open Charge Alliance (OCA)<\/span><\/b><span data-contrast=\"auto\">, a consortium that developed the <\/span><b><span data-contrast=\"auto\">OCPP (Open Charge Point Protocol)<\/span><\/b><span data-contrast=\"auto\">. OCPP handles more than just maintenance and monitoring; it allows the CSMS to communicate with the charger in real-time to manage the charging process (reserving the station, driver authentication and authorization, billing, etc.). This introduces a cybersecurity risk: compromising the CSMS could lead to a widespread compromise of the CPO\u2019s entire charging network.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, to fully map out the possible risks, we must also consider other industry players who share cyber risks with the CPO.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">First,<\/span><b><span data-contrast=\"auto\"> charging stations<\/span><\/b> <b><span data-contrast=\"auto\">manufacturers<\/span><\/b><span data-contrast=\"auto\"> play a key role. Responsible for charger design and production, they also handle software updates and provide patches for vulnerabilities. In some charger models, manufacturers maintain permanent remote access for maintenance purposes via a secondary OCPP connection. If not properly secured, this connection can pose a risk to the CPO.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To ensure the remote connection of charger networks to the CSMS, <\/span><b><span data-contrast=\"auto\">Wide Area Network (WAN)<\/span><\/b><span data-contrast=\"auto\"> solutions are frequently used. This can involve a 3G\/4G link, or integration into a preexisting on-site network. In both cases, the link is not under the CPO\u2019s control, making them dependent on the cybersecurity maturity of the <\/span><b><span data-contrast=\"auto\">telecom provider<\/span><\/b><span data-contrast=\"auto\"> they choose.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Additionally, the CPO must integrate their information system with the <\/span><b><span data-contrast=\"auto\">site owner<\/span><\/b><span data-contrast=\"auto\">. Indeed, chargers can be in a variety of environments: highway rest areas, corporate parking lots, shopping malls, public roads etc. Depending on the use case, the stations may be interfaced with building systems (such as occupancy sensors or smart meters) or with user authentication and payment systems. Typically, the CPO has no authority over these systems and their security.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This <\/span><b><span data-contrast=\"auto\">multiplicity of actors <\/span><\/b><span data-contrast=\"auto\">tends to increase the <\/span><b><span data-contrast=\"auto\">attack surface<\/span><\/b><span data-contrast=\"auto\"> on the CPO\u2019s information systems. A breach could result in the <\/span><b><span data-contrast=\"auto\">leakage of customer data<\/span><\/b><span data-contrast=\"auto\"> or serve as a foothold for a broader cyberattack targeting the CPO and\/or its partners, with significant <\/span><b><span data-contrast=\"auto\">financial and reputational impacts<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On a local scale, potential attacks are also severe, including <\/span><b><span data-contrast=\"auto\">cyber-physical risks<\/span><\/b><span data-contrast=\"auto\"> (e.g.: a malicious modification of charging parameters, which could lead to battery overheating and potentially a fire) or <\/span><b><span data-contrast=\"auto\">grid destabilization risks<\/span><\/b><span data-contrast=\"auto\"> (e.g.: the malicious activation or deactivation of multiple chargers at once, potentially overloading the power grid).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These scenarios are likely to become more plausible with the growing popularity of <\/span><b><span data-contrast=\"auto\">extreme fast chargers <\/span><\/b><span data-contrast=\"auto\">(especially for heavy-duty vehicles) and <\/span><b><span data-contrast=\"auto\">bidirectional charging implementations<\/span><\/b><span data-contrast=\"auto\">, which allow parked vehicles to feed stored energy back into the grid.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h1><b><span data-contrast=\"none\">Implementing new standards: is it enough to address the risks?<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"none\">As the charging market rapidly grows, it is becoming more structured, and new standards are emerging. This presents an opportunity to provide a unified cyber response to the risks we have discussed.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Take <\/span><b><span data-contrast=\"none\">ISO 15118-20<\/span><\/b><span data-contrast=\"none\">, for example. Published in 2022, it specifies robust communication mechanisms between vehicles and chargers. In addition to the already mentioned <\/span><b><span data-contrast=\"none\">smart charging<\/span><\/b><span data-contrast=\"none\"> and <\/span><b><span data-contrast=\"none\">bidirectional charging<\/span><\/b><span data-contrast=\"none\"> use cases, ISO15118 introduces <\/span><b><span data-contrast=\"none\">Plug &amp; Charge<\/span><\/b><span data-contrast=\"none\">: this feature allows the charger to automatically authenticate a vehicle and process payment, eliminating the need for payment cards or RFID tags.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The primary goals of ISO 15118 are thus to streamline usage, improve energy efficiency, and ensure interoperability. However, its adoption could also bring security benefits, notably through the implementation of a global <\/span><b><span data-contrast=\"none\">Public Key Infrastructure (PKI)<\/span><\/b><span data-contrast=\"none\"> for charging stakeholders: vehicle manufacturers, mobility operators, and CPOs.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Meanwhile, the development of OCPP is also expected to accelerate, following the official approval of OCPP 2.0.1 as an <\/span><b><span data-contrast=\"none\">international standard<\/span><\/b><span data-contrast=\"none\"> (IEC 63584) by the International Electrotechnical Commission.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, it will take time before these standards become widely adopted. Several major players, such as Tesla, have developed <\/span><b><span data-contrast=\"none\">proprietary protocols<\/span><\/b><span data-contrast=\"none\"> with similar features. Moreover, most existing chargers and vehicles are not compatible with ISO 15118 or OCPP 2.0.1 and need to be replaced.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Thus, we cannot rely solely on standards to address cybersecurity risks: it is imperative to find ways to secure current infrastructures.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"auto\">Note\u202f: <\/span><\/i><i><span data-contrast=\"auto\">to know more about Plug &amp; Charge and smart charging, feel free to check out the articles by EnergyStream, Wavestone\u2019s energy blog (only available in French):<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/www.energystream-wavestone.com\/2024\/04\/le-plug-charge-une-nouvelle-solution-dauthentification-et-de-facturation-securisee-au-service-de-la-recharge-des-vehicules-electriques\/\"><i><span data-contrast=\"none\">Le Plug &amp; Charge : une nouvelle solution d&#8217;authentification et de facturation s\u00e9curis\u00e9e<\/span><\/i><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/www.energystream-wavestone.com\/2024\/06\/les-defis-du-deploiement-du-plug-charge-pour-accelerer-la-transition-vers-une-mobilite-electrique\/\"><i><span data-contrast=\"none\">Les d\u00e9fis du d\u00e9ploiement du Plug &amp; Charge<\/span><\/i><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/www.energystream-wavestone.com\/2024\/10\/panorama-des-usages-du-smart-charging\/\"><i><span data-contrast=\"none\">Panorama des usages du smart charging<\/span><\/i><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<h1><b><span data-contrast=\"auto\">So, how can CPOs secure their architecture?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Standards are only one part of the puzzle: it is primarily up to CPOs to implement a comprehensive cybersecurity policy. But how can they tackle the complex risks we have discussed?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The first step is to <\/span><b><span data-contrast=\"auto\">understand and<\/span><\/b> <b><span data-contrast=\"auto\">document their architecture and solutions<\/span><\/b><span data-contrast=\"auto\">. This may seem basic, but there is currently no reference architecture model for charging infrastructure. In this article, we will be model the architecture using four zones, as presented below:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24871 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en1.png\" alt=\"\" width=\"1036\" height=\"311\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en1.png 1036w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en1-437x131.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en1-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en1-768x231.png 768w\" sizes=\"auto, (max-width: 1036px) 100vw, 1036px\" \/><\/span><i><span data-contrast=\"auto\">Figure 1. Base architecture model for public chargers in commercial contexts.<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To secure this architecture end-to-end, we will look at <\/span><b><span data-contrast=\"auto\">key measures<\/span><\/b><span data-contrast=\"auto\"> to secure <\/span><b><span data-contrast=\"auto\">each zone<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We can, however, disregard the <\/span><b><span data-contrast=\"auto\">vehicle interface<\/span><\/b><span data-contrast=\"auto\"> for now. Until ISO 15118 becomes widely adopted, current charging connectors are not integrated into the information system and therefore are not a risk vector.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For the <\/span><b><span data-contrast=\"auto\">charging network<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">cyber hygiene<\/span><\/b><span data-contrast=\"auto\"> measures and <\/span><b><span data-contrast=\"auto\">network segmentation<\/span><\/b><span data-contrast=\"auto\"> are crucial. Chargers are often vulnerable systems, due to the use of default accounts, weak passwords, open network ports, and unencrypted storage systems. The CPO must implement best practices for <\/span><b><span data-contrast=\"auto\">hardening<\/span><\/b><span data-contrast=\"auto\"> and <\/span><b><span data-contrast=\"auto\">firmware updating<\/span><\/b><span data-contrast=\"auto\">, for each manufacturer and model they use.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Network segmentation usually involves the use of <\/span><b><span data-contrast=\"auto\">firewalls<\/span><\/b><span data-contrast=\"auto\"> and <\/span><b><span data-contrast=\"auto\">VLANs<\/span><\/b><span data-contrast=\"auto\">, depending on the local network topology and external systems that need to be integrated. Using a <\/span><b><span data-contrast=\"auto\">local controller<\/span><\/b><span data-contrast=\"auto\"> can help isolate chargers more easily from untrusted networks. This controller can aggregate all charging stations on a site and serve as a proxy with the CSMS.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As the <\/span><b><span data-contrast=\"auto\">WAN network<\/span><\/b><span data-contrast=\"auto\"> is often outsourced, it is essential for the CPO to encrypt the flows between the chargers and the CSMS. The main existing solution today is the use of <\/span><b><span data-contrast=\"auto\">TLS with server-side and client-side certificates<\/span><\/b><span data-contrast=\"auto\">, as provided in the latest versions of OCPP.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Finally, how to secure the <\/span><b><span data-contrast=\"auto\">CSMS<\/span><\/b><span data-contrast=\"auto\">? It can generally be assimilated to a cloud-based IoT platform and approached similarly. Priority should be given to <\/span><b><span data-contrast=\"auto\">code security <\/span><\/b><span data-contrast=\"auto\">best practices and proper <\/span><b><span data-contrast=\"auto\">identity and access management<\/span><\/b><span data-contrast=\"auto\"> (following the RBAC model). In the future, we can imagine that the CSMS will also play an active role in <\/span><b><span data-contrast=\"auto\">detecting cyber threats<\/span><\/b><span data-contrast=\"auto\">: analyzing logs and OCPP communications could be facilitated by the implementation of AI-based solutions.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h1><b><span data-contrast=\"auto\">Conclusion: what should be the reference architecture for CPOs?<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">Although new standards promise to streamline architectures, the charging ecosystem remains complex due to the diversity in business contexts. This is why we encourage CPOs to adapt the best practices from this article to their use case. The architecture diagram below should be seen as a starting point, rather than a definitive target.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24869 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en2.png\" alt=\"\" width=\"1046\" height=\"374\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en2.png 1046w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en2-437x156.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en2-71x25.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/borne_ev_en2-768x275.png 768w\" sizes=\"auto, (max-width: 1046px) 100vw, 1046px\" \/>\u00a0<\/span><i><span data-contrast=\"auto\">Figure 2. Secure architecture model for public chargers in commercial contexts.<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the European Union\u2019s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, electric vehicle charging infrastructures (EVCI) are developing at a fast pace: cumulative investments by 2030 could&#8230;<\/p>\n","protected":false},"author":1465,"featured_media":24867,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[4257,4582],"class_list":["post-24868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"With the European Union\u2019s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, electric vehicle charging infrastructures (EVCI) are developing at a fast pace: cumulative investments by 2030 could...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-13T08:17:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-13T08:17:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Chopineau, Hugo CAMBIER\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Chopineau, Hugo CAMBIER\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\"},\"author\":{\"name\":\"Paul Chopineau\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9\"},\"headline\":\"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0\",\"datePublished\":\"2024-12-13T08:17:40+00:00\",\"dateModified\":\"2024-12-13T08:17:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\"},\"wordCount\":1395,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\",\"name\":\"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg\",\"datePublished\":\"2024-12-13T08:17:40+00:00\",\"dateModified\":\"2024-12-13T08:17:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg\",\"width\":1920,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9\",\"name\":\"Paul Chopineau\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/paul-chopineau\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight","og_description":"With the European Union\u2019s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, electric vehicle charging infrastructures (EVCI) are developing at a fast pace: cumulative investments by 2030 could...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/","og_site_name":"RiskInsight","article_published_time":"2024-12-13T08:17:40+00:00","article_modified_time":"2024-12-13T08:17:41+00:00","og_image":[{"width":1920,"height":1200,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg","type":"image\/jpeg"}],"author":"Paul Chopineau, Hugo CAMBIER","twitter_misc":{"Written by":"Paul Chopineau, Hugo CAMBIER","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/"},"author":{"name":"Paul Chopineau","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9"},"headline":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0","datePublished":"2024-12-13T08:17:40+00:00","dateModified":"2024-12-13T08:17:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/"},"wordCount":1395,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/","name":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg","datePublished":"2024-12-13T08:17:40+00:00","dateModified":"2024-12-13T08:17:41+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/12\/car-6943487_1920.jpg","width":1920,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/12\/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Electric Mobility \u2013 How can charging point operators secure their charging infrastructure?\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9","name":"Paul Chopineau","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/paul-chopineau\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1465"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=24868"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24868\/revisions"}],"predecessor-version":[{"id":24875,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24868\/revisions\/24875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/24867"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=24868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=24868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=24868"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=24868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}