Scrum@Scale encourages companies to scale theirexisting scrum setting rather than establish a new framework. Instead of laying down rules, Scrum@Scale poses questions to allow stakeholders to develop scaling concepts themselves.

Synchronisation is achieved by using a product owner cycle and a scrum master cycle.

The structure of Nexus is even more minimalist than LeSS, based on low levels of formalised rules. These grant teams more leeway, synchronised by a Nexus integration team. By allowing for a higher degree of freedom, Nexus makes it possible for stakeholders to organise their own tasks more.


The scaled agile framework (SAFe) is the predominant model used by the automotive electronics industry to scale agile methods and practices on any level of the organisation. SAFe is particularly well suited to large development units responsible for delivering a high number of client projects in parallel.

Levels of the business covered by SAFe

  • Teams
  • Programmes
  • Business solutions
  • Portfolio management across the entire company

We use SAFe to synchronise these different levels by using a release train, also in order to allow your company to deliver continual benefit.


Large-scale scrum is particularly useful if your company needs to synchronise lots of scrum teams developing a system together. By synchronising scrum events, all stakeholders gain the same understanding. LeSS is based on a radically straightforward philosophy that is an excellent match for certain constellations within companies.

LeSS comprises a number of very simple fundamental elements

  • Principles
  • Rules
  • Experiments

Security-centric processes are primarily useful when it comes to effective risk assessment.

They allow you to understand where potential threats will need to be thought about – in product development, production, and even during everyday use of the connected vehicle.

Measures designed to protect technology can be derived from the findings of risk assessments.

These allows you to protect connected vehicles from cyberattacks.

Protecting critical IT infrastructure according to ISO 27000 will prevent third-party access to connected vehicles via the back-end systems of the vehicle manufacturer, its suppliers and the service providers.

These include