Product Safety & Market Access Certifications
UN Regulations under the 1958 Agreement (2026)
Contracting parties with mutual type approval recognition
CSMS/SUMS certificate validity before mandatory recertification
Regulation Overview
UNECE WP.29 type approval is the global regulatory framework governing vehicle safety, emissions, cybersecurity, and environmental performance. For supply chain teams, the primary obligation is providing documented compliance evidence across over 160 UN Regulations—covering everything from braking systems and lighting to cybersecurity management and software updates.
The 1958 Agreement provides the legal basis for type approval and mutual recognition across 54+ contracting parties. As of 2026, WP.29 continues to adopt new regulations and amend existing ones at an accelerating pace—with cybersecurity (R155), software updates (R156), automated driving systems, and emissions standards driving the most significant compliance burdens. Manufacturers placing vehicles on markets governed by WP.29 must hold valid type approvals and maintain conformity of production evidence throughout the vehicle lifecycle.
WP.29 type approval requires component-level and system-level evidence—test reports, certificates, supplier declarations, and management system certifications—from every relevant supplier tier. When regulations are amended or new ones adopted, your entire vehicle portfolio requires reassessment against current requirements.

Vehicle manufacturers (OEMs) seeking type approval in any UNECE contracting party
Importers placing vehicles on markets governed by WP.29 regulations
Tier 1, Tier 2, and Tier 3 suppliers providing safety-critical and cybersecurity-relevant components
Non-UNECE manufacturers exporting to EU, UK, Japan, South Korea, or Australia
Motorcycle and two-wheeler OEMs (from December 2027 for new types under R155)
Software providers delivering OTA update infrastructure and backend services
Key Thresholds
WP.29 type approval requires compliance evidence across dozens of applicable UN Regulations simultaneously. Each regulation demands specific test reports, certificates, and supplier declarations—but evidence is scattered across emails, legacy systems, and disconnected supplier portals. Your compliance team spends weeks compiling documentation for a single type approval application, then months reconciling inconsistencies across supplier tiers.
Your CSMS certificate expires in six months. Since the last audit, you've onboarded 40 new suppliers, introduced three ECU platforms, and updated your OTA infrastructure. Every change requires updated evidence—security concepts, TARA revisions, and supplier self-assessments. Your team is rebuilding the evidence package from scratch because no centralized compliance data backbone was established.
While OEMs bear type approval responsibility, compliance depends entirely on supplier cooperation across every tier. A Tier 2 ECU supplier claims cybersecurity compliance but provides no documentation. A Tier 1 integrator passes through declarations without validation. Without multi-tier supply chain transparency, evidence gaps persist through the audit—and a single missing supplier certificate can block type approval.
Type approval doesn't end at certification. Conformity of production requires continuous evidence that every manufactured vehicle matches the approved specifications. With hundreds of component suppliers, software versions, and production sites, maintaining traceable evidence at scale is unsustainable through manual processes. Regulatory amendments mean approved configurations can become non-compliant between audit cycles.
Certivo In Action
Certivo in Action — WP.29 Type Approval Workflow

Features Tabs

Automotive Manufacturing
Your Pain Point
Multi-tier CSMS evidence; OEM-to-supplier flowdown; 12–25 year lifecycle obligations

Electronics Manufacturing
Your Pain Point
ECU and connected component evidence; complex BOMs with hundreds of cybersecurity-relevant parts

Industrial Machinery & Heavy Equipment
Your Pain Point
Connected vehicle systems; off-highway equipment under expanded scope; legacy architectures

Aerospace & Defense
Your Pain Point
Stringent cybersecurity documentation; prime contractor flowdown to multi-tier suppliers

Semiconductor & High-Tech
Your Pain Point
Chipset security evidence; hardware root-of-trust documentation; IP concerns alongside disclosure

Energy & Infrastructure
Your Pain Point
EV charging cybersecurity; vehicle-to-grid interfaces; backend service security

Building Materials & Construction
Your Pain Point
Connected construction vehicles; autonomous machinery falling under expanded WP.29 scope

Chemical Manufacturing
Your Pain Point
Material compliance intersecting vehicle regulations; substance declarations across frameworks
From Manual Compilation to Exception Management
CORA extracts compliance evidence automatically. Your team focuses on exceptions that need human judgment—not manual document chasing across supplier tiers.
Type Approval Documentation Acceleration
Generate complete, audit-ready CSMS evidence packages in hours—not the months of manual compilation typical for type approval cycles.
Proactive Regulatory Readiness
When WP.29 amends regulations or certificates expire, Certivo reassesses your evidence portfolio instantly. Know which gaps exist before auditors ask.
Frequently Asked Questions
What vehicles and companies are subject to WP.29 type approval obligations?
Any manufacturer seeking to sell vehicles in UNECE contracting party markets—including the EU, UK, Japan, South Korea, and Australia—must hold valid type approvals under applicable UN Regulations. This covers passenger cars, commercial vehicles, buses, trailers with ECUs, and from December 2027, motorcycles. While type approval responsibility sits with OEMs, the regulation cascades to every supplier tier. Certivo's automated supplier data collection ensures multi-tier evidence is centralized and audit-ready.
What happens if an OEM fails to meet WP.29 type approval requirements?
Without valid type approvals—including CSMS and SUMS certification under R155/R156—a vehicle cannot legally be sold in any UNECE contracting party market. Several OEMs have already discontinued specific vehicle models due to R155 compliance challenges. National type approval authorities can also revoke existing approvals if conformity of production obligations are not maintained. CORA's continuous compliance monitoring ensures evidence stays current between audit cycles.
How does Certivo manage supplier evidence across multiple UN Regulations?
CORA launches targeted evidence collection campaigns to suppliers across all tiers, following up automatically in suppliers' native languages. Certivo accepts any evidence format—test reports, certificates, security concepts, TARA documents, and freeform declarations. AI document parsing and certificate validation extracts structured compliance data, maps it to applicable UN Regulation requirements, and flags gaps automatically through supplier risk scoring and due diligence.
Does Certivo support WP.29 alongside China's GB 44495 and EU-specific requirements?
Yes. Certivo validates supplier evidence against WP.29 UN Regulations, China's GB 44495:2024, the EU Cyber Resilience Act, and the EU General Safety Regulation simultaneously. The same supplier submission is validated across multiple regulatory frameworks—eliminating duplicate evidence collection campaigns and supporting organizations managing multi-market type approval compliance through a centralized compliance data backbone.
How does Certivo handle CSMS recertification and conformity of production obligations?
Certivo maintains continuous tracking of CSMS and SUMS certificate validity, supplier evidence freshness, and regulatory amendments. When recertification is due, CORA automatically identifies outdated supplier evidence, triggers targeted re-collection campaigns, and generates updated audit packages. The platform tracks conformity of production obligations and regulatory amendment impacts—transforming the three-year recertification cycle from a crisis event into continuous compliance monitoring and audit readiness.


