Technical article

EU-wide cybersecurity for digital products

The new Cyber Resilience Act (CRA)


Share Article
Share Button Linkedin Share Button Xing Share Button X Share Button Email

On 10 October 2024, the European Council adopted the new law on cybersecurity requirements for products with digital elements, known as the Cyber Resilience Act (CRA), to ensure that a wide range of products, such as networked home cameras, refrigerators, televisions, toys and even machines, are secure before they are placed on the market.

The new regulation aims to close gaps, clarify relationships and make the existing legal framework for cybersecurity more coherent, ensuring that products with digital components, such as Internet of Things (IoT) products, are secure throughout their entire supply chain and lifecycle.

Note: This technical article is continuously updated. Don't miss any important updates. Subscribe to our free newsletter or follow us on LinkedIn!

Background

Due to the current security situation and in particular the war in Ukraine, it was assumed that increasing resilience to cyber attacks in Europe was a high political priority and would be pursued vigorously.

On 1 December 2023, the European Parliament and the Council were able to reach an agreement on the Cyber Resilience Act proposed by the Commission in September 2022. The agreement maintains the broad lines of the Commission's proposal, but the co-legislators are proposing adjustments in some areas. These include, for example, a desire for a simpler methodology for classifying the digital products covered by the regulation, a definition of the product lifespan by the manufacturers, and a reporting requirement for actively exploited vulnerabilities and incidents.

The European Parliament adopted the compromise text on 12 March 2024, followed by approval by the Council on 10 October. It can then be published in the Official Journal of the European Union, after which the Cyber Resilience Act will enter into force on the 20th day following its publication in the Official Journal.

When will the Cyber Resilience Act come?

On 10 October 2024, the Council of the European Union adopted the Cyber Resilience Act, the new law on cybersecurity requirements for products with digital elements. Following this adoption, the only step remaining is the signature of the President of the Council and the European Parliament. The new regulation will be published in the EU Official Journal in the coming weeks.
 

When does the Cyber Resilience Act have to be applied?

The new regulation will enter into force twenty days after publication in the EU Official Journal and will be directly applicable in all EU member states 36 months after its entry into force. Some provisions will apply earlier:

  • May 2026: conformity assessment bodies can assess compliance with the CRA requirements
  • August 2026: the obligation to report vulnerabilities and other security incidents begins
  • approx. November 2027: all CRA requirements for new products must be met
     

What are the EU Commission's considerations for the Cyber Resilience Act?

A hacker attack occurs every 11 seconds. This results in costs of over 5 trillion euros. This is stated by the EU Commission in its cyber security strategy, thereby underlining the need to ensure a higher level of cyber security in the future. The aim is to incorporate the defined requirements as a permanent part of the entire supply chain.

The new ‘Cyber Resilience Act’ is intended to ensure that digital products become more secure for individuals and businesses. Manufacturers of such products, both hardware and software, will be obliged to use software updates to fix vulnerabilities and to inform the end users of their products about possible cybersecurity risks. In addition, the draft regulation defines requirements for software development and thus also emphasises the ‘security by design’ required by the ‘Cyber Security Act’ already in force.
 

What are the goals of the Cyber Resilience Act?

The overarching aim of the cybersecurity rules proposed by the European Commission is to ensure that hardware and software products on the internal market are more secure. The Commission has set out the objectives of the legislation in four measures:

  1. Ensure that manufacturers improve the security of products with digital elements from the design and development phase and throughout their entire life cycle.
  2. Ensure a coherent cybersecurity framework that facilitates compliance for hardware and software manufacturers
  3. Improve transparency regarding the security features of products with digital elements
  4. Enables businesses and consumers to use products with digital elements securely
     

What can be said about the scope of the Cyber Resilience Act?

The scope of the regulation shows that this area is very broadly defined:

‘This Regulation applies to products with digital elements made available on the market, the intended purpose or reasonably foreseeable use of which includes a direct or indirect logical or physical data connection to a device or network.’

Due to the loose definition of ‘digital elements’, the regulation thus covers both hardware such as machines and IoT devices and pure software products.

Exceptions are also mentioned in the scope of application; for example, medical devices according to Regulation (EU) 2017/745 do not fall within the scope of the planned legal act.

The legislation also regulates the future interaction with Delegated Regulation 2022/30, which already stipulates security requirements for internet-enabled systems within the meaning of the Radio Equipment Directive 2014/53/EU. Brussels announced that, in order to avoid overlaps, Regulation 2022/30 should either be repealed or merely supplemented.
 

Does the Cyber Resilience Act require a conformity assessment procedure and a ‘cyber risk assessment’ ?

In line with previous EU legislation (e.g. the Machinery or Low Voltage Directives), the Cyber Resilience Act also provides for a conformity assessment procedure.

The core of the procedure is the cyber risk assessment. Article 13, paragraph 2 of the draft provides:

‘[...] manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.’

Depending on the criticality of the products, the conformity assessment procedure distinguishes between self-certification and two procedures in which notified bodies must be involved. Details can be found in the factsheet on the Cyber Resilience Act.

In our view, the details in Annex VII, paragraph 2, of the regulation are particularly noteworthy for manufacturers. The document mentions various aspects (design, development, production, vulnerability analysis) as content for the technical files. This means that, if the European Commission has its way, software architectural decisions as well as decisions regarding the development and build process must be documented accordingly in the software development process in the future. This will, of course, mean increased documentation work for companies. In particular, the rapid technological development of software development tools (e.g. for build processes) will certainly present companies with organisational challenges in the future that can be overcome but should not be underestimated.

The wording of the content:

"CONTENTS OF THE TECHNICAL DOCUMENTATION

(…)

a description of the design, development and production of the product with digital elements and vulnerability handling processes, including:

(a) necessary information on the design and development of the product with digital elements, including, where applicable, drawings and schemes and a description of the system architecture explaining how software components build on or feed into each other and integrate into the overall processing;

(b) necessary information and specifications of the vulnerability handling processes put in place by the manufacturer, including the software bill of materials, the coordinated vulnerability disclosure policy, evidence of the provision of a contact address for the reporting of the vulnerabilities and a description of the technical solutions chosen for the secure distribution of updates;

(c) necessary information and specifications of the production and monitoring processes of the product with digital elements and the validation of those processes;'
 

What do the requirements of the Cyber Resilience Act mean for manufacturers?

The German Federal Office for Information Security (BSI) is providing support for manufacturers in identifying the CRA requirements with the publication of the Technical Guideline TR-03183. Further information can be found in our technical article ‘Technical guideline for cyber resilience requirements’.
 

When will harmonised standards for the Cyber Resilience Act be available?

In the coming months, the Commission will request the European standardisation organisations CEN and CENELEC to ‘develop harmonised standards for the essential cybersecurity requirements set out in Annex I to this Regulation’. When issuing such a standardisation request, the Commission will endeavour to take into account existing European and international cybersecurity standards that have already been published or are in the process of being developed. Examples of such standards and specifications that could potentially be harmonised to meet the CRA requirements are:

  • EN ISO/IEC 15408 series parts 1-5: Information security, cybersecurity and privacy protection - Evaluation criteria for IT security
  • EN 17640: Fixed-time cybersecurity evaluation methodology for ICT products
  • EN ISO/IEC 29147:Information technology - Security techniques - Vulnerability disclosure
  • EN ISO/IEC 30111: Information technology - Security techniques - Vulnerability handling processes
  • EN 303 645: Cyber security for consumer internet of things
  • Parts of the EN IEC 62443 series: Security for industrial automation and control systems

In line with the new Machinery Regulation (EU) 2023/1230, the Commission may, in the absence of harmonised standards for the cybersecurity requirements of Annex I, adopt implementing acts with common specifications for technical requirements. The legislator reserves this option in case the desired standards are not delivered within the set deadline, the standardisation mandate is not accepted or the content of the documents does not comply with the mandate.

The following documents are a valuable source of information for machine manufacturers:

How is the Cyber Resilience Act to be distinguished from other cyber provisions such as NIS-2?

The NIS-2 directive applies to network and information systems used to provide essential and important services in key sectors. The regulation requires organisations (= operators) in various sectors to ensure that the networks and systems they use to provide services and carry out their activities achieve a higher level of cyber security. In our technical article "NIS-2 Directive in mechanical engineering", we explain which companies are directly affected (as operators) and what requirements and sanctions the directive provides for.

The Cyber Resilience Act, on the other hand, lays down cybersecurity requirements for hardware and software products that companies (=manufacturers) place on the market in the EU. For products that fall within the scope of the CRA, manufacturers must carry out security assessments, implement vulnerability management procedures and provide users with the necessary information.
 

Cyber Resilience Act - Download

On 10 October 2024, the corrected version of the Cyber Resilience Act was adopted. The following link will take you to the full text of the final draft:


Final draft for the new Cyber Resilience Act from 10 October 2024
 

Further information

You can read an analysis of the Cyber Resilience Act from a legal perspective in the corresponding technical article by Dr Gerhard Wiebe.


Posted on: 2024-10-16 (last amendment)

Authors

Johannes Windeler-Frick, MSc ETH
Member of the IBF management board. Specialist in CE marking and Safexpert. Presentations, podcasts and publications on various CE topics, in particular CE organisation and efficient CE management. Management of the further development of the Safexpert software system. Degree in electrical engineering from ETH Zurich (MSc) with a focus on energy technology and specialisation in the field of machine tools.

Email: johannes.windeler-frick@ibf-solutions.com | www.ibf-solutions.com

Daniel Zacek-Gebele, MSc
Product manager at IBF for additional products and data manager for updating standards data on the Safexpert Live Server. Studied economics in Passau (BSc) and Stuttgart (MSc), specialising in International Business and Economics.

Email: daniel.zacek-gebele@ibf-solutions.com | www.ibf-solutions.com

 

Register


You are not yet registered? Register now for the free CE InfoService and receive information by e-mail when new technical papers, important standards publications or other news from the field of machinery and electrical equipment safety or product compliance are available.

 

Picture advertisement seminar efficient CE marking and risk assessment of machines and plants
Picture advertisement safexpert the practice software for CE marking

Support by IBF

CE Software Safexpert

CE software for systematic and professional safety engineering

Seminars

Practical seminars on aspects of risk assessment and ce-marking

Stay Up-to-Date!

With the CE InfoService you stay informed about important developments in the field of product safety.