The EU Cyber Resilience Act aims to bolster cybersecurity across the digital landscape.
The Cyber Resilience Act (CRA), officially Regulation (EU) 2024/2847, is a landmark piece of European Union legislation designed to establish a unified and comprehensive framework for cybersecurity concerning products with digital elements. Its primary objective is to significantly enhance the security of both hardware and software products available on the EU market. The CRA addresses critical weaknesses observed in the digital product ecosystem, such as inconsistent cybersecurity levels, insufficient security updates, and a lack of transparency for consumers and businesses regarding product security.
By setting mandatory, horizontal cybersecurity requirements, the CRA aims to protect consumers and businesses from products with inadequate security features, reduce the attack surface for cyber threats across the EU, and ensure manufacturers take responsibility for the security of their products throughout their entire lifecycle. It represents the EU's first major regulation specifically targeting the cybersecurity of tangible and intangible digital products.
The scope of the CRA is intentionally broad, applying to virtually all "products with digital elements" (PDEs) whose intended and reasonably foreseeable use includes a direct or indirect logical or physical data connection to a device or network. This encompasses:
The regulation applies to economic operators involved in placing these products on the EU market, specifically:
However, there are some specific exclusions, such as products already covered by sector-specific EU legislation with equivalent cybersecurity requirements (e.g., medical devices, aviation, automotive under certain regulations) and, notably, free and open-source software (FOSS) developed or supplied outside the course of a commercial activity. FOSS integrated into commercial products, however, will subject the manufacturer of the final product to CRA obligations.
Understanding the implementation timeline is crucial for manufacturers and other economic operators:
This staggered timeline provides a transitional period for manufacturers to adapt their processes, designs, and documentation to meet the new requirements before full enforcement begins.
The CRA establishes several fundamental requirements aimed at ensuring a high level of cybersecurity for digital products throughout their lifecycle.
This is a central tenet of the CRA, moving away from a point-in-time security assessment towards continuous vigilance.
Manufacturers must conduct thorough cybersecurity risk assessments during the design and development phases and periodically throughout the product's lifecycle or support period. This assessment must identify relevant risks based on the product's intended use and reasonably foreseeable misuse, and inform the implementation of appropriate security measures.
Products must be designed, developed, and produced incorporating security from the outset. This includes implementing state-of-the-art security measures to ensure an appropriate level of cybersecurity. Furthermore, products must be placed on the market with secure default configurations, minimizing the attack surface out-of-the-box.
Manufacturers have ongoing responsibilities after a product is placed on the market. They must establish processes to continuously monitor for vulnerabilities affecting their products, including third-party components. Identified vulnerabilities must be addressed effectively and without delay, including through the provision of security updates.
Manufacturers must ensure that vulnerabilities can be addressed through security updates, provided free of charge and in a timely manner. They must also clearly communicate the support period during which users can expect to receive updates (generally, at least five years or the expected product lifetime).
Improving information flow is key to enhancing resilience.
Manufacturers face mandatory reporting obligations. They must notify the EU Agency for Cybersecurity (ENISA) within 24 hours of becoming aware of any actively exploited vulnerability contained in their product. They must also report significant cybersecurity incidents impacting the security of their product without undue delay.
Products must be accompanied by clear, understandable instructions and information for the user regarding cybersecurity aspects. This includes secure configuration, usage, the product's security properties, the security update policy, the end-of-support date, and how to report vulnerabilities. Manufacturers must also maintain comprehensive technical documentation demonstrating compliance with the CRA's requirements, available for inspection by market surveillance authorities.
The CRA introduces mechanisms to ensure its requirements are met.
Before placing a product on the market, manufacturers must perform a conformity assessment to demonstrate that it meets the essential cybersecurity requirements outlined in the CRA (Annex I). The assessment procedure varies based on the product's criticality (e.g., self-assessment for standard products, third-party assessment for critical products). Successful assessment allows the manufacturer to draw up an EU declaration of conformity and affix the CE marking to the product.
National market surveillance authorities in EU member states will be responsible for enforcing the CRA. They will have powers to check product compliance, demand corrective actions, restrict or prohibit market access, and impose significant penalties for non-compliance. Fines can be substantial, potentially reaching up to €15 million or 2.5% of the company's total worldwide annual turnover for the preceding financial year, whichever is higher.
The CRA emphasizes supply chain security. Manufacturers are responsible for the security of the final product, including components sourced from third parties or open-source projects used in a commercial context. They need processes to assess and manage the security risks associated with their supply chain.
Embedded devices – the processors, firmware, and software integrated into countless products from industrial machinery and automotive systems to consumer electronics and IoT gadgets – are squarely targeted by the CRA. As fundamental "products with digital elements," often connected and performing critical functions, their security is paramount. The CRA forces manufacturers of embedded systems and the products containing them to fundamentally rethink their approach to security:
The CRA necessitates integrating robust security throughout the embedded system development lifecycle.
A crucial point is that the CRA defines *what* level of security must be achieved (the essential requirements in Annex I) but generally does not prescribe *how* manufacturers must achieve it by mandating specific technologies across the board. Instead, it mandates a risk-based approach. Manufacturers must select and implement technical and organisational measures that are appropriate to the identified risks. However, meeting the CRA's stringent requirements for security, integrity, confidentiality, and resilience will often functionally necessitate the use of established hardware and software security technologies, especially for devices deemed higher risk.
While not explicitly mandated in the regulation text for all devices, physical security measures may be deemed necessary based on the risk assessment, particularly for devices deployed in untrusted environments or handling highly sensitive data where physical attacks are a credible threat. Measures to detect or prevent physical tampering align with the CRA's goal of protecting product integrity.
TEEs provide hardware-isolated environments to protect sensitive code execution and data (like cryptographic keys) from compromised operating systems or software. While the CRA doesn't explicitly require TEEs, using them can be a highly effective way to meet requirements related to protecting critical functions, ensuring data confidentiality and integrity, and securing update processes, particularly in complex embedded systems.
The CRA requires protecting the confidentiality and integrity of data. Strong encryption is fundamental to this. While the CRA doesn't mandate specific algorithms or hardware acceleration, the need to protect data at rest and in transit effectively and efficiently (without overburdening resource-constrained embedded processors) often points towards incorporating hardware support for modern cryptographic standards.
Ensuring that a device only loads and executes authenticated and unmodified firmware and software upon startup is critical for maintaining system integrity and preventing persistent malware infections. Secure Boot mechanisms are widely considered a foundational security feature for embedded devices and are strongly aligned with the CRA's requirements for protecting against unauthorized access and ensuring resilience against attacks. Implementing Secure Boot is often a necessary measure identified through the risk assessment process.
Complying with the CRA presents significant challenges for embedded device manufacturers:
Despite these challenges, the CRA is expected to drive significant improvements in the security posture of embedded devices across the EU market.
The following chart illustrates key areas of focus for embedded device manufacturers striving for CRA compliance, mapping their perceived importance against the typical complexity involved in their implementation. This visualization helps understand the multi-faceted nature of CRA readiness, where factors range from foundational process requirements to specific technical implementations.
This chart highlights that while all listed factors are significant, areas like robust update mechanisms and rigorous risk assessment are crucial (high importance) and often involve substantial complexity. Similarly, integrating TEEs or managing supply chain security can be complex undertakings, driven by the specific risks identified for the product.
To better understand the structure and interconnectedness of the Cyber Resilience Act, the following mind map outlines its core components, from overarching goals to specific requirements and impacts, particularly concerning embedded systems and the technologies often involved in compliance.
This mind map illustrates how the CRA's goals translate into specific provisions covering the entire product lifecycle, impacting various stakeholders and necessitating a risk-based adoption of security technologies, particularly relevant for embedded device manufacturers.
Navigating the practical implications of the CRA can be challenging for device manufacturers. The following video offers insights specifically tailored to how this regulation will impact the design, development, and maintenance processes for devices placed on the EU market.
This presentation delves into the objectives of the CRA and what they mean in practice for companies producing embedded systems and connected devices. It covers expectations around security features, lifecycle management, and compliance procedures, providing valuable context for adapting to the new regulatory landscape that fully applies from late 2027.
This table summarizes key requirement areas of the Cyber Resilience Act and their direct implications for the design and manufacturing of embedded devices, along with examples of practices or technologies that might be employed for compliance.
Requirement Area | CRA Provision Summary | Implication for Embedded Devices | Example Technologies/Practices |
---|---|---|---|
Risk Assessment | Conduct and document cybersecurity risk assessments throughout the product lifecycle. | Mandatory assessment specific to device function, connectivity, data handled, and deployment environment. Must inform design choices. | Threat Modeling (STRIDE), Attack Tree Analysis, Hazard Analysis. |
Security by Design | Integrate security measures from the earliest design stages. Protect confidentiality, integrity, availability. Prevent unauthorized access. | Security must be a core design parameter, not an add-on. Requires secure coding, architecture design, component selection. | Principle of Least Privilege, Input Validation, Secure Coding Standards (CERT, MISRA), Static/Dynamic Code Analysis (SAST/DAST). |
Secure Default Configuration | Place products on the market with secure settings enabled by default. | Avoid default passwords, unnecessary open ports, or insecure protocols enabled out-of-the-box. User must actively enable less secure options if needed. | Unique default credentials per device, secure protocols (TLS, SSH) enabled, firewall rules pre-configured. |
Vulnerability Handling | Monitor for vulnerabilities, address them without delay, provide security updates. | Requires established processes for vulnerability intake (e.g., disclosure program), analysis, patching, and distribution. Must handle third-party component vulnerabilities (SBOM recommended). | Coordinated Vulnerability Disclosure (CVD) policy, Software Bill of Materials (SBOM), regular vulnerability scanning, patch management system. |
Secure Updates | Ensure vulnerabilities can be fixed via timely, free, and secure updates. Inform users about update availability and support period. | Device must have a secure mechanism to receive, authenticate, and apply updates (OTA updates common). Clear communication on support lifespan is essential. | Over-The-Air (OTA) update mechanisms with signature verification, secure update servers, rollback capabilities, clearly stated End-of-Life (EOL) policy. |
Integrity Protection | Protect software, firmware, and configuration from unauthorized modification. | Mechanisms needed to verify the integrity of code and data at boot and potentially runtime. | Secure Boot, code signing, checksums/hashes, hardware roots of trust (e.g., TPM), runtime integrity monitoring. |
Confidentiality Protection | Protect the confidentiality of stored, transmitted, or processed data. | Requires use of encryption for sensitive data both at rest (on device storage) and in transit (over networks). Secure key management is critical. | TLS/DTLS for communication, file system encryption, hardware crypto accelerators, secure key storage (e.g., TEE, Secure Element). |
Reporting Obligations | Notify ENISA of actively exploited vulnerabilities (within 24h) and significant incidents. | Requires internal processes for identifying, assessing, and reporting relevant events quickly. | Incident Response Plan, designated security contact, monitoring systems for exploitation attempts. |
Transparency & Documentation | Provide users with security information and instructions. Maintain detailed technical documentation for authorities. | Requires clear user manuals focusing on security, public security advisories, and comprehensive internal documentation covering design, testing, risk assessment, and compliance efforts. | Security guides for users, public vulnerability disclosure page, detailed technical file including risk assessments, test reports, conformity declaration. |