Cyber Regulation: CRA and NIS

What Exactly do I Have to Do? What Are the Standards? What do I have to Bear in Mind?

Time to Read 12 min

The entry into force of the Cyber Resilience Act (CRA) means that almost no electronic product can be developed without taking cybersecurity into account, without a dam to the internet. Many things that previously only applied to critical infrastructures (NIS-2: Network and Information Systems Directive 2022/2555) now affect most electronic products.

What does this mean for you? We have compiled information here on various aspects of CRA and NIS-2 (mainly on CRA, as this affects more developers and manufacturers):

Please feel free to contact me if you have any further questions!

What should You Know about the CRA in General?

EU Regulation, EU Directive: is there a difference?

EU regulations and EU directives are two forms of legal acts in EU legislation. While directives must be transposed into national law by the member states, regulations are generally directly and immediately applicable in all member states.

Where Can I Find the Regulation?

The regulation is entitled “Regulation (EU) 2024/2847 of the European Parliament and of the Council of October 23, 2024, on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No. 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (cyber-resilience regulation) and can be downloaded directly from the EUR-Lex portal.

How do I Read the Regulation?

The regulation is divided into three sections. It begins with the recitals, followed by the actual text of the regulation and, finally, the annexes.

The recitals explain the background, objectives and considerations underlying the individual provisions of the regulation. They serve as a guide for the interpretation and application of the articles and annexes, but have no direct legal effect. However, they must be taken into account.

What are the Aim and Purpose of the CRA?

Two main problems that need to be addressed because they result in high costs for users and society (recital 1):

  • “... a low level of cybersecurity of products with digital elements, ... inconsistent provision of security updates to address them...”
  • “... insufficient understanding and access to information for users...”

What are the Penalties for Non-Compliance with the CRA?

For providing false or incomplete information, for example, a fine of up to €5 million or 1% of annual turnover (Art. 64 para. 4). See also „What documentation do I have to create?”

For violating the manufacturer's obligations, for example, a fine of up to €15 million or 2.5% of annual turnover (Art. 64 para. 1).

What is the Technical Scope of the CRA?

Which Products are Affected?

The CRA applies to software and hardware products and their (associated) remote data processing solutions (Art. 2 para. 1). This includes pure software products and components (e.g. applications, operating systems), pure hardware products and components (e.g. microcontrollers) and combinations thereof (e.g. measuring devices, coffee machines).

“... the intended purpose or reasonably foreseeable use of which includes a direct or indirect logical or physical data link to a device or network.”

This affects all devices that can be connected directly or indirectly to other devices.

My Device has a USB Interface. Is it Affected?

Yes. See above.

My Device has a Bluetooth Interface. Is it Affected?

Yes. See above.

Which Life-Phases of a Product are Affected?

The entire product life cycle from development to operation to decommissioning (Art. 13 para. 2).

Is there a Minimum Product Lifespan?

Cybersecurity must be guaranteed for the expected lifespan of the product, but for at least 5 years.

Are there Exceptions?

The CRA does not apply to (Art. 2 para. 2 – 8, Recital 12):

  • medical devices
  • in vitro diagnostics
  • motor vehicles and their trailers
  • civil aviation
  • national security and defense products
  • services (e.g. cloud computing services)

So my Cloud Software is Not Affected?

It depends on whether the cloud functions offered are device functions, e.g. remote control or remote configuration of devices. In this case, the cloud software is affected by the CRA (Considerations 11, 12).

The cloud platforms themselves are not covered by the CRA, as they are regulated by EU Directive 2022/2555 (NIS2).

In individual cases, the distinction between a service and a product with digital elements can be complex in the case of cloud services.

In the CRA, How are the Terms Defined?

How is Cybersecurity Defined?

The CRA uses the definition in Article 2 (1) of Regulation (EU) 2019/881 (Art. 3 para. 3):

„‘cybersecurity’ means the activities necessary to protect network and information systems, the users of such systems, and other persons affected by cyber threats”

Are there FurtherDefinitions?

Art. 3 para. 1 - 51 defines the terms used in the CRA and how they are to be understood, e.g. software, hardware, components, placing on the market, etc.

What are the Requirements For Me?

The requirements depend on what type of economic operator I am. The CRA differentiates between manufacturers (Art. 13), importers (Art. 19), distributors (Art. 20) and open-source software stewards (Art. 24).

Importers and distributors automatically become manufacturers when they place products on the market under their own name or trademark or substantially modify them (Art. 21, 22).

What do the Security Levels in the CRA Mean?

What security levels are there?

The CRA distinguishes between four levels:

  • Standard/Basic Products (Art. 6)
    • e.g. household appliances, measuring instruments, IoT (Internet of Things) devices, mobile or PC applications
  • Important Products (Class I) (Art. 7, Annex III)
    • e.g. virtual assistants, smart door locks, baby monitors, wearables for health monitoring
  • Important Products (Class II) (Art. 7, Annex III)
    • e.g. firewall appliance
  • Critical Products (Art. 8, Annex IV)
    • e.g. HSM appliance

How do the Security Levels Affect my Activities?

All assurance levels must comply with Annex I, i.e. all activities must always be carried out.

The difference between the assurance levels lies in the design of the product, which must guarantee a level of cybersecurity appropriate to the assurance level (Annex I Part I para. 1), and in the conformity assessment procedure (Annex VIII).

Which Standards Must I Comply with?

At present, there are no harmonized standards for the regulation. Harmonized standards are technical standards that are recognized by the EU Commission and enable a legally simplified conformity assessment.

Until such harmonized standards are published, manufacturers can fall back on established standards such as the IEC 62443 series of standards.

How do I Demonstrate Compliance?

Can the Proof of Compliance be Provided by Myself?

This is possible for products at the „Standard/Basic” security level (Art. 32 para. 1, Endnote 91). The associated procedure (Module A) is described in Annex VIII Part I and requires:

  • ensuring that the design, development, manufacture and treatment of vulnerabilities correspond to the CRA
  • drawing up the technical documentation in accordance with Annex VII
  • affixing the conformity marking (CE marking) and drawing up the EU declaration of conformity

The manufacturer must ensure and declare on his own responsibility that the CRA is complied with. See also „Do I need processes for this? Why? Which ones?” and „What are the penalties for non-compliance with the CRA?”.

How do I prove the conformity of my product?

The proof of conformity depends on the safety level of the product.

Standard/Basic Products

  • see above

All higher safety levels require the involvement of a notified body.

Important Products (Class I) (Art. 32 para. 2)

  • EU type examination (module B) according to Annex VIII, part II and Conformity to type (module C) according to Annex VIII, part III.
    • This corresponds to the standard procedure for obtaining the CE marking.

or

  • Conformity based on full quality assurance (module H) according to Annex VIII, part IV
    • The quality system must be approved and regularly inspected by a notified body.
    • This procedure allows the manufacturer to certify conformity based on the approved quality system on behalf of the notified body.

Important Products (Class II) (Art. 32 para. 3)

  • According to module B and module C and module H (see Class I)

Critical Products (Art. 32 para. 4)

  • Requires a European CybersecurityCertificate, at least assurance level “medium” according to Regulation EU 2019/881

What do I Have To Do in Product Development?

The central element of the CRA is the assessment of cybersecurity risks. This document is created at the beginning of product development and then regularly updated (Art. 13 para. 2, 3).

The product development (planning, design, development phase) must take into account the results of the risk analysis in order to minimize the cybersecurity risks, prevent security incidents and minimize the impact of security incidents.

The product must be designed, developed and manufactured in such a way as to ensure an appropriate level of cybersecurity in view of the risks.

The cybersecurity requirements (Annex I Part I) must be met. Among other things, the following are required:

  • Security by Design and best practices for a secure (software) development cycle
  • Security by Default (e.g. secure standard configuration
  • Minimization of potential attack surfaces
  • Protection against unauthorized access
  • Confidentiality, integrity and availability (e.g. secure boot)
  • Protection of personal data
  • Logging of security-relevant data and events

The Technical Guideline TR-03183-1 of the BSI describes the state of the art in detail.

Is a software bill of materials required?

A software bill of materials (SBOM) is mandatory and must be provided in a machine-readable format (Annex I Part II para. 1). Possible formats are CycloneDX or SPDX.

Technical Guideline TR-03183-2 of the BSI describes the requirements for an SBOM in detail.

What do I Have To Do During the Product's Lifespan?

Annex I sets out the requirements for the manufacturers of a product that must be fulfilled throughout the entire lifespan of the product.

The cybersecurity risk assessment must be constantly updated during this phase (manufacturing, delivery and maintenance phase) (Part I Section 2).

No products with known exploitable vulnerabilities may be made available on the market. This is to be ensured by active measures (Part II, para. 3). A software BOM helps here (Part II, para. 1).

Once a vulnerability has been identified, it must be reported and closed immediately. A process must be in place and followed to ensure this (Part II, para. 5).

Security updates must be provided free of charge in a timely and secure manner, preferably separate from functional updates (Part II, sections 2, 7). The aim should be to update the software automatically and securely (Part II, section 7).

Third parties must be able to easily point out vulnerabilities in the product (Part II, Section 6). The security.txt quasi-standard, which is also recommended by the Federal Office for Cyber Security (BACS), is suitable for this purpose.

I have Discovered a Vulnerability! What do I Have to Do?

A detected vulnerability must be reported and closed immediately.

The report must include a description of the vulnerability with information that allows the user to identify the affected product, the impact of the vulnerability, and its severity.

A machine-readable report is desirable because manual evaluation is time-consuming. The Common Security Advisory Framework (CSAF) is a standardized and open-source framework for communicating and automatically distributing machine-processable vulnerability and mitigation information.

The technical guideline TR-03183-3 of the BSI and the associated guideline provide information on how to deal with vulnerability reports.

What Documentation do I need to Generate?

The documentation is divided into two parts:

  • Technical documentation
  • User documentation

The technical documentation must contain all relevant data or details of how the manufacturer ensures that the product complies with the CRA (Art. 31 para. 1).

The technical documentation must be complete and written in easily understandable language and made available to the market surveillance authorities upon request (Articles 53, 58). It must enable the market surveillance authorities to understand the design, development, manufacture and handling of vulnerabilities (Article 31 (2)).

The technical documentation shall include at least (Annex VII):

  • general description of the product
  • Description of the design, development and manufacturing of the product
  • Description of the vulnerability management process
  • Cybersecurity risk assessment
  • Information taken into account in determining the support period referred to in Art. 13 para. 8
  • A list of the harmonized standards applied in full or in part, or a description of the solutions adopted to meet the essential cybersecurity requirements set out in Annex I
  • Reports on the tests and inspections carried out
  • EU declaration of conformity
  • Software bill of materials

The documentation must be prepared before the product is placed on the market and updated throughout the entire life of the product (Art. 31 para. 2).

Chapter 6 of the Technical Guideline TR-03183-1 of the BSI goes into the documentation requirements in detail.

 

Alois Cavelti

Do you have additional questions? Do you have a different opinion? If so, email me  or comment your thoughts below!

Author

Comments

No Comments

What is Your Opinion?

* These fields are required

Projects? Ideas? Questions? Let's do a free initial workshop!