On 10 October 2024, the European Council officially adopted the Cyber Resilience Act
Check your readiness with this quick checklist, which is based solely on primary document of EU CRA PE-CONS 100/1/23 REV 1.
Article 13: Obligations for manufacturers
-
This is a branching requirement, involving risk assessment, vulnerability handling(?)For the purpose of complying with paragraph 1, manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases of the product with digital elements with a view to minimising cybersecurity risks, preventing incidents and minimising their impact, including in relation to the health and safety of users.Risk assessments need to be kept current with major changes to the product, and maintained during support period (minimum 10 years)
-
Ensure that these components do not compromise the cybersecurity of the product. Think SBOM and vulnerability handling requirements
-
(?)Manufacturers shall, upon identifying a vulnerability in a component, including in an open source-component, which is integrated in the product with digital elements report the vulnerability to the person or entity manufacturing or maintaining the component, and address and remediate the vulnerability in accordance with the vulnerability handling requirements set out in Part II of Annex I. Where manufacturers have developed a software or hardware modification to address the vulnerability in that component, they shall share the relevant code or documentation with the person or entity manufacturing or maintaining the component.Where appropriate, share the documentation with the concerned manufacturer or software maintainer.
-
-
Detailed vulnerability handling section to follow.
-
(?)Manufacturers shall ensure that each security update, as referred to in Part II, point (8), of Annex I, which has been made available to users during the support period, remains available after it has been issued for a minimum of 10 years or for the remainder of the support period, whichever is longerDetailed vulnerability handling section to follow.
-
Will be detailed in separate chapter.
-
-
-
-
(?) Manufacturers shall indicate the name, registered trade name or registered trademark of the manufacturer, and the postal address, email address or other digital contact details, as well as, where applicable, the website where the manufacturer can be contacted, on the product with digital elements, on its packaging or in a document accompanying the product with digital elements. That information shall also be included in the information and instructions to the user set out in Annex II. The contact details shall be in a language which can be easily understood by users and market surveillance authorities.For the purposes of this Regulation, manufacturers shall designate a single point of contact to enable users to communicate directly and rapidly with them, including in order to facilitate reporting on vulnerabilities of the product with digital elements. The single point of contact shall allow users to choose their preferred means of communication and shall not limit such means to automated toolsUser-friendly and available online for at least 10 years after the product with digital elements has been placed on the marketAt minimum year and month has to be specified.Where a simplified EU declaration of conformity is provided, it shall contain the exact internet address at which the full EU declaration of conformity can be accessed.(?)The Commission may, by means of implementing acts taking into account European or international standards and best practices, specify the format and elements of the software bill of materials referred to in Part II, point (1), of Annex I. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 62(2).
Essential Cybersecurity Requirements
Architecture
-
Risks should be identified in risk assessment.
-
Prepare key points and updates beforehand
-
Unless otherwise agreed between manufacturer and business user in relation to a tailor-made product.
-
Ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-out mechanism, through the notification of available updates to users, and the option to temporarily postpone them.
-
Ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access
-
Protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means.
-
Protect the integrity of stored, transmitted or otherwise processed data, personal or other, commands, programs and configuration against any manipulation or modification not authorised by the user, and report on corruptions.
-
Process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements
-
Protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks.
-
-
Be designed, developed and produced to limit attack surfaces, including external interfaces, open ports, APIs, endpoints.
-
Concepts such as graceful failure, preserving vital functions in degraded mode, preserving safety functionality, limiting effects on other components.
-
Provide security related information by recording and monitoring relevant internal activity, including the access to or modification of data, services or functions, with an opt-out mechanism for the user.
-
Provide the possibility for users to securely and easily remove on a permanent basis all data and settings and, where such data can be transferred to other products or systems, ensure that this is done in a secure manner.
-
Machine readable SBOM required covering at the very least the top-level dependencies.
-
-
Where technically feasible, new security updates shall be provided separately from functionality updates.
-
Include a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities; in duly justified cases, where manufacturers consider the security risks of publication to outweigh the security benefits, they may delay making public information regarding a fixed vulnerability until after users have been given the possibility to apply the relevant patch
-
-
Provide a contact address for the reporting of the vulnerabilities discovered in the product.
-
Ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner.
-
The updates are free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product.
Vulnerability handling
Instructions to user
-
The website shall provide contact for the user.Consider documenting possible misuse, incorrect set-up, disabling security functionality or using bad practices.Consider documenting possible misuse, incorrect set-up, disabling security functionality or using bad practices.
-
As required by Part I, point (2)(c), of Annex I for automatic updates.
-
For example SBOM may be shipped within a product or maintained on a website.
Technical documentation
The below documentation should be produced if you are meeting Essential Requirements. While repetetive, these documents are meant for the relevant EU authorities. Make sure your processes are not only followed, but also produce the right artifacts.
The documentation shall contain at least the following information:-
-
-
Part I of Annex I lists the essential requirements, also provided in detail in previous checklist.
-
-
In the event of partly applied harmonised standards, common specifications or European cybersecurity certification schemes, the technical documentation shall specify the parts which have been applied.
-
-
-
Global Completion
Made with Claude AI