Understand what the CRA entails and how to comply.
The Cyber Resilience Act (CRA) is an upcoming European Union regulation that aims to ensure that all digital products and services (such as software and hardware connected to the Internet) sold in the EU are designed with strong cybersecurity measures. It mandates that manufacturers secure their products throughout their lifecycles.
The CRA applies to all “products with digital elements” (PDE), which includes any software or hardware product and its remote data processing solutions. “Remote data processing” is any data processing that is a core functionality of the product (without which the PDE can’t fulfill its function) and developed by the PDE manufacturer. PDEs can stem from:
Certain sectors, such as professional medical devices, motor vehicles, civil aviation systems, and marine equipment, are excluded from the CRA due to existing regulations.
The European Parliament (EP) adopted a “provisional” version of the CRA’s final text on March 12, 2024. However, this is still not the final version of the document. The CRA’s official signature and its publication are expected to happen around October 2024.
Once the final text is officially adopted, the majority of it will be enforceable after three years (approximately October 2027). However, the incident reporting requirements will apply to manufacturers as soon as two years after enactment (October 2026).
Prior to the date of application of the CRA, the EU will develop harmonized standards to better enable manufacturers to perform conformity assessments [Recitals 38-38a, 41-41d]. The EU Commission will also publish guidelines to assist companies with applying the CRA [Art. 17c; Recital 4a].
Under Annex 1, the CRA security requirements are in two parts:
Article 10 of the document describes the manufacturer’s obligations in relation to the requirements above. To place the PDE on the market, manufacturers will need to craft a risk assessment for the PDE, which will be documented and updated regularly. The assessment needs to include the following:
When placing a PDE on the market, the manufacturer should include this information in the product’s technical documentation.
Apart from the risk assessment:
Article 11 in the document lays out the guidelines for incident reporting in PDEs. Manufacturers must give notice of any actively exploited vulnerability in their products to the designated CSIRT (Computer Security Incident Response Team) coordinator and ENISA (The European Union Agency for Cybersecurity) via a single reporting platform within specified time frames (24 hours for an initial alert, 72 hours for a detailed report, and 14 days for a final report).
Similarly, severe security incidents must also be reported within 24 hours for an initial alert, 72 hours for detailed information, and one month for a comprehensive final report, with the notifications submitted to both the CSIRT and ENISA through the same platform.
Default Category: This includes all products with digital elements that do not fall into the higher-risk categories. Products in this category generally require a self-assessment by the manufacturer.
Important Products (Class I and Class II):
Critical Products: These products pose the highest risk in terms of cybersecurity vulnerabilities and potential impact. They are subject to the most stringent conformity assessment procedures, including mandatory third-party evaluations and possibly more frequent reassessments
The conformity assessment process under the CRA is designed to verify that products comply with the specified cybersecurity requirements. The complexity of the assessment depends on the product’s classification. Here are the steps involved:
Non-compliance with the CRA can result in significant fines. Manufacturers and other stakeholders could face fines up to €15 million or 2.5% of their total worldwide annual turnover, whichever is higher. There are also specific penalties for providing inaccurate or misleading information to regulatory bodies.
Learn more about how Legit is helping enterprises comply with cybersecurity regulations.
*** This is a Security Bloggers Network syndicated blog from Legit Security Blog authored by Neta Spektor. Read the original post at: https://www.legitsecurity.com/blog/what-you-need-to-know-about-the-eu-cyber-resilience-act