Navigation and service

Cyber Resilience Act

Cybersecurity in the EU

The Cyber Resilience Act is the first European regulation to set a minimum level of cyber security for all connected products available on the EU market - something that did not exist before. The aim is to increase cybersecurity within the European Union. The new regulation applies in all EU Member States and will be implemented gradually.

These products are covered by the CRA

All products sold in the EU that contain ‘digital elements’ must fulfill the essential requirements of the CRA. This includes low-cost consumer products as well as B2B software and complex high-end industrial systems. ‘Products with digital elements’ are defined in the CRA as products that can be connected to a device or a network and include both hardware products with networked functions (e.g. smartphones, laptops, smart home products, smart watches, internet connected toys, but also microprocessors, firewalls and smart meters) and pure software products (e.g. accounting software, computer games, mobile apps). Non-commercial open source software products are exempt from the CRA and therefore do not have to fulfill the requirements of the CRA.

Off we go

The CRA enters into force 20 days after publication in the Official Journal of the EU. Implementation will take place in various stages. Products that have been newly placed on the market must meet all requirements by the end of 2027.

Graphics Cyber Resilience Act CRA
*CABs = Conformity Assessment Bodys Source: BSI

This needs to be done

All products with digital elements must fulfill a minimum level of cybersecurity. The process sounds complicated, but is based on the familiar CE mark. Manufacturers who already know and apply these verification processes have an advantage here.

  1. Take cybersecurity into account 
    The requirements of the CRA should already be taken into account during product development. Manufacturers must carry out a risk assessment for their products and address any cybersecurity risk. According to the conceptual principle of ‘security by design’, connected products must be designed with cybersecurity in mind, e.g. by ensuring that the data stored or transmitted with the product is encrypted and that the attack surface is as small as possible. In keeping with the ‘secure by default’ configuration principle, the default settings of networked products must contribute to increase their security, for example, by banning weak default passwords, by installing automatically security updates, etc. The mandatory handling of product vulnerabilities should already be considered during development. The basis for this is the integration of tools for creating a software bill of materials (SBOM). For software, a SBOM is the equivalent of a list of ingredients for food. It details which libraries and other software components are used in the product. The CRA demands the creation of a SBOM, but it does not have to be published.
  2. Prove requirements
    A declaration of conformity is required to prove that the product fulfills all the requirements of the CRA. Which conformity assessment procedure is used depends on the product category. For most products this is a self-assessment by the manufacturer, for a few it is an assessment by a notified third party body.
  3. Disclose vulnerabilities
    A new single reporting platform will be established for the easy exchange of information on actively exploited vulnerabilities and serious security incidents. These vulnerability reports must be submitted via this reporting platform.
  4. Secure during the entire support period
    Security updates must be made available to the end user and vulnerabilities must be handled throughout the entire product life cycle. This support period is generally 5 years.

Standard, important or critical - this applies!

Most of the products for which the CRA is relevant are standard products. Only products that are considered more sensitive from a cybersecurity perspective are labelled as ‘important’ or ‘critical’ products and are listed in Annexes III and IV of the regulation (e.g. password managers, firewalls, smart cards, smart meters, etc.).

SME or start-up - what about us?

Support for small and medium-sized enterprises, micro-enterprises and start-ups is directly provided for in the CRA. Among other things, there will be guidelines for implementation, helpdesks will be available to assist with reporting obligations, technical documentation may be simplified and regulatory sandboxes will be set up to test products with digital elements.

BSI provides the following support

In order to make the requirements of the CRA more tangible, BSI is developing a technical guideline in which interpretations of the requirements for manufacturers and products with regard to cyber resilience are clearly and specifically described.

In Part 1 ‘General Requirements’, guidance for manufacturers and products are compiled based on the requirements from the articles and annexes of the CRA,

Part 2 ‘Software Bill of Materials (SBOM)’ contains formal and technical specifications for SBOMs.

Part 3 ‘Vulnerability Reports and Notifications’ describes how to deal with incoming vulnerability reports.

Everything in short (in German): Management Blitzlicht

Note: Please note that the information provided here is for information purposes only and is not intended as legal advice. The legal text of the CRA takes precedence over the explanations given here.

FAQ