April 15, 2024 – Reading time: 8 minutes
The Cyber Resilience Act (CRA), recently approved by the European Parliament, represents a significant step forward in bolstering cybersecurity across the European market. As digitization continues to shape our lives, ensuring the security and resilience of digital products becomes paramount.
Since the first legislative publication of the proposal in 2022, the adoption on 12th March 2024 updates several key aspects of the CRA. Let’s explore its implications for consumers, businesses, and the broader cybersecurity landscape.
1. Defining Product Categories
One significant update within the Cyber Resilience Act is the reclassification of products into “Important” and “Critical”.
“Important products” are those which fulfill essential functions. The focus on such products highlights their role in maintaining the integrity and reliability of operations, emphasizing the need for stringent checks to mitigate risks associated with digital vulnerabilities.
“Critical products” on the other hand, are deeply integrated with cybersecurity measures and are identified by their potential to pose a significant threat if compromised. These products are crucial for the safeguarding of key digital and physical infrastructures, demanding heightened security protocols to protect against cyber threats.
2. Strengthening Incident Response
To ensure a strong incident response Articles 14-17 of the CRA assign responsibilities:
Manufacturers must report to the product users and designated coordinators – the Computer Security Incident Response Team (CSIRT) – and the European Union Agency for Cybersecurity (ENISA) through a unified reporting platform about any actively exploited vulnerability in their products containing digital elements. Reports must be made within specified deadlines and include various information, for example the severity of the vulnerability and provided corrective measures.
ENISA may use reported information for coordinated management of cybersecurity incidents, whereas a CSIRT should inform the public about security incidents. ENISA produces technical reports on cybersecurity trends based on the received reports. CSIRTs can provide support for manufacturers in fulfilling their reporting obligations.
3. Streamlining Responsibilities
With Article 18 of the CRA, manufacturers have the option to appoint authorized representatives who can undertake a significant portion of the manufacturer’s tasks. This provision creates possibilities for commercial offerings and facilitates smoother operations within the supply chain.
4. Standardization and Certification
Article 27 lays the groundwork for ensuring product conformity with digital elements by relying on harmonized standards. It mandates European standardization organizations to develop these standards, aligning them with the fundamental requirements outlined in Annex I of the regulation. Additionally, the Commission is granted authority to enact implementing acts, which serve to define technical specifications in cases where harmonized standards are lacking or fail to meet requirements.
Article 32 states that manufacturers are tasked with assessing conformity with the essential requirements outlined in Annex I through specified procedures. These include internal control procedures, EU-type examination procedures followed by conformity assessments based on internal production control, comprehensive quality assurance assessments, or compliance with European cybersecurity certification schemes where applicable. The article further details the assessment procedures for different classes of products and specifies options for manufacturers of open-source software, Electronic Health Records (EHR) systems, and critical products with digital elements. Additionally, it highlights considerations for fee structures, particularly for small and medium-sized enterprises (SMEs), ensuring they are proportionate to their interests and needs.
5. Transitional Period and Support
One notable aspect of the CRA is the delineation of transition periods ranging from 6 to 36 months, depending on the product category. This extended timeframe aims to facilitate a smooth transition towards compliance, mitigating any potential disruptions to business operations.
Regarding the support of released products, the manufacturer must provide security updates, documentation of the product, and keep user manuals available for at least 10 years. If the product is used for less than 5 years, the manufacturer must provide support until the end of the product’s life cycle.
6. Empowering Small Enterprises
In alignment with the diverse business ecosystem, the Cyber Resilience Act introduces a comprehensive suite of measures specifically designed to empower SMEs. These initiatives range from specialized training and awareness sessions, aimed at enhancing understanding and implementation of regulatory requirements, to the creation of dedicated communication channels.
Further bolstering this support framework, the CRA advocates for the establishment of cybersecurity laboratories. These real-life labs offer SMEs a unique opportunity to test and refine their digital products in controlled environments, ensuring compliance and enhancing their market readiness. The provision of technical support and guidance from the European Commission and ENISA underscores a commitment to fostering innovation while maintaining cyber resilience.
Conclusion
The Cyber Resilience Act represents a significant milestone in promoting digital security within the European market. The CRA’s recent adoption highlights a commitment to addressing evolving cyber threats and enhancing overall digital security.
The CRA introduces updates and provisions aimed at bolstering cyber resilience. This includes reclassifying product categories, streamlining responsibilities, and emphasizing standardization and certification. Furthermore, the act empowers SMEs by providing tailored support and transitional periods.
Moving forward, stakeholders must remain vigilant in implementing the CRA’s provisions. By prioritizing cybersecurity, we can build a more resilient digital ecosystem that protects consumers and businesses against emerging cyber threats.
Annex I – Basic Requirements for products with digital elements
- Products with digital elements must ensure an adequate level of cybersecurity
- Providing products without known vulnerabilities and with secure default configurations
- Timely security updates must be offered, with the option for users to reset products to their original state
- Protection against unauthorized access and data encryption
- Measures to maintain data integrity and report unauthorized alterations
- Products should limit data processing to what is necessary and minimize potential attack surfaces
- Mitigation mechanisms should be in place to reduce the impact of security incidents
- Manufacturers must promptly identify, document, and address vulnerabilities, sharing information about resolved issues
- Coordinated vulnerability disclosure strategies and mechanisms for information exchange about vulnerabilities should be established
- Secure distribution of updates and free dissemination of security patches with relevant guidance are imperative
- Users should have the capability to permanently delete data and transfer it securely to other systems
If you need further support in adopting the new measures of the Cyber Resilience Act for your own business our Cybersecurity Department is happy to help.
Learn more
Cybersecurity
Systems Engineering
Cybersecurity
Mergers & Acquisitions