Time to Read 6 min
The entry into force of the Cyber Resilience Act (CRA) means that almost no electronic product can be developed without taking cybersecurity into account, without a dam to the internet.
What does this mean for you as a development manager, project manager, or developer? ? We have compiled information here on various aspects of the CRA. Please feel free to contact me if you have any further questions!
For general information about CRA, see CRA General.
The CRA distinguishes between four levels:
All assurance levels must comply with Annex I, i.e. all activities must always be carried out.
The difference between the assurance levels lies in the design of the product, which must guarantee a level of cybersecurity appropriate to the assurance level (Annex I Part I para. 1), and in the conformity assessment procedure (Annex VIII).
At present, there are no harmonized standards for the regulation. Harmonized standards are technical standards that are recognized by the EU Commission and enable a legally simplified conformity assessment.
Until such harmonized standards are published, manufacturers can fall back on established standards such as the IEC 62443 series of standards.
This is possible for products at the „Standard/Basic” security level (Art. 32 para. 1, Endnote 91). The associated procedure (Module A) is described in Annex VIII Part I and requires:
The manufacturer must ensure and declare on his own responsibility that the CRA is complied with. See also „Do I need processes for this? Why? Which ones?” and „What are the penalties for non-compliance with the CRA?”.
The proof of conformity depends on the safety level of the product.
All higher safety levels require the involvement of a notified body.
or
The central element of the CRA is the assessment of cybersecurity risks. This document is created at the beginning of product development and then regularly updated (Art. 13 para. 2, 3).
The product development (planning, design, development phase) must take into account the results of the risk analysis in order to minimize the cybersecurity risks, prevent security incidents and minimize the impact of security incidents.
The product must be designed, developed and manufactured in such a way as to ensure an appropriate level of cybersecurity in view of the risks.
The cybersecurity requirements (Annex I Part I) must be met. Among other things, the following are required:
The Technical Guideline TR-03183-1 of the BSI describes the state of the art in detail.
A software bill of materials (SBOM) is mandatory and must be provided in a machine-readable format (Annex I Part II para. 1). Possible formats are CycloneDX or SPDX (System Package Data Exchange).
Technical Guideline TR-03183-2 of the BSI describes the requirements for an SBOM in detail.
The CRA requires manufacturers to assess the cybersecurity risks of their products (Art. 12 para. 2). The BSI technical guidelines TR-03183 (“Cyber Resilience Requirements for Manufacturers and Products”) provide an approach (in accordance with ISO 31000) that can be summarized as follows:
This analysis must be documented and maintained.
The following measures, among others, ensure that vulnerabilities are identified:
The documentation is divided into two parts:
The technical documentation must contain all relevant data or details of how the manufacturer ensures that the product complies with the CRA (Art. 31 para. 1).
The technical documentation must be complete and written in easily understandable language and made available to the market surveillance authorities upon request (Articles 53, 58). It must enable the market surveillance authorities to understand the design, development, manufacture and handling of vulnerabilities (Article 31 (2)).
The technical documentation shall include at least (Annex VII):
The documentation must be prepared before the product is placed on the market and updated throughout the entire life of the product (Art. 31 para. 2).
Chapter 6 of the Technical Guideline TR-03183-1 of the BSI goes into the documentation requirements in detail.
Yes, processes are required for all products with digital elements in accordance with CRA. Not having defined processes makes CRA compliance a huge challenge. The processes ensure that cybersecurity risks are systematically identified, assessed, remedied, and tracked throughout the product lifecycle, and they provide documented evidence that you are meeting the legal requirements (CRA, Art. 13(2–3)).
The CRA is not just a checklist for software features, but regulates the entire life cycle of a product. While technical security features are important, the EU regulation focuses heavily on how you as a company manage security in the long term, i.e. what working methods („processes”) you have established.
Even if a risk assessment only reveals acceptable risks, processes such as incident management, vulnerability handling, and secure updates are necessary, as new vulnerabilities and unexpected threats may arise after the product is released (CRA, Art. 13(6–8); Art. 14).
Here are the key process areas you need to establish or adapt:
Before a product is released to the market, the CRA requires you to:
This is one of the most important points of the CRA. Find, document, prioritize, and fix vulnerabilities. Maintain an up-to-date SBOM and support coordinated disclosure (CRA, Art. 13(6–8)).
You must be able to create and maintain an SBOM for each product.
Depending on the risk class of your product, you must demonstrate that you meet the requirements:
The CRA stipulates that you must provide security updates for a specified period of time. This period must be at least 5 years, but may be longer if the product has a longer expected lifespan. Monitor and update the product and its components throughout its expected lifespan (CRA, Art. 13(8–9)).

is Dipl. Ing./BSc ZFH in Informatik and develops software ranging from sensors to the cloud. His professional career is characterized by a deep curiosity for innovation and everything new in the digital world. To balance his everyday work with technology, he keeps fit and active by participating in a wide range of sports.

is Dipl. Elektroingenieur FH , co-founder, deputy managing director and software developer. He is a specialist for architectures and software in C, C++ and C#. He is committed to maintainable architecture, security and clean code. For this he likes to look beyond the "embedded" edge of his nose into other areas of software development. He is interested in overall systems of any kind and their interrelationships. Alois manages a 5'000 m2 biodiversity island and brings nature, horses and humans in harmony. He loves good (movie) stories and good food.
Projects? Ideas? Questions? Let's do a free initial workshop!
No Comments