The Cyber Resilience Act (CRA) is a legislative initiative by the European Union aimed at enhancing the cybersecurity of products with digital elements. The CRA establishes a uniform legal framework to ensure that hardware and software products are designed, developed and maintained with robust cybersecurity measures in place throughout their lifecycle. This regulation is intended to mitigate the risks posed by cyberattacks, which can have significant impacts on the economy, democracy, consumer safety and health. The CRA mandates that manufacturers adhere to essential cybersecurity requirements, conduct risk assessments and provide security updates, thereby fostering a more secure digital environment across the EU.
The CRA was approved on 17 September 2024 by the European Parliament. The Council will now formally adopt the final act. The CRA will then be published in the Official Journal of the EU, probably around late November/early December 2024.
The CRA covers a wide range of products that include digital elements, which are defined as any software or hardware product and its remote data processing solutions that involve a direct or indirect logical or physical data connection to a device or network. Here are some examples of such products (list is not exhaustive)
Smartphones and tablets are quintessential examples of products with digital elements. These devices connect to networks and other devices, making them susceptible to cybersecurity threats.
The CRA categorises products with digital elements into different classes based on their cybersecurity risk and functionality. These classifications help determine the level of scrutiny as well as the type of conformity assessment required for each product.
Critical products are products that have a significant cybersecurity-related functionality and pose a high risk if compromised. These products are essential for the security of other systems and services, and their failure could lead to severe disruptions. Examples of Critical Annex IV products include:
Conformity assessment: Critical products must undergo a rigorous conformity assessment. If a European cybersecurity certification scheme is available, these products must obtain a European cybersecurity certificate. If no such scheme is available they must follow the same procedures as Important Class II products, which involve third-party assessments.
Important Class II products are products that perform critical cybersecurity functions or have a high potential for adverse effects if compromised. These products are crucial for maintaining the security of other systems and services. Examples of Important Class II products include:
Conformity assessment: Important Class II products require a third-party conformity assessment. This can be done through an EU-type examination procedure (Module B), followed by conformity to EU-type based on internal production control (Module C) or a conformity assessment based on full quality assurance (Module H).
Important Class I products also perform essential cybersecurity functions, but are considered to have a lower risk compared to Class II products. These products are still vital for the security of systems and services, but do not pose as high a risk if compromised. Examples of Important Class I products include:
Conformity assessment: If a harmonised standard is available, Important Class I need to comply with it. If these standards are not fully available then a third-party assessment is required, similar to Important Class II products.
Default products are those that do not fall into the Critical or Important categories. These products are still subject to the CRA, but may have different compliance requirements. They typically undergo an internal assessment by the manufacturer to ensure they meet the essential cybersecurity requirements.
The requirements affect various parties involved in the lifecycle of these products, from design and development through to distribution and market surveillance.
The most stringent requirements exist for manufacturers, which include for example:
For distributors and importers, the following applies:
A manufacturer is a natural or legal person who develops or manufactures products with digital elements or has products with digital elements designed, developed or manufactured and markets them under its name or trademark, whether for payment, monetisation or free of charge.
An importer is a natural or legal person established in the European Union who places a product with digital elements on the market that bears the name or trademark of a natural or legal person established outside the Union.
A distributor is a natural or legal person in the supply chain, other than the manufacturer or the importer, that makes a product with digital elements available on the European Union market without affecting its properties.
In summary,
The CRA establishes stringent requirements for the cybersecurity of products with digital elements. Non-compliance with these requirements can lead to significant consequences for manufacturers, importers, distributors and other economic operators. This includes:
The CRA leverages existing standards, particularly those from ISO, to establish a robust cybersecurity framework for products with digital elements. While no single standard comprehensively covers all CRA requirements, the combination of various standards provides a strong foundation for compliance. Therefore, even if certain products are complying with standards such as for example ISO, it is still relevant to check for potential gaps in relation to the CRA.
To comply with the CRA, manufacturers must undertake several key actions: