EBV_12 Expert Tips CRA
EBV_12 Expert Tips CRA
EBV_12 Expert Tips CRA
Resilience Act
12 EXPERT TIPS FOR TODAYS
PRODUCT DEVELOPMENT
1
Key Insights from our
Expert Panel Discussion
The following 12 tips are the outcome
of our recent panel discussion, “Practical
Impacts of the Cyber Resilience Act (CRA)
on Product Development,” with leading
industry experts. It highlights critical
requirements for product development
under the CRA, offering essential con-
siderations to help ensure connected
products are secure from design through
to deployment.
2
Our Experts
Julien Bernet,
Security Manager, Witekio
”
critical infrastructure.
”
long-term benefit is significant.
3
Daniel Bartz,
FAE Security & Identifica-
tion, EBV Elektronik GmbH
”
code as if it were your own.
4
Strengthening Cyber-
security Across Europe
The Cyber Resilience Act represents a
landmark effort to bolster cybersecurity
across Europe, applying to all con
nected products, including critical com
ponents within the All Electric Society.
With cyberattacks on energy utilities
doubling between 2020 and 2022, the
urgency for robust cyber protection has
never been higher. Recent incidents –
such as the hacking of wind farms and
breaches in electricity meter systems –
underscore the vulnerabilities present
in modern power infrastructures, which
impact sensitive customer data and
essential services. The International En-
ergy Agency reports that the energy
sector alone saw an average data breach
cost of 4.72 million US dollars in 2022,
highlighting the financial stakes of these
security threats.
5
EMBEDDING SECURITY FROM
THE START
To address these challenges, the CRA
mandates manufacturers to prioritize
security from the earliest stages of
product design. “The need for cyber
security affects the entire power grid,
from distribution networks to renewable
energy sources,” says Frances Cleveland,
Head of the International Electrotech
nical Commission’s (IEC) Cybersecurity
Committee, emphasizing the impor-
tance of “secure by design” principles.
This approach, detailed in standards
like IEC 62351, ensures that products
are equipped with cybersecurity
protections from the outset, rather
than as retrofits.
6
requirements to receive CE marking
for sale in the EU. The Act introduces a
risk-based approach, differentiating
products by criticality, with high-risk
products facing more stringent asses
sments. Manufacturers will have
36 months to comply, ensuring they
implement robust security practices
and maintain them throughout the
product lifecycle. The CRA’s stringent
standards aim to reduce vulnerabilities
across both hardware and software,
creating a safer and more resilient Europe.
7
12 Tips to Consider as
Manufacturer
1.
OUR TIP
Even if your product isn’t inter-
net-connected today, design
with future connectivity in mind
to avoid costly redesigns later.
8
12 Tips to Consider as
Manufacturer
2.
OUR TIP
Identify early which product cat-
egory (critical or important) your
product falls into and plan certi
fication processes accordingly to
avoid delays in market entry.
9
12 Tips to Consider as
Manufacturer
3.
OUR TIP
When using third-party compo-
nents or open-source software,
demand security documentation
and updates from your suppliers
to streamline CRA compliance.
10
12 Tips to Consider as
Manufacturer
4.
OUR TIP
Consider outsourcing compliance
tasks to specialized third-party
cybersecurity auditors to manage
the burden of CRA without having
to build an in-house team.
11
12 Tips to Consider as
Manufacturer
5.
OUR TIP
Provide clear user guides and
disclaimers on how your product is
intended to be used to minimize
liability for misuse under the CRA.
12
12 Tips to Consider as
Manufacturer
6.
OUR TIP
Start building your SBOM now, using
formats like Cyclone DX or SPDX,
and automate the process of
updating it with each new product
version.
13
12 Tips to Consider as
Manufacturer
7.
VULNERABILITY MANAGEMENT
The CRA requires manufacturers to
report vulnerabilities within 24 hours and
provide ongoing updates until a fix is
available. Manufacturers must also pro-
vide customers with interim solutions
to mitigate risks if a full fix is not imme-
diately available.
OUR TIP
Establish a vulnerability response
process now, including a system
for immediate reporting and cus-
tomer communication to ensure
compliance with CRA timelines.
14
12 Tips to Consider as
Manufacturer
8.
COMPLIANCE TIMELINE
The CRA provides a 36-month transition
period, during which existing products
can continue to be sold. However, by the
end of the grace period, all products
must be fully CRA-compliant.
OUR TIP
Begin CRA compliance prepara-
tion early by auditing your current
products and identifying any gaps
that will need to be addressed
within the 36-month window.
15
12 Tips to Consider as
Manufacturer
9.
OUR TIP
Focus on secure design from the
start, incorporating secure ele
ments (like hardware security
modules) and encryption key
management to streamline future
compliance.
16
12 Tips to Consider as
Manufacturer
10.
OUR TIP
Start aligning your product design
and testing with existing standards
such as EN 303645 and consider
early certification through exist-
ing schemes to ensure a smoother
CRA transition.
17
12 Tips to Consider as
Manufacturer
11.
OUR TIP
Plan for secure integration of legacy
systems with connected devices
by updating IoT components to
meet CRA compliance while main-
taining core legacy operations.
18
12 Tips to Consider as
Manufacturer
12.
OUR TIP
Set up processes for continuous
monitoring and patching, ensuring
your product’s cybersecurity
remains compliant throughout
its entire lifecycle, especially for
long-lived industrial products.
19
For tailored guidance
on implementing
the Cyber Resilience
Act in your product
development, contact
EBV Elektronik today.
GET IN TOUCH
20