Key Compliance Requirements Under the Cyber Resilience Act
Sara Magdalena Goldberger, CIPP/E, CIPM Global Lead Privacy, GRC, Cybersecurity
Privacy | Data Management | AI Governance | |Risk management | Privacy Governance | Functional CISO
As the Cyber Resilience Act (CRA) comes into force, businesses across the digital ecosystem will need to adapt to meet a variety of new compliance requirements. These regulations, designed to boost the security of digital products, set out a clear framework for manufacturers, importers, and distributors of digital products. In this post, we’ll break down the key compliance requirements under the CRA, helping you understand what you’ll need to do to ensure your products and operations align with these new standards.
1. Security by Design and Default
One of the cornerstone principles of the CRA is #security-by-design and #security-by-default. This means that cybersecurity measures must be integrated into the product development process from the very beginning, and products must be secure out of the box, with no need for customers to adjust settings.
For businesses, this means:
2. Ongoing Risk Management and Updates
The CRA requires that digital products not only be secure at launch but remain secure throughout their lifecycle. Companies are required to establish systems for ongoing risk management, including regular software updates, security patches, and incident monitoring.
Key considerations include:
3. Incident Reporting Requirements
The CRA mandates that businesses report significant cybersecurity incidents within 24 hours of detection. This is a tight deadline that requires businesses to have an effective incident detection and response system in place.
Compliance entails:
4. Documentation and Transparency
Transparency is a key component of the CRA, with businesses required to maintain thorough documentation of their compliance activities. This includes maintaining a record of risk assessments, security measures, and incident reports, which must be made available to relevant authorities upon request.
The key steps here are:
5. Supply Chain Accountability
Under the CRA, businesses must ensure that their suppliers and subcontractors comply with the same cybersecurity standards. This extends to ensuring that any third-party components, services, or software used in your product meet CRA requirements.
To meet this requirement, you’ll need to:
6. Vulnerability Disclosure
The CRA establishes a framework for companies to disclose vulnerabilities in their products to both customers and authorities. This process aims to ensure that risks are identified and addressed before they are exploited.
Companies must:
Final Thoughts
Meeting the compliance requirements of the CRA is no small task, but it’s a crucial step towards enhancing the security and trustworthiness of your digital products. By integrating security by design, maintaining robust documentation, and implementing proactive risk management strategies, you can ensure that your company meets the new EU standards, safeguarding both your business and your customers.