-
2. Conduct Comprehensive Cybersecurity Risk Management
- Risk Assessment based on intended purpose and reasonably foreseeable use
-
Threat Modeling
- Integration: Include threat modeling as a core part of the risk assessment process to systematically identify, categorize, and analyze potential threats.
- Methodologies: Use methodologies like OCTAVE Allegro, STRIDE, FAIR, or PASTA for evaluating threats.
- Tools: Utilize tools like Microsoft Threat Modeling Tool or OWASP Threat Dragon to support the threat modeling process.
-
Elements to Include
- Key Aspects: Cover intended purpose, conditions of use, expected lifespan.
- Impact Analysis : Emphasize the need for impact analysis to determine the potential consequences and risk appetite for identified risks.
- Documentation: Maintain documentation of the risk assessment process and outcomes using compliance management tools like LogicGate or RiskWatch.
-
Mitigation Strategies
- Tailor Strategies: Develop strategies for each phase of the product lifecycle.
- Security Controls and use of security requirements as defined in CRA Annex 1
-
Continuous Risk Monitoring
- Establish process for risk assessment
- Ongoing Monitoring: Regularly update risk assessments.
-
Risk Assessment Tools
- General Tools: Use FAIR, RiskWatch, and other risk management tools to facilitate the identification, analysis, and management of cybersecurity risks.
- Lifecycle Consideration: Evaluate risks across the entire product lifecycle, from design to decommissioning.
- Impact on Services: Assess the potential negative impact on the availability of services provided by other devices or networks.
- Standards: EN 303 645 and ISO 27005
-
3. Implement Secure Development and Compliance Practices
-
Secure Software Development
- Standards: Adhere to secure practices as outlined in OWASP, ISO/IEC 27001, IEC 62443-4-1, IEC 62443-4-2, and EN 303 645.
-
Security by Design
- Embed security from the design phase through end-of-life, following IEC 62443-4-1 and EN 303 645 standards.
-
Secure Development Lifecycle IEC 62443 4-1
- Security Management(Planning and Training)
- Security Requirements Specification
- Secure Design
- Secure Implementation
- Security Verification and Validaton
- Security Management During Maintenance
- Security Documentation
- Audits and Compliance
-
Secure Coding Standards
- Standards: IEC 62443-4-1, EN 303 645, OWASP Secure Coding Practices, CERT Secure Coding Standards
-
Secure Development Tools
- Utilize IDEs with built-in security features, code analysis tools like SonarQube, and static code analysis tools like Coverity, Coverity.
-
Secure Integration
- Standards: IEC 62443-4-1 and 4-2, EN 303 645
- Tools: Secure development environments, code review tools
- Ensure all components, including third-party and open-source software, meet security standards.
-
Security Testing
- Standards: IEC 62443-4-1
- Tools: Static code analysis tools, penetration testing tools(Metasploit, Burp Suite, Nessus, Wireshark etc.)
- Implement continuous security testing throughout the development process.
-
Supply Chain Security
- Use Black Duck or Snyk for third-party and OSS component analysis and management.
- IEC 62443-4-2: Ensure all components meet security standards.
- OWASP Dependency-Check: Use this tool to scan and manage third-party dependencies, ensuring that all components meet security requirements and do not introduce vulnerabilities into the product.
-
Training and Awareness Programs
- Incorporate best practices for continuous cybersecurity education among developers.
-
Data Minimization
- Continually assess and minimize the data used or processed by the product to ensure compliance with data minimization requirements.
- Standards: GDPR
- Tools: Data protection impact assessments
-
Resilience and Mitigation
- Include resilience and mitigation measures against denial-of-service attacks.
- Include reliable logging and monitoring.
-
Attack Surface Reduction
- Ensure products limit attack surfaces, including external interfaces based on risk and threat model.
-
Exploitation Mitigation
- Implement exploitation mitigation mechanisms and techniques to reduce the impact of incidents based on risk.
-
Secure by Default Configuration
- Guidelines for ensuring products are delivered with secure default settings.
-
Protection Mechanisms based on risk with use of EN 303 645 security requirements
- No Universal Default Passwords
- Keep Software Updated
- Securely Store Sensitive Security Parameters
- Communicate Securely
- Minimize Exposed Attack Surfaces
- Ensure Software Integrity
- Ensure that Personal Data is Protected
- Make Systems Resilient to Outages
- Examine System Telemetry Data
- Make it Easy for Users to Delete User Data
- Make Installation and Maintenance of Devices Easy
- Validate Input Data
- Access Control
- Tools: Configuration management tools and security standards as per IEC 62443-4-2 and EN 303 645
-
Update Management
- Include a clear and easy-to-use opt-out mechanism for automatic security updates, as well as options to temporarily postpone them.
- Where possible security updates should be separated from functional updates.
-
Secure Decommissioning
- Provide mechanisms and instructions for users to securely and easily remove all data and settings on a permanent basis.
-
Compliance Management
-
Establish compliance management process with templates and checklists.
- Define the needed documentation structure and artefacts such as risk assessment, test reports, technical documentation etc.
- Audit, Update and Review: Regularly audit and review compliance processes and documentation
-
Document Management
- Implement Systems: Utilize document management systems to maintain and manage compliance documentation effectively. These systems should support version control, secure storage, and easy retrieval of documentation.
- Examples: Systems like Microsoft SharePoint, Confluence, or specialized compliance management tools like LogicGate or MetricStream
-
Evidence Collection
- Collect and Maintain Evidence: Systematically collect and maintain evidence of compliance activities. This includes records of conformity assessments, test results, audits, and vulnerability management activities.
- Examples: Evidence might include test reports, audit findings, incident logs, and documented risk assessments.
-
Technical Documentation
-
Include Key Documents
- Cybersecurity Risk Assessments: Document the cybersecurity risk assessment process, including identified threats, vulnerabilities, and mitigation strategies.
- Software Bill of Materials (SBOMs): Maintain a comprehensive SBOM that lists all software components, including open-source and third-party libraries used in the product. This should include versioning and patch status.
- Security-Related Activity Records: Record internal security-related activities, such as access and modifications to data, services, or functions, ensuring transparency and traceability.
- General Description of the Product: Detailed description of the product, its intended use, and how it operates in relation to cybersecurity
- Design and Development Documentation: Information on how cybersecurity requirements were integrated during design and development.
- Test Reports: Detailed reports from security testing, including penetration tests, vulnerability scans, and regular security reviews.
-
EU Declaration of Conformity
- Preparation and Updates: Prepare the EU Declaration of Conformity to confirm that the product meets the essential requirements of the CRA. This document must be kept up-to-date with any changes or updates to the product.
-
5. Conformity, Maintain Continuous Security Assurance and Certification
-
Cybersecurity Certification
- European Certification Schemes: Obtain EUCC certification to demonstrate CRA compliance, particularly for critical products
- Continuous Surveillance: Maintain continuous surveillance by a notified body for critical products to ensure ongoing compliance with cybersecurity certification.
- Follow where applicable harmonized standards.
- ETSI EN 303 645 Cyber Security for Consumer Internet of Things: Baseline Requirements
-
User Information
-
Offer detailed user guides, instructions, and training on maintaining security.
- Installation of Security Updates
- Initial Commissioning and Secure Use
- Secure Decommissioning
- Integration Information
- Provide the user with information about the manufacturer, the product Intended Purpose and Security Environment.
- Provide a single point of contact for vulnerability reporting
- Impact of Changes on Security
-
Ongoing Compliance and Improvement
- Security Updates: Ensure automatic, timely, and secure distribution of updates.
- Support Period Documentation: Document and manage support periods, ensuring compliance with CRA timelines.
- MetricStream, RSA Archer, and LogicGate: Use these CMS tools to manage the compliance process, track adherence to CRA requirements, and generate reports for audits and regulatory review.
-
Conformity Assessment
- CE Marking: Affix the CE marking to each individual product with digital elements that satisfies the CRA requirements.
- Up to date declaration of conformity
- Apply the appropriate conformity assessment procedure (self-assessment, third-party) based on product classification.
- Include the compliance documentation and asses it for any gaps.
- Evaluate the conformity on each product update.
-
Regular Security Testing
- Offensive Security Approach: Include bug bounty programs as part of the testing strategy.
- Security Testing Methods: Integrate continuous security testing (e.g., pentests, OffSec testing) and regularly update testing strategies across the product lifecycle.
- Regular Reviews : Apply effective and regular tests and reviews of the product's security
-
Monitoring security events
- Splunk, ArcSight, and LogRhythm: Integrate SIEM solutions into the compliance framework to monitor security events in real-time, helping to ensure continuous compliance with the CRA and other relevant regulations.
-
4. Ensure Effective Vulnerability Management and Incident Response
-
Vulnerability Management
-
Identification
- SBOM Creation: Use tools like OWASP CycloneDX for full-stack SBOM creation and management
-
Addressing Vulnerabilities
- Address and remedy found exploitable vulnerabilities
- Utilize platforms like Tenable, Qualys, or Rapid7 for identifying, assessing, and managing vulnerabilities
- Tools: Patch management systems
-
Testing and Review
- Employ automated testing tools specifically for vulnerability management.
-
Coordinated Vulnerability Disclosure (CVD)
- Establish and enforce a comprehensive CVD policy, set up a Vulnerability Disclosure Program (VDP) for reporting.
- Tools: Public vulnerability databases
-
Public Disclosure
- Publicly disclose fixed vulnerabilities, including descriptions, impacts, severity, and remediation information, unless delayed for security reasons.
- ISO/IEC 29147: Follow vulnerability handling and disclosure practices
-
Bug Bounty Programs if applicable
- Integration: Implement bug bounty programs as part of the CVD for proactive security testing.
- Integrate platforms like HackerOne or Bugcrowd for proactive security testing.
-
Incident Response
- Severe Incident Reporting : Report incidents to ENISA and the relevant CSIRT within the required timeframes.
-
User Notification
- Provide timely and effective user notifications about incidents and vulnerabilities, handling the delicate timing to avoid potential exploitation.
- Provide security updates and patches for products.
- Splunk, IBM QRadar, and Palo Alto Networks Cortex XSOAR: These tools should be integrated into the incident response plan, providing robust capabilities for detecting, analyzing, and responding to cybersecurity incidents.
-
1. Determine Applicability and Product Classification
-
Review for Definitions and Scope to identify regulated products
- Scope of the CRA: The Cyber Resilience Act (CRA) applies to products with digital elements made available on the market, including those that have a direct or indirect logical or physical connection to a device or network
-
Key Definitions:
Product with digital elements: A software or hardware product, including remote data processing solutions, which are integral to its functionality.
- Hardware Products and components placed on the market separately, such as laptops, smart appliances, mobile phones, network equipment or CPUs...
- Software Products and components placed on the market separately, such as operating systems, games, word processing, or applications (mobile, web, desktop)
- Remote data processing solutions that are vital for the functionality of PDEs are in scope
-
Product Classification
-
Default Category
- Covers lower-risk digital products. These products typically require a less stringent conformity assessment procedure and undergo self-assessment.
-
Important Class I Products:
- Includes products critical to cybersecurity, such as identity management systems, VPNs, and endpoint security solutions, Smart home products with security functionalities
- These products require compliance with a standard or third party assessment.
-
Important Class II Products
- Encompasses high-risk products like firewalls and intrusion detection systems, which pose significant risks due to their functionality.
- These products require third party assessment.
-
Critical Products
- Mandatory EU certification.
- Refers to systemically important products listed in Annex IV, such as smart cards, hardware security modules, and similar critical infrastructure elements(NIS 2).
- Determine the appropriate conformity assessment procedure (self-assessment, third-party) based on product classification.
-
Check for Exceptions
-
Excluded Products
- Specific products like medical devices, motor vehicles, in-vitro, aviation, and products designed for national defence are excluded from CRA coverage
-
Explicit Address
- Clearly outline and document the exclusions in product classification procedures.
-
Document Classification
- Maintain comprehensive records of product classification, including the rationale for classification decisions.
- Establish a process for reassessing product classifications as new regulations or updates emerge to ensure ongoing compliance
-
Special Cases
-
Open Source Software (OSS)
- Understand the specific instances where OSS falls under CRA regulation. EX hosting and managing development platforms for OSS will not require compliance.
-
Electronic Health Record (EHR) Systems
- Ensure compliance with the European Health Data Space (EHDS) guidelines
-
High-Risk AI Systems
- Follow the AI Act requirements for products classified as high-risk AI systems