Skip to main content

CRA Essential Cybersecurity Requirements

Annex I of the EU Cyber Resilience Act is where the core technical and process requirements live. This is the checklist your software product (whether it's a game, an app, or a component) and your development practices need to measure up against. It's split into two main parts: Part I deals with the security properties your product itself must have when you release it, and Part II covers the ongoing vulnerability handling processes you need to maintain. Understanding these essential requirements is non-negotiable. This section breaks them down, one by one, so you know exactly what's expected for your software products under the CRA.

📄️ Annex I, Part I, Req 2b: Secure by Default Configuration for Software

The EU Cyber Resilience Act (CRA) wants your software to be secure right out of the box. That's the essence of the requirement: products with digital elements shall, where applicable, "be made available on the market with a secure by default configuration, unless otherwise agreed between manufacturer and business user in relation to a tailor-made product with digital elements, including the possibility to reset the product to its original state" (Annex I, Part I, Point 2b).

📄️ Annex I, Part I, Req 2c: Software Security Updates (and Automatic Updates)

Keeping software secure is an ongoing job, and the EU Cyber Resilience Act (CRA) emphasizes how vulnerabilities must be addressed. A key product property is that it must "ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-out mechanism, through the notification of available updates to users, and the option to temporarily postpone them" (Annex I, Part I, Point 2c).

📄️ Annex I, Part I, Req 2d: Protection From Unauthorised Access in Software

Controlling who gets into your software and what they can do is fundamental to security. The EU Cyber Resilience Act (CRA) mandates that products with digital elements shall, where applicable, "ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access" (Annex I, Part I, Point 2d).

📄️ Annex I, Part I, Req 2e: Confidentiality of Data in Software (Encryption)

Protecting the secrecy of data your software handles is a major requirement of the EU Cyber Resilience Act (CRA). It states that products with digital elements shall, where applicable, "protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means" (Annex I, Part I, Point 2e).

📄️ Annex I, Part I, Req 2f: Integrity of Data and Code in Software

Ensuring that the data and the code within your software are trustworthy and haven't been improperly altered is a core requirement of the EU Cyber Resilience Act (CRA). It specifies that products with digital elements shall, where applicable, "protect the integrity of stored, transmitted or otherwise processed data, personal or other, commands, programs and configuration against any manipulation or modification not authorised by the user, and report on corruptions" (Annex I, Part I, Point 2f).

📄️ Annex I, Part I, Req 2l: Security-Related Information Logging in Software

Understanding what happened after a security event, or detecting suspicious activity, often relies on good logs. The EU Cyber Resilience Act (CRA) states that products with digital elements shall, where applicable, "provide security related information by recording and monitoring relevant internal activity, including the access to or modification of data, services or functions, with an opt-out mechanism for the user" (Annex I, Part I, Point 2l).

📄️ Annex I, Part I, Req 2m: Secure Data Removal From Software

When it's time to get rid of data, or decommission your software, it needs to be done securely. The EU Cyber Resilience Act (CRA) requires that products with digital elements shall, where applicable, "provide the possibility for users to securely and easily remove on a permanent basis all data and settings and, where such data can be transferred to other products or systems, ensure that this is done in a secure manner" (Annex I, Part I, Point 2m).

📄️ Annex I, Part II, Req 1: Identifying & Documenting Software Vulnerabilities & Components (SBOM)

A core part of ongoing security under the EU Cyber Resilience Act (CRA) is knowing what's in your software and tracking its weaknesses. Annex I, Part II, Point 1 requires manufacturers of products with digital elements to "identify and document vulnerabilities and components contained in products with digital elements, including by drawing up a software bill of materials in a commonly used and machine-readable format covering at the very least the top-level dependencies of the products".

📄️ Annex I, Part II, Req 2: Addressing & Remediating Software Vulnerabilities Promptly

Finding vulnerabilities is one thing; fixing them is another. The EU Cyber Resilience Act (CRA) is clear on this: manufacturers must, "in relation to the risks posed to products with digital elements, address and remediate vulnerabilities without delay, including by providing security updates; where technically feasible, new security updates shall be provided separately from functionality updates" (Annex I, Part II, Point 2).

📄️ Annex I, Part II, Req 6: Facilitating Sharing of Potential Software Vulnerability Info

Security is a shared responsibility, and the EU Cyber Resilience Act (CRA) encourages communication about potential weaknesses. Annex I, Part II, Point 6 requires manufacturers to "take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements".

📄️ Annex I, Part II, Req 8: Free and Timely Software Security Updates with Advisories

Security is not a premium feature under the EU Cyber Resilience Act (CRA). When security updates are needed for your software, they must be accessible. Annex I, Part II, Point 8 requires manufacturers to "ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages...".