EU Cyber Resilience Act
Your Roadmap to EU CRA Compliance
This landmark regulation establishes rigorous security standards for IoT manufacturers to protect critical digital infrastructure in the EU and beyond. Take steps to comply today to strengthen the security of your connected devices, ensure continued access to the European market, and get ahead of the evolving regulatory landscape.
Stay Ahead of the Regulations with Finite State
Core Requirements
Secure by Design Principles
Under the CRA, manufacturers must integrate security practices throughout the product lifecycle, including
- Secure boot
- Access controls
- Encryption
- Default security settings
- Lifecycle security management
Vulnerability Handling
IoT manufacturers must proactively manage vulnerabilities and respond swiftly to security incidents with
- Continuous monitoring
- Formal reporting processes
- 24hr disclosure periods
- Secure patch distribution
- End-of-life policy for legacy devices
SBOM & Technical Documentation
The CRA improves software supply chain transparency by imposing specific security requirements on manufacturers, such as
- Including proprietary & open-source components in SBOMs & updating them with each modification
- Include hardware & software configurations, security features, update protocols, & maintenance guidelines in technical documentation
Product Lifecycle Support
The EU CRA demands product lifecycle support to keep devices secure through their operational lifespan, including
- Defined End-of-Life Policies
- Long-term maintenance commitments
- Provision for timely security updates
- Incident response planning
Software Supply Chain Security
Reliance on third-party software increases attack surfaces, which is why the CRA requires
- Comprehensive assessments of third-party suppliers
- Continuous vulnerability scanning
- Robust logging & auditing practices
- Open source risk management practices
Conformity Assessments
The CRA introduces mandatory conformity assessments aligned to product risk categories
- Self-assessments: Default & Important Class I (with exceptions)
- 3rd-party assessments: Important Class II
- European Common Criteria certification: Critical
Go deeper into each requirement
Discover how cyber regulations and compliance are shaping enterprise security for device manufacturers
Join regulations experts Eric Greenwald and Dr Amit Elazari for this insightful webinar to uncover practical strategies to prepar your organization for compliance with global requirements.
Meet Finite State, Your Partners in Compliance
Leverage expertise from former U.S. government officials and get the support you need to tackle EU CRA requirements with confidence
- Create audit-ready reports to demonstrate product compliance
- Generate SBOMs with VDR/VEX vulnerability data in industry-standard formats (CycloneDX, SPDX)
- Employ continuous monitoring and alerting to meet regulatory reporting requirements