{"id":25326,"date":"2023-05-04T10:00:48","date_gmt":"2023-05-04T08:00:48","guid":{"rendered":"https:\/\/stage-fp.webenv.pl\/blog\/?p=25326"},"modified":"2025-01-30T17:42:37","modified_gmt":"2025-01-30T16:42:37","slug":"eu-the-new-cyber-resilience-act","status":"publish","type":"post","link":"https:\/\/www.future-processing.com\/blog\/eu-the-new-cyber-resilience-act\/","title":{"rendered":"EU: The new Cyber Resilience Act"},"content":{"rendered":"\n<p>How serious is this? Well, this new law is something that <strong>software makers should definitely be focusing on already,<\/strong> since choosing not to comply may result in <strong>painful financial consequences<\/strong> and could even harm their hard-earned reputations.<\/p>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"CRA.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img fetchpriority=\"high\" decoding=\"async\" width=\"944\" height=\"923\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA.jpg\" class=\"attachment-full size-full\" alt=\"CRA\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA.jpg 944w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-300x293.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-768x751.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-409x400.jpg 409w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-24x24.jpg 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-48x48.jpg 48w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/>            <\/a>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"944\" height=\"923\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA.jpg\" class=\"attachment-full size-full\" alt=\"CRA\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA.jpg 944w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-300x293.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-768x751.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-409x400.jpg 409w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-24x24.jpg 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/CRA-48x48.jpg 48w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/>                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<p>Furthermore, these new safety regulations for software development companies will impact \u2014 one way or another \u2014 the entire western world, so this is not just a regional change in politics. <\/p>\n\n\n\n<p>For instance, <strong>the Biden administration has just released its <a href=\"https:\/\/www.future-processing.com\/blog\/usa-significant-shifts-in-cybersecurity-policy-ahead\/\">National Cybersecurity Strategy,<\/a> <\/strong>and while it may differ from the CRA in certain details, its goals are quite similar.<strong> Australia is also considering making comparable changes<\/strong> in its <a href=\"https:\/\/www.itnews.com.au\/news\/gov-flags-possible-tech-sector-liability-for-cyber-security-592391?mod=djemCybersecruityPro&amp;tpl=cy\" rel=\"noopener\">cybersecurity strategy<\/a>.<\/p>\n\n\n\n<p>Plus, we can expect that <strong>the UK will want to comply with the new act<\/strong> as well (just as it did with <a href=\"https:\/\/www.future-processing.com\/blog\/cybersecurity-in-the-eu-tighter-regulations-are-coming-are-you-ready\/\">NIS2<\/a>), despite no longer being a member state of the European Union.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Cyber Resilience Act \u2014 the reasons why<\/h2>\n\n\n\n<p>Digital products (both hardware and software) are becoming<strong> increasingly vulnerable to cyberattacks.<\/strong> According to the <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/library\/cyber-resilience-act\" rel=\"noopener\">European Council<\/a>, the estimated global annual cost of cybercrime amounted to \u20ac5.5 trillion by 2021. <\/p>\n\n\n\n<p>And apart from this low level of product security, there\u2019s also another problem that has proven quite challenging: namely,<strong> how to increase limited user knowledge and improve poor user understanding of software security.<\/strong><\/p>\n\n\n\n<p>That\u2019s why something needs to be done in order to <strong>create a new European cyber ecosystem that is safe <\/strong>for all of its citizens \u2014 no matter how educated they are on the subject of digital security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Cyber Resilience Act \u2014 the goals<\/h2>\n\n\n\n<p>Law-makers have outlined <strong>two general and four specific objectives of the Cyber Resilience Act. <\/strong>The former focus on ensuring that the internal European market functions properly, while the latter basically revolve around creating a set of requirements for more secure coding.<\/p>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"Cyber_Resilience_Act\u2013the_goals.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img decoding=\"async\" width=\"944\" height=\"1055\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals.jpg\" class=\"attachment-full size-full\" alt=\"Cyber_Resilience_Act\u2013the_goals Future Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals.jpg 944w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-268x300.jpg 268w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-916x1024.jpg 916w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-768x858.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-358x400.jpg 358w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/>            <\/a>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img decoding=\"async\" width=\"944\" height=\"1055\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals.jpg\" class=\"attachment-full size-full\" alt=\"Cyber_Resilience_Act\u2013the_goals Future Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals.jpg 944w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-268x300.jpg 268w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-916x1024.jpg 916w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-768x858.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/04\/Cyber_Resilience_Act\u2013the_goals-358x400.jpg 358w\" sizes=\"(max-width: 944px) 100vw, 944px\" \/>                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<p>That\u2019s it for the general background of the new law. Now it\u2019s time for the particulars.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Cyber Resilience Act \u2014 key takeaways<\/h2>\n\n\n\n<p>First and foremost, unlike the American National Cybersecurity Strategy, <strong>the CRA is designed to make everyone comply, whether you\u2019re a small or large software development company,<\/strong> and not only \u201cmanufacturers and software publishers with market powers\u201d. <\/p>\n\n\n\n<p>So, <strong>as long as you operate in the European market \u2014 you will have to take this seriously and adhere to the presented standards. <\/strong>And when it comes to producing software, this is absolutely revolutionary.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">Cybersecurity will now become a crucial part of every phase of the software development process<\/mark><\/strong> \u2014 from planning to maintenance. So, even if you plan to build a very basic product, you should take the essential security requirements under consideration from the very beginning.<\/p>\n\n\n<div class=\"o-cta\">\n    <div class=\"o-cta__pill-container\">\n                    <img decoding=\"async\" width=\"120\" height=\"260\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2025\/01\/pill-security-1.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>            <\/div>\n    <div class=\"o-cta__text-container\">\n                                    <div class=\"f-paragraph\"><p><strong>Are you concerned about the impact of EU cybersecurity regulations \u2028on your business?<\/strong><\/p>\n<p>Leverage our AI-powered chatbot to answer all your questions about EU cybersecurity regulations. Understand and verify your compliance \u2028with DORA, NIS 2, and CRA using our AI assistant.<\/p>\n<\/div>\n                                    <div class=\"o-cta__buttons-container\">\n                                    <a class=\"o-button o-button--primary o-button--xs o-button--arrow o-button--icon-right\" href=\"https:\/\/www.dora-cra-nis2.com\/?utm_source=blogbanner\" target=\"\" rel=\"noopener\">\n                        <span>Start a conversation now!<\/span>\n                        <svg class='o-icon o-icon--10 o-icon--arrow '>\n            <use xlink:href='#icon-10_arrow'><\/use>\n          <\/svg>                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/a>\n                                            <\/div>\n            <\/div>\n<\/div>\n\n\n\n<p>Plus, there should be a set of outlined processes in place in case any emergencies should occur, and any detected vulnerabilities or cyberattack incidents (both successful and unsuccessful) should be immediately reported to <a href=\"https:\/\/www.enisa.europa.eu\/\" rel=\"noopener\">ENISA<\/a> (the European Agency for Cybersecurity, which oversees CRA). <\/p>\n\n\n\n<p>This way, <strong>every IT company will be forced by law to monitor and mitigate any vulnerabilities during the entire product lifecycle.<\/strong><\/p>\n\n\n\n<p>There\u2019s also something that every user can benefit from directly: since <strong>companies will be obligated to publish all relevant security information,<\/strong> this includes clear instructions on how to properly install and use a given device or piece of software.<\/p>\n\n\n\n<p>OK, but what if a company doesn\u2019t comply with the new regulations? Is there any way the authorities will be able to put pressure on organisations to make them introduce all of the necessary changes? Well, <strong>not complying could be financially painful for them, <\/strong>since fines of up to <strong>15 million euros or 2.5% of turnover<\/strong> (whichever is higher) can be levied.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Controversies<\/h3>\n\n\n\n<p>Of course, every new and somewhat revolutionary law <strong>brings controversies <\/strong>and casts doubts. Here, doubts arise from the fact that it seems like the EU is trying to force developers to create software that is resilient against unspecified denial of service attacks, which is virtually impossible. <\/p>\n\n\n\n<p>So, I think that <strong>we can expect this point to be clarified or changed<\/strong> later on, since it might just become a dead letter.<\/p>\n\n\n\n<p>Another significant consequence of the CRA is the fact that customers will no longer be allowed to be beta testers of products or services, since companies will be obligated to only release products that are already free of vulnerabilities.<\/p>\n\n\n\n<p>Plus, since <strong>the CRA is still a living document,<\/strong> and coordinated standards are yet to come, <strong>we cannot prepare for it in detail.<\/strong> The act is likely <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-amber-color\">to enter into effect in 2025<\/mark><\/strong> with more precise requirements <strong>becoming mandatory another 24 months after that.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>What you can do now?<\/h2>\n\n\n\n<p>Although no one can really know all the technicalities of a law that is still being shaped, <strong>there are some things that you can do right away,<\/strong> without waiting until the last minute:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hire cybersecurity specialists who will become an integral part of your team.<\/strong> They will guide you through any changes and help you build products that are compliant with best practices and state-of-the-art solutions.<\/li>\n\n\n\n<li><strong>Begin working with an experienced IT partner that understands the significance of security, such as <\/strong><a href=\"https:\/\/www.future-processing.com\/contact\/\"><strong>Future Processing<\/strong><\/a><strong>. <\/strong>This is a great option, especially for mid-sized and larger companies that need a variety of services \u2014 from consulting to audits, to designing and implementing changes. An IT partner with a proactive approach will free up your internal resources and boost your efficiency, while allowing you to sleep soundly even in the most challenging periods.<\/li>\n\n\n\n<li><strong>Read the CRA document yourself<\/strong>, follow changes and updates, listen to your specialists, report to the appropriate entities if anything sounds irrational or impossible to implement, and\u2026 just go with the flow. This is yet another shift in reality that will eventually become part of our day-to-day, as was the case with the GDPR or NIS2 regulations.<\/li>\n<\/ul>\n\n\n<div class=\"b-cta-banner m-gradient-light\">\n            <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__image-container\" data-elementclick=\"article-banner\" data-elementname=\"Do you want to know more about CRA?\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png\" class=\"attachment-full size-full\" alt=\"Cybersecurity_Consulting_Future_Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png 450w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-300x300.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-150x150.png 150w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-400x400.png 400w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-24x24.png 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-48x48.png 48w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-96x96.png 96w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>        <\/a>\n    \n        <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__url b-cta-banner__text-container\" data-elementclick=\"article-banner\" data-elementname=\"Do you want to know more about CRA?\">\n                    <div class=\"b-cta-banner__text\">\n                                                    <h3 class=\"f-headline-extra-big b-cta-banner__header\">\n                        Do you want to know more about CRA?                    <\/h3>\n                \n                                    <div class=\"f-paragraph\">\n                        <p>Work with an experienced security expert that understands the significance of the new regulations.<\/p>\n                    <\/div>\n                \n                                    <div class=\"o-button o-button--primary o-button--s o-button--icon-right o-button--arrow\">\n                        <span>Let\u2019s talk!<\/span>\n                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/div>\n                            <\/div>\n                <\/a>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Resilience Act (CRA) is an EU legislative proposal which introduces baseline cybersecurity requirements for products with digital elements. Its aim is to make hardware and software products more secure and reliable. The document also defines the guiding principles for developing these types of products, with the entire product lifecycle in mind.<\/p>\n","protected":false},"author":182,"featured_media":25328,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2110],"tags":[],"coauthors":[2010],"class_list":["post-25326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":{"reading-time":"5 min","show-toc-sublists":false,"image":null,"logo":null,"button1":{"button1_type":"","button":null},"button2":{"button2_type":"","button":null},"person":{"person_photo":null,"person_name":"","person_position":""}},"_links":{"self":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/25326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/comments?post=25326"}],"version-history":[{"count":0,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/25326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media\/25328"}],"wp:attachment":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media?parent=25326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/categories?post=25326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/tags?post=25326"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/coauthors?post=25326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}