How to get ready for the arrival of the Cyber Resilience Act?
Design
With an exponential growth in the number of interconnected devices expected to reach around 75 billion units by 2025, online security is becoming an increasingly pressing concern for players operating in the IoT area. To deal with this phenomenon, on September 15th 2022, the European Commission introduced ground-breaking legislation in Europe, called the “Cyber Resilience Act” (CRA). This regulatory proposal aims to consolidate digital security for items containing digital elements, thus marking a significant step in the ever-changing landscape of cybersecurity.
Zoom-in on the Cyber Resilience Act and what it will change in IoT projects.
Qu’est ce que le Cyber Resilience Act (CRA)?
The Cyber Resilience Act (CRA) provides a common regulatory framework for Member States to fight the increasing number of cyberattacks to which connected devices are victim, so as to make business players responsible for the cybersecurity of the products they offer on the European market.
Yannick Gaudin
Lead Architect & Technology
Complying with the key points
IoT data security requirements
In the interconnected world of IoT, the collection and processing of personal and sensitive data has become commonplace. However, the Cyber Resilience Act highlights the need to protect this data from unauthorized access.
The consequences of a data breach can be devastating, leading not only to financial damage, but also to a loss of customer trust. To meet these requirements, it is essential to apply robust security measures and ensure appropriate data management.
Cybersecurity standards for IoT devices
The CRA emphasizes the importance of designing secure IoT devices right from their very creation (referred to as “secure-by-design”). The recommended cybersecurity standards are intended to ensure that devices are protected against potential vulnerabilities and flaws.
Integrating security at an early stage in the development process is fundamental to avoiding costly security gaps and ensuring compliance with the requirements of the Cyber Resilience Act. This proactive approach reduces the risks and lays a strong foundation for IoT projects.
Vulnerability and incident management
Continuous vulnerability monitoring and responding rapidly to security incidents are central elements of this regulation. Businesses must be able to quickly identify and correct security flaws to minimize potential damage.
Effective incident response requires well-defined processes and collaboration between technical teams and stakeholders.
Anticipating the implementation of the Cyber Resilience Act
Expert in electronics design and specialised in IoT solutions, LACROIX supports its customers each step on the way to develop their IoT projects.
In order to be compliant with the Cyber Resilience Act, IoT players are required to meet several criteria. And LACROIX is the perfect partner to ensure that all 5 of these key points are fulfilled:
Secure by design
Technical framework: architecture, cryptography, secure enclave, etc.
Processes: product lifecycle, crisis management, R&D best practices, etc.
Risk & threat analysis model, with cyclical examination
Vulnerability Disclosure Policy (VDP)
CVE tracker in place, with teams organized around it
Communication channel to inform your customers
Mitigation/resolution actions triggered promptly
Large-scale updates at any time
Your product’s firmware
Secrets-rotation ready
Free security patches
All throughout the product’s life cycle (minimum of 5 years)
Anticipate the Cyber Resilience Act with LACROIX
Secure your IoT projects from the design stage to guarantee compliance and peace of mind.