{"id":3825,"date":"2025-01-29T09:55:30","date_gmt":"2025-01-29T08:55:30","guid":{"rendered":"https:\/\/pilz-magazine.com\/de\/?p=3798"},"modified":"2025-03-12T10:24:08","modified_gmt":"2025-03-12T09:24:08","slug":"cra-regulation-cybersecurity-interview","status":"publish","type":"post","link":"https:\/\/pilz-magazine.com\/en\/cra-regulation-cybersecurity-interview\/","title":{"rendered":"Fit for the CRA"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Mr Kuczera, why do we need EU legislation on cyber resilience? And who is affected by the requirements?<\/h5>\n\n\n\n<p>The aim of the Cyber Resilience Act is to pro\u00advide better pro\u00adtec\u00adtion from cyber attacks for con\u00adsumers and busi\u00adnesses. The CRA con\u00adtains a variety of spec\u00adi\u00adfi\u00adca\u00adtions for man\u00adu\u00adfac\u00adturers, importers and dis\u00adtrib\u00adu\u00adtors of prod\u00aducts with dig\u00adital ele\u00adments, which are capable of com\u00admu\u00adni\u00adcating with other prod\u00aducts. This includes hard\u00adware and soft\u00adware prod\u00aducts.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-medium is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias-300x300.jpg\" alt class=\"wp-image-3837\" srcset=\"https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias-300x300.jpg 300w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias-150x150.jpg 150w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias-768x768.jpg 768w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias-540x540.jpg 540w, https:\/\/pilz-magazine.com\/en\/wp-content\/uploads\/sites\/24\/2025\/01\/Pilz-Portrait-Kuczera-Matthias.jpg 900w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cWithout Secu\u00adrity, a machine with all its Safety mea\u00adsures is vul\u00adner\u00adable and unpro\u00adtected.\u201c<\/p>\n<cite>Matthias Kuczera, expert in \u201cFunc\u00adtional Safety \u2014 Stan\u00addards\u201d at Pilz GmbH &amp; Co. KG.<\/cite><\/blockquote>\n<\/div>\n\n\n\n<p>Con\u00adsumer prod\u00aducts such as smart\u00adphones, lap\u00adtops, smart home devices, smart\u00adwatches and con\u00adnected toys are affected. B2B prod\u00aducts such as con\u00adtrollers and sen\u00adsors also fall under the scope of the CRA. Soft\u00adware prod\u00aducts such as oper\u00adating sys\u00adtems are also affected.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">When must the requirements of the Cyber Resilience Act be implemented?<\/h5>\n\n\n\n<p>The CRA is an EU Reg\u00adu\u00adla\u00adtion and not a Direc\u00adtive. So, in con\u00adtrast to the NIS\u20112 Direc\u00adtive, it is directly applic\u00adable in all EU member states and national imple\u00admen\u00adta\u00adtion is not required. How\u00adever, there is a tran\u00adsi\u00adtion period. The CRA is to be imple\u00admented in var\u00adious stages, from the end of 2024 until manda\u00adtory appli\u00adca\u00adtion from 11 December 2027. Man\u00adu\u00adfac\u00adturers\u2019 reporting oblig\u00ada\u00adtions will apply from 11 Sep\u00adtember 2026, and require\u00adments to notify con\u00adfor\u00admity assess\u00adment bodies will apply from 11 June 2026.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">What specifically is required in the legally binding CRA?<\/h5>\n\n\n\n<p>The new Reg\u00adu\u00adla\u00adtion is binding on man\u00adu\u00adfac\u00adturers, importers and retailers. All prod\u00aducts that con\u00adtain dig\u00adital ele\u00adments and bear the CE mark must guar\u00adantee an appro\u00adpriate level of cyber\u00adse\u00adcu\u00adrity. To sum\u00admarise, this means there are spe\u00adcific require\u00adments for risk assess\u00adment and guar\u00adantee, vul\u00adner\u00ada\u00adbility man\u00adage\u00adment, doc\u00adu\u00admen\u00adta\u00adtion and reporting oblig\u00ada\u00adtions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An overview of the key requirements:<\/h2>\n\n\n\n<div class=\"wp-block-group mgznkr-elements mgznkr-accordion is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Risk assessment and guarantee<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Man\u00adu\u00adfac\u00adturers must design and develop prod\u00aducts in such a way that an appro\u00adpriate level of cyber\u00adse\u00adcu\u00adrity is guar\u00adan\u00adteed during the whole product life\u00adcycle.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Vulnerability management<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Man\u00adu\u00adfac\u00adturers must elim\u00adi\u00adnate known vul\u00adner\u00ada\u00adbil\u00adi\u00adties through free secu\u00adrity updates, unless oth\u00ader\u00adwise agreed between the man\u00adu\u00adfac\u00adturer and com\u00admer\u00adcial user with regard to a cus\u00adtomised product.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Documentation<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Man\u00adu\u00adfac\u00adturers must iden\u00adtify and doc\u00adu\u00adment vul\u00adner\u00ada\u00adbil\u00adi\u00adties and com\u00adpo\u00adnents in their prod\u00aducts. Part of this doc\u00adu\u00admen\u00adta\u00adtion includes the pro\u00adduc\u00adtion of a soft\u00adware bill of mate\u00adrials (SBOM) in a machine-read\u00adable format.<\/p>\n\n\n\n<p>The way in which secu\u00adrity gaps are han\u00addled should also be doc\u00adu\u00admented, for example, when a man\u00adu\u00adfac\u00adturer pro\u00advides secu\u00adrity updates for its product.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group accordion-item is-layout-flow wp-block-group-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Reporting obligations<\/h3>\n\n\n\n<div class=\"wp-block-group accordion-content is-layout-flow wp-block-group-is-layout-flow\">\n<p>Within 24 hours of becoming aware of each actively exploited vul\u00adner\u00ada\u00adbility and each serious secu\u00adrity inci\u00addent, the man\u00adu\u00adfac\u00adturer must report it via the ENISA reporting plat\u00adform (Euro\u00adpean Union Agency for Cyber\u00adse\u00adcu\u00adrity), in the form of an early warning. The man\u00adu\u00adfac\u00adturer has up to 72 hours to add fur\u00adther details. A final report must be sub\u00admitted within 14 days for each actively exploited vul\u00adner\u00ada\u00adbility or within one month for each serious secu\u00adrity inci\u00addent.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Do you have any tips for machine manufacturers?<\/h5>\n\n\n\n<p>For decades, Pilz has been sup\u00adporting machine builders and users with the Safety of their plant and machinery \u2013 including with the new require\u00adments for Indus\u00adtrial Secu\u00adrity. Because without Secu\u00adrity, a machine with all its Safety mea\u00adsures is vul\u00adner\u00adable and unpro\u00adtected. Pre\u00adcau\u00adtionary mea\u00adsures are a must. We rec\u00adom\u00admend that machine man\u00adu\u00adfac\u00adturers address the require\u00adments of the CRA promptly, and work with com\u00adpo\u00adnent man\u00adu\u00adfac\u00adturers and oper\u00ada\u00adtors to develop coop\u00ader\u00ada\u00adtion con\u00adcepts. Typ\u00adical ques\u00adtions that need to be clar\u00adi\u00adfied between eco\u00adnomic actors include: In which net\u00adwork zone should a machine be oper\u00adated? How should soft\u00adware updates be han\u00addled? When does com\u00adpo\u00adnent sup\u00adport end? For how long can users expect to receive secu\u00adrity updates and have vul\u00adner\u00ada\u00adbil\u00adi\u00adties fixed? What con\u00adsti\u00adtutes a \u201csub\u00adstan\u00adtial mod\u00adi\u00adfi\u00adca\u00adtion\u201d to a machine?<\/p>\n\n\n\n<p>Only when ques\u00adtions like these are clar\u00adi\u00adfied can each eco\u00adnomic oper\u00adator fulfil its new organ\u00adi\u00adsa\u00adtional and tech\u00adnical oblig\u00ada\u00adtions. It is also helpful to always keep up to date. Sub\u00adscrip\u00adtions to newslet\u00adters and RSS feeds on eur-lex.europa.eu will keep you informed about leg\u00adisla\u00adtive changes at EU level. I also rec\u00adom\u00admend the Common Secu\u00adrity Advi\u00adsory Frame\u00adwork (CSAF) for imple\u00admen\u00adta\u00adtion of the CRA require\u00adments. It is a stan\u00addard\u00adised, open source frame\u00adwork for com\u00admu\u00adni\u00adca\u00adtion and auto\u00admated dis\u00adtri\u00adb\u00adu\u00adtion of machine-process\u00adable vul\u00adner\u00ada\u00adbility and mit\u00adi\u00adga\u00adtion infor\u00adma\u00adtion, known as Secu\u00adrity Advi\u00adsories.<\/p>\n\n\n\n<div class=\"wp-block-group link-pilz is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><a href=\"https:\/\/www.pilz.com\/en-DE\/products\/industrial-security\" target=\"_blank\" rel=\"noreferrer noopener\">Fur\u00adther infor\u00adma\u00adtion on Indus\u00adtrial Secu\u00adrity.<\/a><\/p>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an inter\u00adview, Matthias Kuczera, expert in \u201cFunc\u00adtional Safety \u2013 Stan\u00addards\u201d at Pilz GmbH &amp; Co. KG, explains exactly how affected com\u00adpa\u00adnies can pre\u00adpare well for the Cyber Resilience Act (CRA).  <\/p>\n","protected":false},"author":29,"featured_media":3838,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"wp_typography_post_enhancements_disabled":false,"footnotes":""},"categories":[74,13,27],"tags":[],"class_list":["post-3825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-issue-1-2025","category-knowledge","category-laws-and-standards"],"acf":[],"_links":{"self":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/3825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/comments?post=3825"}],"version-history":[{"count":7,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/3825\/revisions"}],"predecessor-version":[{"id":4003,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/posts\/3825\/revisions\/4003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media\/3838"}],"wp:attachment":[{"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/media?parent=3825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/categories?post=3825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pilz-magazine.com\/en\/wp-json\/wp\/v2\/tags?post=3825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}