Cyber Resilience Act Requirements Standards Mapping-KJNA31892ENN
Cyber Resilience Act Requirements Standards Mapping-KJNA31892ENN
Cyber Resilience Act Requirements Standards Mapping-KJNA31892ENN
EUR 31892 EN
Legal Notice
The scientific output expressed does not imply a policy position of the European Commission. Neither the European
Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of this
publication. For information on the methodology and quality underlying the data used in this publication for which the
source is neither Eurostat nor other Commission services, users should contact the referenced source. The designations
employed and the presentation of material on the maps do not imply the expression of any opinion whatsoever on the
part of the European Union concerning the legal status of any country, territory, city or area or of its authorities, or
concerning the delimitation of its frontiers or boundaries.
JRC137340
EUR 31892 EN
PDF ISBN 978-92-68-14180-9 ISSN 1831-9424 doi:10.2760/905934 KJ-NA-31-892-EN-N
Luxembourg: Publications Office of the European Union, 2024
The reuse policy of the European Commission documents is implemented by the Commission Decision 2011/833/EU of
12 December 2011 on the reuse of Commission documents (OJ L 330, 14.12.2011, p. 39). Unless otherwise noted, the
reuse of this document is authorised under the Creative Commons Attribution 4.0 International (CC BY 4.0) licence
(https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed provided appropriate credit is given and
any changes are indicated.
For any use or reproduction of photos or other material that is not owned by the European Union permission must be
sought directly from the copyright holders.
How to cite this report: Hernandez Ramos, J.L., Karopoulos, G., Nai Fovino, I., Spigolon, R., Sportiello L., Steri, G., Gorniak,
S., Magnabosco, P., Atoui, R., Crippa Martinez, C., Cyber Resilence Act Requirements Standards Mapping, Publication Office
of the European Union, 2024, https://data.europa.eu/doi/10.2760/905934, JRC137340.
About JRC
The Joint Research Centre is the European Commission’s science and knowledge service. The JRC is a Directorate-General
of the European Commission under the responsibility of the Commissioner for Innovation, Research, Culture, Education
and Youth. Our researchers provide EU and national authorities with solid facts and independent support to help tackle
the big challenges facing our societies today. Our headquarters are in Brussels and we have research sites in five Member
States: Geel (Belgium), Ispra (Italy), Karlsruhe (Germany), Petten (the Netherlands) and Seville (Spain). Our work is largely
funded by the EU’s budget for Research and Innovation. We create, manage and make sense of knowledge, delivering the
best scientific evidence and innovative tools for the policies that matter to citizens, businesses and governments. For more
information, visit https://ec.europa.eu/jrc.
About ENISA
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of
cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the European Union
Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and
processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe
prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity building and awareness raising, the
Agency works together with its key stakeholders to strengthen trust in the connected economy, to boost resilience of the
Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally secure. For more information, visit
www.enisa.europa.eu .
Contact information
Authors
JRC ENISA
Hernandez Ramos, J. Gorniak, S.
Karopoulos, G. Magnabosco, P.
Nai Fovino, I.
Spigolon R. Atoui, R.
Sportiello L. Crippa Martinez, C.
Steri, G.
Acknowledgements
The authors would like to thank colleagues of DG CNECT.H2 for their review of this report.
Contents
Abstract .......................................................................................................................... 1
1 Introduction............................................................................................................. 2
2 Methodology ............................................................................................................ 3
3 Requirements-Standards mapping and analysis ................................................ 5
3.1 Security requirements relating to the properties of products with digital elements ........... 5
3.1.1 (1) Products with digital elements shall be designed, developed and produced in
such a way that they ensure an appropriate level of cybersecurity based on the risks;............. 5
3.1.2 (2) Products with digital elements shall be delivered without any known exploitable
vulnerabilities;.............................................................................................................................................. 7
3.1.3 (3) On the basis of the risk assessment referred to in Article 10(2) and where
applicable, products with digital elements shall: ................................................................................. 9
(a) be delivered with a secure by default configuration, including the possibility to reset the
product to its original state; ...................................................................................................................... 9
3.1.4 (3b) ensure protection from unauthorised access by appropriate control
mechanisms, including but not limited to authentication, identity or access management
systems; ...................................................................................................................................................... 11
3.1.5 (3c) protect the confidentiality of stored, transmitted or otherwise processed data,
personal or other, such as by encrypting relevant data at rest or in transit by state of the art
mechanisms; .............................................................................................................................................. 15
3.1.6 (3d) protect the integrity of stored, transmitted or otherwise processed data,
personal or other, commands, programs and configuration against any manipulation or
modification not authorised by the user, as well as report on corruptions; ............................... 17
3.1.7 (3e) process only data, personal or other, that are adequate, relevant and limited to
what is necessary in relation to the intended use of the product (‘minimisation of data’); ...... 20
3.1.8 (3f) protect the availability of essential functions, including the resilience against
and mitigation of denial of service attacks; ......................................................................................... 22
3.1.9 (3g) minimise their own negative impact on the availability of services provided by
other devices or networks; ..................................................................................................................... 24
3.1.10 (3h) be designed, developed and produced to limit attack surfaces, including
external interfaces; ................................................................................................................................... 26
3.1.11 (3i) be designed, developed and produced to reduce the impact of an incident
using appropriate exploitation mitigation mechanisms and techniques; .................................... 28
3.1.12 (3j) provide security related information by recording and/or monitoring relevant
internal activity, including the access to or modification of data, services or functions; .......... 32
3.1.13 (3k) ensure that vulnerabilities can be addressed through security updates,
including, where applicable, through automatic updates and the notification of available
updates to users. ...................................................................................................................................... 34
3.2 Vulnerability handling requirements ............................................................................................ 36
3.2.1 Manufacturers of the products with digital elements shall: (1) identify and
document vulnerabilities and components contained in the product, including by drawing up
a software bill of materials in a commonly used and machine-readable format covering at the
very least the top-level dependencies of the product; ..................................................................... 36
3.2.2 (2) in relation to the risks posed to the products with digital elements, address and
remediate vulnerabilities without delay, including by providing security updates; ................... 37
i
3.2.3 (3) apply effective and regular tests and reviews of the security of the product with
digital elements; ........................................................................................................................................ 39
3.2.4 (4) once a security update has been made available, publically disclose information
about fixed vulnerabilities, including a description of the vulnerabilities, information allowing
users to identify the product with digital elements affected, the impacs of the vulnerabilities,
their severity and information helping users to remediate the vulnerabilities; .......................... 41
3.2.5 (5) put in place and enforce a policy on coordinated vulnerability disclosure; .......... 43
3.2.6 (6) take measures to facilitate the sharing of information about potential
vulnerabilities in their product with digital elements as well as in third party components
contained in that product, including by providing a contact address for the reporting of the
vulnerabilities discovered in the product with digital elements; .................................................... 45
3.2.7 (7) provide for mechanisms to securely distribute updates for products with digital
elements to ensure that exploitable vulnerabilities are fixed or mitigated in a timely manner;
46
3.2.8 (8) ensure that, where security patches or updates are available to address
identified security issues, they are disseminated without delay and free of charge,
accompanied by advisory messages providing users with the relevant information, including
on potential action to be taken. ............................................................................................................. 48
ii
Abstract
The increasing number of cyberattacks affecting digital products, coupled with widespread
vulnerabilities and insufficient timely security updates, creates heavy financial burdens on society.
In response, the European Commission has drafted the Cyber Resilience Act (CRA), a new proposal
for regulation to define the legislative framework of essential cybersecurity requirements that
manufacturers must meet when placing any product with digital elements on the internal market.
To facilitate adoption of the CRA provisions, these requirements need to be translated into the
form of harmonised standards, with which manufacturers can comply. In support of the
standardisation effort, this study attempt to identify the most relevant existing cybersecurity
standards for each CRA requirement, analyses the coverage already offered on the intended scope
of the requirement and highlights possible gaps to be addressed.
1
1 Introduction
On 15 September 2022, the European Commission published the proposal for the Cyber Resilience
Act (CRA) [1], a proposal for a first ever EU-wide legislation of its kind, aimed at introducing
mandatory cybersecurity requirements for products with digital elements throughout their
lifecycle.
The CRA proposal covers all products with digital elements put on the market which can be
connected to a device or a network, including their building blocks (i.e., hardware and software)
and encompassing also solutions provided in a Software as a Service (SaaS) fashion if they qualify
as remote data processing solutions, as defined by Article 3(2) of the CRA proposal.
The CRA proposal provides two sets of essential requirements:
— Product cybersecurity requirements in Annex I, Section 1 of the CRA proposal
— Vulnerability handling process requirements in Annex I, Section 2 of the CRA proposal
These requirements should be the subject of a standardisation process by the European
Standardisation Organizations (ESOs) to express them in the form of specifications in harmonised
standards.
The general principle is that for the products on the market, a self-assessment of compliance with
the requirements specified in Annex I will be sufficient. For certain categories of more critical
products, the application of harmonised standards will be required. For even more critical
products, a third-party assessment will be mandatory.
This report details the available standardisation outputs on the cybersecurity of products
(hardware and software products, including hardware and software components of more complex
products) carried out mainly by ESOs and international Standards Development Organizations
(SDOs). Specifically, the study aim at presenting a mapping of the existing cybersecurity standards
against the essential requirements listed in Annex I of the CRA proposal, along with a gap analysis
between the mapped standards and the requirements. In view of the development of harmonised
standards, this analysis offers a possible overview about the current coverage of the requirements
by existing specifications, highlighting possible lacks that may be compensated by further
standardisation work.
Upon request of DG CNECT, this study has been developed jointly by the Joint Research Centre
(JRC) and the European Union Agency for Cybersecurity (ENISA). This was also in line with the
expectations of the proposal of regulation, in which it is stated that synergies on standardisation
aspects should be considered between the Commission and ENISA.
In Section 2, the methodology adopted to carry out this study is summarised. Section 3 is devoted
to the presentation of the mapping between requirements and standards, giving an analysis of the
coverage offered by the standards and possible gaps. In Section 4, a summary of all identified
standards and their respective mapping is offered along with some overall remarks, while Section
5 is for conclusions.
2
2 Methodology
The development of the present study has been articulated in several stages summarised here
below.
Identification of the standardisation organisations
The first step consisted in the identification of the entities that are considered relevant for
standards in the specific area and that are recognised by the industry and scientific communities,
giving precedence to European and international standardisation organisations. Specifically, the
following ones have been taken into account:
— CEN
— CENELEC
— ETSI
— ISO
— IEC
— ITU
Identification of the committees and related standardisation activities
For each of the organisations listed above, the respective committees working on cybersecurity
standards have been identified. For each one of the identified committees the list of
standardisation activities, including ongoing activities, with potential relevance for the mapping
have been identified, drafting a list of respective standards.
High level analysis of the standardisation activities
The standards identified above have been analysed based on freely available information to
confirm their relevance to the specific topic. For those considered relevant a tentative mapping to
the cybersecurity requirements expressed in Annex I of the CRA Regulation has been proposed,
while the others have been discarded. Some statistics pertaining to this activity are summarised in
Annex I of the present document, so as to give an order of magnitude of its extent. This high-level
overview represented a preparatory ground for the insightful analysis of the next stage.
Mapping and analysis of requirements against standards
Once we listed all standards that might be relevant in a first quantitative analysis, the analysis took
a bottom-up approach. For each CRA requirement the most relevant standards were selected
based on an expert analysis, allowing to identify both the currently offered coverage and the
potential gaps to be addressed at later standardisation stages. The requirements mapping and
analysis process is presented in Figure 1, and the overall output of this stage is presented in Section
3.
Identification
Identification
of key security Listing of most
Requirement Coverage Potential gap of the life-
goals and relevant
Selection rationale identified cycle stage(s)
potential sub- standards
concerned
requirements
3
The CRA cybersecurity essential requirements are presented in a list, and each of them is
expressed in the form of generic text. To enhance the identification and evaluation of the standards
possibly covering aspects captured by the CRA requirements it has been deemed useful to analyse
them and highlight some core concepts. Specifically, for each essential requirement a set of sample
sub-requirements and keywords have been identified. Such elements have served mainly as guide
to identify the CRA-relevant standards, but there are not intended to represent a comprehensive
list of sub-requirements, as a specific break-down of a requirement may depend on specificities of
products and applications. To be noted that when an identified standard was available both in the
form of international standard and European standard, we have referenced it according to the
latter.
In addition to the requirements-standards mapping, since the security requirements may apply to
different stages of the products life-cycle, the study have been enriched with an information
pointing out the possible relevance of a requirement with specific product life-cycle stages. This
may be helpful under a manufacturer point of view to better navigate through the requirements
and standards depending on at what stage a product is. The following high-level generic life-cycle
that applies to all diversity of products has been taken as reference.
Design
Implementation
Validation
Commissionning
Surveillance |
Maintenance
End of Life
4
3 Requirements-Standards mapping and analysis
Here below each CRA requirement is mapped against relevant standards. For each standard is
discussed the level of coverage offered for the requirement and possible gaps to be considered.
For each requirement all the analysis are summarized in an overall consideration. The two sub-
sections below reflect the two groups of requirements expressed in the CRA Annex I.
3.1.1 (1) Products with digital elements shall be designed, developed and
produced in such a way that they ensure an appropriate level of
cybersecurity based on the risks;
Sample Sub-requirements:
— A cybersecurity risk analysis should be conducted and monitored during the complete lifecycle
of the product
— Cybersecurity should be taken into account in every step of the product creation (e.g. secure
coding, security by design principles, etc.)
Keywords: risk, risk analysis, remediation strategy, secure coding
5
EN Information Although not specific This standard is Design
ISO/IEC security, to product security, generic and not
27005: cybersecurity this standard specific to product
2022 and privacy specifies how development
protection — information security
Guidance on risks should be
managing managed. A proper
information risk analysis is indeed
security risks of paramount
importance to
understand which is
the “appropriate level
of cybersecurity
based on the risks”
6
V2.1.1 Internet of practices, implies the not provided, but
(2020-06) Things: need for risk analysis sometimes
Baseline by setting a references to
Requirements framework for secure relevant documents
design, emphasizes are provided.
secure development
practices and data
protection
Overall The various components of this requirement are covered within major
coverage cybersecurity standards. Within these three selected standards, the gaps may be
and summarised as follow:
possible
— The hardware design part is less covered when compared to the software
gaps
counterpart
— A risk analysis process specifically targeted to system design is presented only
for IACS, while the more general ISO 27005 standard is not specific to system
or product design
3.1.2 (2) Products with digital elements shall be delivered without any known
exploitable vulnerabilities;
Sample Sub-requirements:
— A vulnerability assessment should be performed against the digital elements of a product
— Known exploitable vulnerabilities shall be fixed before the release of the product
Keywords: exploitable vulnerability, vulnerability assessment
7
Methodology Common Criteria - ISO/IEC
(CEM)) 15408 series)
8
within products and services requirement to
they sell, produce, have fix each known
produced and services they exploitable
operate during the defined vulnerability
support period. before the
release of the
product
Overall The first two standards (ISO/IEC 18045:2022 and ITU-T X.1214) contain a step-by-
coverage step methodology for vulnerability assessment; collectively they cover the pre-
and and post-delivery phases of the product life cycle. They cover both known and
possible unknown (zero-day) vulnerabilities with a number of different, complementary
gaps techniques. The IEC 62443-4-1 standard prescribes several security tests on the
product, although referring only IACS, and the ETSI EN 303 645 standard poses a
requirement for IoT manufacturers not referring explicitly to the initial delivery
and without further implementation detail.
With the exception of the IEC 62443-4-1 standard, but which refers only to IACS,
the main identified gap is that the mentioned standards cover only vulnerability
detection and not the patching of the discovered vulnerabilities, so in general not
covering the whole requirement: ISO/IEC 18045 (which is the standard used for
the Common Evaluation Methodology (CEM) that is used in conjunction with the
Common Criteria - ISO/IEC 15408 series) describes a vulnerability assessment
methodology in validation phase and with only one technique, ITU-T X.1214 covers
more techniques in validation and maintenance phases but without a specific
methodology and focusing on ICT network elements, and ETSI EN 303 645
describes only the necessity to deliver products without vulnerabilities.
3.1.3 (3) On the basis of the risk assessment referred to in Article 10(2) and where
applicable, products with digital elements shall:
9
Standard Standard title Rationale Gap Life-Cycle
ID
10
cryptographic targeting
purposes. It specifies configuration
their security management
requirements and aspects.
covers application of
random bit strings
for random PIN and
password
generation. It can be
employed to address
aspects of
randomised
passwords and keys
for secure product
configuration.
Overall Aspects related to random password and key generation in general are well
coverage covered by ISO/IEC 18031:2011 for what concerns specific conceptual models.
and Those related to product configuration/credentials management (ISO/IEC
possible 27002:2022 and ETSI EN 303 645) are addressed at a high level, with references to
gaps NIST publications for details. More detailed implementation aspects relying for
example on the specific use of non-erasable memories for configuration
management seem not to be covered.
11
Standard Standard Rationale Gap Life-Cycle
ID
12
requirements for
the
implementation
of an identity
management
framework.
Part 3 provides
guidance for
ensuring that an
identity
management
system conforms
to Parts 1 and 2.
13
specific access provide access
control control
mechanisms and services.
services.
Overall The standards above cover the following areas: authentication, identity & access
coverage management, and access control. The aspects related with these areas are well
and covered by the above standards. It should be noted that the above standards are
possible mainly of generic nature and in most cases do not cover specific mechanisms and
gaps services.
14
3.1.5 (3c) protect the confidentiality of stored, transmitted or otherwise
processed data, personal or other, such as by encrypting relevant data at rest
or in transit by state of the art mechanisms;
Sample Sub-requirements:
— Data stored in a product’s internal memory should be encrypted at rest using current non-
deprecated technology
— Transmission protocols used to send/receive data should support encrypted communications
and enable them by default
— The product should implement symmetric or asymmetric encryption schemes (including PKIs)
to ensure that confidentiality of exchanged data is protected
Keywords: symmetric/asymmetric encryption, encryption at rest and in motion/transit, PKI,
certificates, sensitive assets confidentiality, data confidentiality
15
Part 6:2019 identity-based
Homomorphic ciphers.
encryption
Part 7:2022
Tweakable block
ciphers
16
Overall The above standards cover the basic concepts and principles behind data
coverage confidentiality, both at-rest and in-transit. They also cover symmetric and
and asymmetric encryption algorithms, as well as homomorphic and identity-based
possible ciphers. The aspects related with these areas are well covered by the above
gaps standards. It should be noted here that the above standards are a mix of generic
standards independent from network technology or network stack layer and more
specific standards describing encryption algorithms.
17
Authentication functions. Part 1
Codes (MACs) covers 6 MAC
algorithms based
Part 1:2011
on block ciphers,
Mechanisms using
generic enough to
a block cipher
be applied to any
Part 2:2021 security
Mechanisms using architecture,
a dedicated hash- process or
function application.
Part 3:2011
Mechanisms using
a universal hash-
function
18
These directly does not
align with the explicitly detail
requirement's information
focus on ensuring integrity.
integrity using
non-deprecated
technology like
hashing and
cryptographic
schemes
Overall The above standards cover basic concepts and principles for providing integrity
coverage services. They also describe specific mechanisms for integrity based on digital
and possible signatures and MACs. The aspects related with these areas are well covered by
gaps the above standards. It should be noted here that the above standards are a mix
of generic (related to integrity concepts) and more specific standards (related to
integrity mechanisms).
19
3.1.7 (3e) process only data, personal or other, that are adequate, relevant and
limited to what is necessary in relation to the intended use of the product
(‘minimisation of data’);
Sample Sub-requirements:
— In general, refer to GDPR best practices, such as:
o it should not be asked to the user the provision of data that is not strictly necessary to
the execution of the task or service requested
o data no longer needed should be deleted without delay
Keywords: privacy, GDPR, data minimisation, personal data, data retention
20
ETSI TS CYBER; This Technical The documents Design
103 485 Mechanisms for Specification does not list
Implementation
V1.1.1 privacy assurance document specific
(2020-08) and verification describes requirements or Validation
mechanism to controls Commissioning
enable assurance
of privacy, using Surveillance
references to Maintenance
Common Criteria
documents and to End of Life
the GDPR
Overall This privacy requirements is very well covered especially in the ISO/IEC 27701
coverage standard, that proposes a mapping between various standards and legislation,
and including the GDPR. The concept of data minimisation is well covered.
possible
gaps
21
3.1.8 (3f) protect the availability of essential functions, including the resilience
against and mitigation of denial of service attacks;
Sample Sub-requirements:
— The product should be hardened against attacks, like for instance distributed denial of service
attacks, by implementing, among other things, the following measures if appropriate:
o reverse proxies network segmentation
o load balancing
o rate limiting
o redundancy and high availability solutions
o backup sites
o disaster recovery plans
o minimize offered services
Keywords: availability, resiliency, secure outages, backup, denial of service, DoS, DDoS, protocol-
based attacks, connection limit
22
dimension for data from a data
centres classification. centre, it does
not refer to
the design of
generic user
products.
23
Addresses resilience in
case of data networks
and power outages.
Overall General availability aspects are covered by ISO/IEC 22237-1:2021 for what concerns
coverage the design of data centre facilities and infrastructures, that could be applicable to
and some digital products and services but do not cover all the landscape. Broader
possible scope is provided by ISO/IEC 27002:2022 and ETSI EN 303 645 even if at a high level
gaps and, for the latter, focusing on IoT consumer devices. ITU-T X.805 (10/2003) covers
the requirement for end-to-end network security. EN IEC 62443-4-2 covers the
requirement for IACS. A possible gap could be the more detailed guidance on
implementation of availability principles for generic user products.
3.1.9 (3g) minimise their own negative impact on the availability of services
provided by other devices or networks;
Sample Sub-requirements:
— The product should limit outgoing network connections to what is strictly needed
— The product should implement measures such as timeouts and exception handling to avoid
generating multiple requests to a busy/not responsive service
Keywords: network saturation, minimization, connection limits, timeouts, exception handling
24
Standard Standard title Rationale Gap Life-Cycle
ID
ETSI EN CYBER; Cyber The standard includes While the standard Design
303 645 Security for requirements on encompasses
Implementation
V2.1.1 Consumer system resilience, security, data
(2020-06) Internet of limiting unnecessary protection, and
Things: exposure, and orderly resilience, it
Baseline network connections, doesn't specifically
Requirements which align with focus on
minimizing negative minimizing
impacts on other interference with
services. other services as
in the given
Relevant Provisions:
requirement.
5.6 Minimize exposed Provisions related
attack surfaces to network
5.9 Make systems saturation,
resilient to outages connection limits,
and exception
5.13 Validate input handling are not
data fully addressed in
the standard,
indicating
potential gaps in
coverage.
Moreover, the
provisions are
expressed at high-
level and target
specifically
consumer IoT
devices.
25
only with explicit
permission of end
users
it is required to have
the anti-interference
ability between the IoT
device and network
equipment.
Overall Requirement 3(g) of the CRA proposal is covered only in documents related to IoT
coverage devices, although they can be considered quite generic. However, even in these
and documents the coverage is limited to a minimal number of high-level provisions.
possible
gaps
3.1.10 (3h) be designed, developed and produced to limit attack surfaces, including
external interfaces;
Sample Sub-requirements:
— The product’s hardware design should limit all the connections and interfaces that are not
strictly required for performing the various tasks the product is expected to do
— If required by a risk assessment, a physical product should include tamper-resistant features
— The product/service should have all not essential network ports closed as a default
configuration
— Software present in digital product should be designed to avoid having unnecessary entry
points (e.g. API) open and available for external unauthorised callers
Keywords: hardware hardening, tamper-resistance, system hardening, software hardening,
interfaces, security by design
26
of the application of
the principle.
27
ETSI EN 303 CYBER; Cyber The requirement This standard is Design
645 V2.1.1 Security for closely aligns with specific to IoT
Implementation
(2020-06) Consumer Section 5.6 of this consumer
Internet of standard, which devices and
Things: emphasizes minimizing does not
Baseline exposed attack automatically
Requirements surfaces through apply to other
disabling unused categories of
interfaces, not products, for
unnecessarily exposing which other
physical interfaces, and and maybe
following secure more specific
development provisions may
processes. be needed.
Overall This requirement is well covered from a theoretical point of view in the analysed
coverage documents, that well describe what are the security design principles that would
and allow to minimise the attack surface of a product with digital elements.
possible Nevertheless, we found a lack of concrete requirements and practical controls
gaps that, implemented, would indeed ensure an attack surface minimisation.
Standard EN IEC 62443-4-2:2019 is a partial exception to this as it included
concrete requirements although limited to industrial automation and control
systems.
3.1.11 (3i) be designed, developed and produced to reduce the impact of an incident
using appropriate exploitation mitigation mechanisms and techniques;
Sample Sub-requirements:
— The product should be designed in a way that gaining unauthorised access to a function or
data does not automatically lead to a complete access to all product’s functions and data
(defence in depth principles)
— Sensitive data stored in a product’s internal memory should be encrypted at rest
— The product should not store data that is not relevant or necessary to perform its tasks (data
minimisation)
Keywords: defence in depth, encryption-at-rest, data minimisation, security by design, hardening,
risk assessment, secure architecture, sandboxing, secure environment
28
security
management
systems —
Requirements
29
However, it could be
used to provide
assurance in the
product thus
reducing the impact
of an incident using
appropriate (=
assessed by the lab)
exploitation
mitigation
mechanisms and
techniques.
30
Encryption-at-Rest:
provisions 5.4-1,
5.4-2, 5.3-7, and
5.5-1 partly address
this requirement.
Other Relevant
Provisions:
Ensuring software
integrity (5.7)
Encrypted
communication
(5.5)
Hardening by
disabling unused
interfaces and
minimizing code
(5.6-1, 5.6-6)
Secure
management
processes and best
practice
cryptography (5.5-8,
5.3-7)
Overall The standards provide a solid foundation in secure system design, secure product
coverage development, risk assessment, security evaluation, and security controls.
and However, some aspects of defence in depth, sandboxing, and certain mitigation
possible techniques might not be explicitly covered by the selected standards.
gaps
31
3.1.12 (3j) provide security related information by recording and/or monitoring
relevant internal activity, including the access to or modification of data,
services or functions;
Sample Sub-requirements:
— A product should contain a log of cybersecurity related events
— Access or modification of data, services or functions should be logged
— Such log should be accessible to the privileged user
— Logs should be protected from unauthorised modification or corruption
Keywords: logging, event monitoring, non-repudiation, intrusion detection, tamper-detection
32
ETSI EN CYBER; Cyber Relevant Provisions: The Design
303 645 Security for requirement
5.9-2, 5.9-3 (Resilience): Implementation
V2.1.1 Consumer related to
focus on resilience and
(2020-06) Internet of recording Validation
restoration after
Things: and/or Surveillance
outages. They imply the
Baseline monitoring
need to monitor system Maintenance
Requirements relevant
behaviour, possibly
internal activity,
including unauthorized
including the
access attempts or
access to or
modifications, although
modification of
this is not explicit.
data, services,
5.10-1 (Examine system or functions, is
telemetry data): calls for not explicitly
examining telemetry addressed.
data, including the While there are
monitoring of system some aspects
usage and behaviour. It related to
aligns with the focus on telemetry data
recording and and input
monitoring internal validation,
activities, such as specific
unauthorized access or guidelines or
modifications. mandates for
5.11-1 to 5.11-4 (Easy logging
deletion of user data): cybersecurity-
allow users to control related events,
and erase their data. and ensuring
They indirectly imply that logs are
tracking of data access accessible to
and modification privileged users
while being
5.13-1 (Validate input protected from
data): requires data unauthorized
input validation to modification or
ensure its integrity and corruption, are
authenticity. It implies a not expressly
monitoring mechanism detailed in the
and may indirectly relate standard.
to logging and event
monitoring
IEC 62443- Security for This standard is related Relevant only Design
4-2:2019 industrial to IACS. Within the listed to IACS.
Implementation
automation requirements there are
and control also provisions about
systems - Part event auditing
4-2: Technical (Component
security Requirement 2.8:
requirements Auditable events),
timestamping of audit
33
for IACS records (Component
components Requirement 2.11:
Timestamps) and non-
repudiation (Component
Requirement 2.12: Non-
repudiation)
Overall Monitoring aspects with specific focus on non-repudiation are covered in ISO/IEC
coverage 13888-1:2020. ISO/IEC 27002:2022 gives a more general overview and high-level
and provisions. ETSI EN 303 645 V2.1.1 touches upon telemetry data, data validation
possible and integrity. EN 62443-4-2 covers the requirement for IACS.
gaps
3.1.13 (3k) ensure that vulnerabilities can be addressed through security updates,
including, where applicable, through automatic updates and the notification
of available updates to users.
Sample Sub-requirements:
— The company distributing a product or service should provide timely security updates for the
software components of the product/service for a reasonable amount of time.
— A function to automatically check the presence of updates and install them, or notify the user
of their presence, should be implemented, and where applicable this should be the default
initial configuration.
— A product should provide a secure mechanism to install/implement updates
— The company distributing a product should notify the user on the availability of updates
Keywords: Indicator of Compromise, patching, software updates, automatic updates, user
notification, secure update functionality
34
ETSI EN CYBER; Cyber Security Addresses security Lacks detailed Design
303 645 for Consumer Internet updates, automatic guidance on
V2.1.1 of Things: Baseline updates, and user secure
(2020-06) Requirements notifications for mechanisms for
consumer IoT installing/implem
devices enting updates
35
3.2 Vulnerability handling requirements
Overall To address the gaps in ISO/IEC 27036 related to Software Bill of Materials (SBOM),
coverage it's recommended to consider the following standards and initiatives:
and
— SPDX: A Linux Foundation standard for sharing software components, licenses,
possible
copyrights, and security data, providing a consistent SBOM format [2].
gaps
36
— NTIA's Software Component Transparency Initiative: A U.S. initiative working
on standardizing SBOM formats and best practices for software component
transparency [3].
— CycloneDX: An SBOM specification designed for application security and supply
chain component analysis, offering a lightweight format for describing
software components and metadata [4].
— ECSO Supply Chain management and Product Certification Composition [5]
— IIoTSBOM is an initiative from LSEC, Flanders Make and KU Leuven COSIC from
Belgium to improve cybersecurity for devices. Inspired and with the support of
the US CISA (Cyber Security and Infrastructure Security Agency) [6]
Combining these standards and initiatives with ISO/IEC 27036 can help create a
comprehensive approach to managing SBOMs, addressing information security
risks in supplier relationships, and improving software supply chain transparency.
3.2.2 (2) in relation to the risks posed to the products with digital elements,
address and remediate vulnerabilities without delay, including by providing
security updates;
Sample Sub-requirements:
— In case vulnerabilities are found they should be classified in accordance with standard severity
metrics (e.g. CVSS)
— vulnerabilities that can be directly fixed by the company should be fixed without delay, in
accordance to their severity and the posed risks
— In case a vulnerability is found in a software component of a product (including libraries and
third party components), an update should be prepared and distributed as soon as possible
— The company developing a product or service should be subscribed to updates coming from
CERTs and cybersecurity organisations and analyse them in order to spot vulnerabilities in their
products
— The company developing a product or service should remain updated on the release of new
versions of the libraries or third party software components included in their products/services
and update the relative software whenever such new version includes a security update
Keywords: security updates, CVSS, updates release, vulnerability management, secure policy
37
systems — security management, or
Requirements management system handling security
(ISMS). It outlines the updates for libraries
requirements for and third-party
managing risks components.
related to
information security,
including addressing
and remediating
vulnerabilities in
digital products.
38
Vulnerability process vulnerability remediation, and
disclosure reports from external patch management in
sources, such as a comprehensive
CERTs and manner.
cybersecurity
organizations.
Overall While each standard provides valuable information and guidance, there is no single
coverage standard that comprehensively addresses all aspects of vulnerability management,
and including classification, remediation, patch management, handling updates from
possible CERTs and cybersecurity organizations, and maintaining updates for third-party
gaps components and libraries.
To cover this gap, these standards could be combined to address the specific
security needs aligned with sectoral requirements, and the regulatory landscape. By
leveraging the strengths of each standard, a more comprehensive vulnerability
management process addressing and remediating vulnerabilities in products with
digital elements could be needed to fully cover this requirement.
3.2.3 (3) apply effective and regular tests and reviews of the security of the
product with digital elements;
Sample Sub-requirements:
— Periodic vulnerability assessment should be executed, especially towards those components
that present the highest risk
— When developing or maintaining software components, automatic tests should be executed
whenever a new commit/build/version is prepared, if possible using Continuous
Integration/Continuous Deployment (CI/CD) techniques
— A risk assessment should be re-evaluated whenever there is a significant change in one of the
dimensions analysed (new threats, new vulnerabilities, etc.) or a new product release.
Keywords: vulnerability assessment, continuous integration/continuous deployment, risk
assessment, security testing procedures, testing
39
Standard Standard title Rationale Gap Life-Cycle
ID
40
ISO/IEC Information This standard provides This standard Surveillance
27005: security, guidelines for provides
Maintenance
2022 cybersecurity and information security guidelines for
privacy protection risk management, information
— Guidance on which includes risk security risk
managing assessment, risk management, but
information treatment, and regular it does not cover
security risks monitoring and review specific security
of risks associated with testing
digital products. methodologies or
CI/CD techniques.
Overall While each standard provides valuable information and guidance, there is no single
coverage standard that comprehensively addresses all aspects of security “effective” testing
and and reviews for products with digital elements, including specific testing
possible methodologies, CI/CD techniques, and the frequency and scope of testing.
gaps
3.2.4 (4) once a security update has been made available, publically disclose
information about fixed vulnerabilities, including a description of the
vulnerabilities, information allowing users to identify the product with
digital elements affected, the impacts of the vulnerabilities, their severity
and information helping users to remediate the vulnerabilities;
Sample Sub-requirements:
— New CVE indicators should be publicly released and disseminated as soon as the relative
security update has been released or implemented
Keywords: Common Vulnerabilities and Exposures (CVE), vulnerability disclosure, vulnerability
analysis
41
vulnerability specific guidance
information, such as the on the timeline
nature of the for public
vulnerabilities, affected disclosure or the
products, impacts, exact format for
severity, and sharing
remediation vulnerability
information. information.
42
Overall While these standards and initiatives contribute to the process of vulnerability
coverage disclosure, they do not comprehensively address all aspects of public disclosure,
and such as specific disclosure timelines or the exact format for sharing vulnerability
possible information across different industries or product types.
gaps
To cover this gap, it could be considered the implementation of a combination of
these standards and initiatives, tailoring the approach to the specific needs,
industry, and regulatory landscape. Additionally, it may be possible to rely on
vulnerability disclosure policies and procedures that align with industry best
practices (including for instance: CVE [7], NIST National Vulnerability Database (NVD)
[8], FIRST Vulnerability Reporting and Data eXchange (VRDX) SIG [9]). As part of a
holistic approach, engaging with and incorporating feedback from various
stakeholders, such as customers, researchers, and security experts, should be an
ongoing, integral part of the vulnerability management process. By leveraging the
strengths of each standard and initiative, it may be possible to create a
comprehensive and effective vulnerability disclosure process that meets the
requirement and its sub-requirements.
3.2.5 (5) put in place and enforce a policy on coordinated vulnerability disclosure;
Sample Sub-requirements:
— The company should adopt and enforce the CVD policy
Keywords: CVD policy
43
handling guidance on coordinated
processes investigating, resolving, vulnerability
and disclosing disclosure (CVD).
vulnerabilities in a However, it
coordinated manner. doesn't specify the
enforcement of a
particular national
or EU CVD policy.
Overall While the mentioned standards and initiatives contribute to the development and
coverage implementation of a CVD policy, they do not comprehensively address all aspects of
and enforcing such a policy or provide specific guidance tailored to different industries
possible and product types.
gaps
To cover this gap, it could be considered the implementation of a combination of
these standards, initiatives, and national / EU CVD policies. Additionally, it may be
possible to rely on CVD policies and procedures that align with industry best
practices (e.g. NIST SP 800-61 Revision 2 [10], FIRST VRDX SIG [9]). By leveraging the
strengths of each standard and initiative, it may be possible to create a
comprehensive and effective CVD policy that meets the requirement.
44
3.2.6 (6) take measures to facilitate the sharing of information about potential
vulnerabilities in their product with digital elements as well as in third party
components contained in that product, including by providing a contact
address for the reporting of the vulnerabilities discovered in the product
with digital elements;
Sample Sub-requirements:
— The company distributing a product/service should have a contact point specifically advertised
to collect information related to vulnerabilities found in their products/services. If the company
has one, this contact point should be the company’s PSIRT
— The company distributing a product/service should inform any relevant authority (e.g. national
CERT/CSIRT) about how they can be reached in a timely manner for reasons related to the
handling of vulnerabilities
Keywords: PSIRT, discovered vulnerabilities
45
and disclosing
vulnerabilities.
Overall The mentioned standards and initiatives contribute to various aspects of the
coverage requirement but do not comprehensively address sharing information about
and potential vulnerabilities in third-party components and other digital elements.
possible
To cover this gap, it could be considered the implementation of a combination of
gaps
these standards, initiatives, and collaborate with national CERTs/CSIRTs and ENISA.
It may be possible to also follow the CSIRTs Network forum and [11] latest ENISA
activities on that topic under the EU Cybersecurity Act umbrella.
The CSIRTs Network is composed of CSIRTs appointed by EU Member States and
CERT- EU ('CSIRTs Network members'). It is worth noting that ENISA actively
supports cooperation between CSIRTs, provides the secretariat and supports
incident coordination upon request.
Additionally, it may be possible to rely on policies and procedures that align with
industry best practices (e.g., NIST SP 800-61 Revision 2 [10], FIRST PSIRT Services
Framework [12]). By leveraging the strengths of each standard and initiative, it may
be possible to create a comprehensive and effective process for sharing information
about potential vulnerabilities and handling discovered vulnerabilities in their
products with digital elements and third-party component.
3.2.7 (7) provide for mechanisms to securely distribute updates for products with
digital elements to ensure that exploitable vulnerabilities are fixed or
mitigated in a timely manner;
Sample Sub-requirements:
— Security updates should be digitally signed using a Code Signing Certificate to ensure the
identity of the issuer
— Hashes of the updates should be made publicly available with instructions on how to verify
them
Keywords: code signing certificate, hashing, secure software update distribution, digital
signatures, official distribution channel, hash publication
46
cryptographic controls, instructions for
and securing verification.
distribution channels.
IEC 62443- Security for This standard focuses While IEC 62443-4-1 Design
4-1:2018 industrial on defining process addresses security
automation and requirements for the aspects throughout the
control systems - secure development of product development
Part 4-1: Secure products used in lifecycle, including
product industrial automation aspects related to
development and control systems. It secure software
lifecycle covers security updates and patch
requirements requirements management, there are
throughout the product potential gaps when it
development lifecycle, comes to covering the
including design, analysed requirement
implementation, of securely distributing
testing, and updates for products
maintenance. While the with digital elements.
standard is primarily
Industry specificity: IEC
targeted at the
62443-4-1 is tailored to
development of secure
Industrial Automation
products, it also
and Control Systems
addresses aspects
(IACS). Although the
related to secure
standard's principles
software updates and
can be applied to other
patch management,
industries, it does not
which are important for
fully cover the unique
securely distributing
needs and challenges of
updates.
other sectors.
Explicit mention of
hashes and verification:
The standard does not
explicitly address the
publication of update
hashes and the
provision of
instructions for
verifying them.
Organizations may
need to develop
additional guidelines or
policies to ensure that
hashes are published
and that users receive
clear instructions for
verifying the
authenticity and
47
integrity of software
updates.
Code signing certificate:
While the standard
covers secure software
development practices,
it does not explicitly
mention the
requirement of using
code signing certificates
to sign security
updates, which ensures
the identity of the issuer
and the integrity of the
update.
Overall The mentioned standards contribute to various aspects of the requirement but
coverage does not comprehensively address the publication of update hashes and the
and provision of instructions for their verification.
possible
To cover this gap, it could be considered the implementation of a combination of
gaps
these standards, tailored to the specific needs and industry best practices (e.g.,
NIST SP 800-53 [13], NIST SP 800-63B [14], OWASP SSDLC [15]). It may be possible
to take a closer look into the Patch Management mechanism suggest in the EUCC
[16]. The latter provides a framework for securely distributing updates for products
with digital elements, ensuring that exploitable vulnerabilities are fixed or mitigated
in a timely manner. By leveraging the strengths of each standard and considering
input from various sources, it may be possible to create a comprehensive and
effective process for securely distributing updates and mitigating exploitable
vulnerabilities in a timely manner.
3.2.8 (8) ensure that, where security patches or updates are available to address
identified security issues, they are disseminated without delay and free of
charge, accompanied by advisory messages providing users with the relevant
information, including on potential action to be taken.
Sample Sub-requirements:
— Users should be made aware of the existence of security updates either via automatic
distribution, popup, newsletter, etc.
— This notice should contain information about the fixed issues and instructions on how to apply
the update
— Security updates should be released free of charge
Keywords: Security update notice
48
Standard Standard title Rationale Gap Life-Cycle
ID
49
Overall The existing standards and guidelines generally provide guidance on vulnerability
coverage management, patch management, and the dissemination of security updates.
and However, they do not explicitly address certain aspects of the requirement, such
possible as providing updates free of charge or specifying methods for user notification.
gaps
To cover the overall gap, it could be possible to define policies that mandate
providing updates free of charge and establishing specific methods for notifying
users about available security updates.
50
4 Summary of the identified standards and overall remarks
Here the overall list of identified standards is summarised with the respective mapping, grouping
them according to the two groups of CRA essential requirements.
Standard 1 2 3 3 3 3 3 3 3 3 3 3 3
a b c d e f g h i j k
EN ISO/IEC 27002:2022 x x x x x x
EN ISO/IEC 27005:2022 x
EN IEC 62443-3-2:2020 x x
EN IEC 62443-4-1:2018 x x
ISO/IEC 18045:2022 x x
ISO/IEC 18031:2011 x
ISO/IEC 29146:2016 x
EN IEC 62443-4-2:2019 x x x x x x x
51
ITU-T X.815 (11/1995) x
ISO/IEC 27701:2019 x
ISO/IEC 29100:2011 x
ISO/IEC 22237-1:2021 x
ISO/IEC TS 19249:2017 x
ISO/IEC 15408-2:2022 x
ISO/IEC 27001:2022 x
ISO/IEC 27034-1:2011 x
EN ISO/IEC 15408-3:2022 x
ISO/IEC 13888-1:2020 x
ISO/IEC 30111:2019 x
IEC 62443-2-1:2010 x
Table 22: Overall list of the identified standards with their respective mapping towards the security
requirements
Vulnerability handling
requirements
Standard 1 2 3 4 5 6 7 8
ISO/IEC 27001:2022 x x
ISO/IEC 27002:2022 x x x x
EN ISO/IEC 30111:2020 x x x x x
EN ISO/IEC 29147:2020 x x x x
IEC 62443-4-1:2018 x x x x
ISO/IEC TS 27034-5-1:2018 x
52
ISO/IEC 27005:2022 x
Table 23: Overall list of the identified standards with their respective mapping towards the vulnerability
handling requirements
Some overall remarks stem from the detailed analysis of the previous section and from the two
above summary tables, and are summarized here below:
— Overall, the existing standards cover at least partially all CRA requirements. This provides a
strong basis to build on taking into consideration the identified gaps. Nevertheless, we did not
find a single standard that can, alone, satisfy all requirements listed in the two lists present in
Annex I of the CRA;
— In general, “horizontal” standards - i.e., not targeting a specific use case or a market sector -
emerged as the most relevant to cover the purposes of the different requirements. The only
exception to this is represented by some standards of the EN IEC 62443 family (related to
industrial control systems) and the Internet of Things (IoT), although in our opinion standards
targeting the IoT domain can be seen mostly as horizontal standards, since nowadays most
digital devices can be associated to the IoT scenario;
— Although some of the selected standards are not directly related to product
design/development (e.g., EN ISO/IEC 27002 related to recommended controls for initiating,
implementing or maintaining information security management systems), they might
nevertheless be relevant for the CRA, as their implementation by an organisation will be
reflected also in the products produced by that organisation;
— Regarding the product-related security requirements of the first list of CRA Annex I, the
standard ETSI EN 303 645 has been indicated to us as one of the most relevant, and for this
reason we have made a specific attempt to map it on all the requirements, which result
somehow all covered by the standard even if with some gaps. To be also noted that the
standard is specifically devoted to IoT systems, so, even if many digital products nowadays
present different features analogous to those of the IoT environment, an automatic
applicability of this standard to all categories of products cannot to be taken for granted (see
also the comment below about the requirement 3g). Another relevant standard in terms of
coverage of the requirements is EN ISO/IEC 27002 (information security controls), covering 6
out of 13 requirements. Also the EN IEC 62443 family offers a quite good coverage, but it is
specifically devoted to industrial control systems.
— For the vulnerability handling requirements, the second list of the annex, EN ISO/IEC 30111
(vulnerability handling process) is the most relevant one, covering 5 out of 8 requirements, with
also EN ISO/IEC 29147 (vulnerability disclosure) covering 4 of the same requirements. All these
standards are “horizontal” in terms of their application;
— In some cases, such as requirement 3(b) (ensure protection from unauthorised access by
appropriate control mechanisms, including but not limited to authentication, identity or access
management systems), the selected standards are quite generic whereas there exist several
other standards covering specific use cases in more detail. The selection of more generic
standards allows more flexibility and wider coverage of current and future use cases. On the
other hand, specific and sectoral standards might be able to satisfy more closely the peculiar
constraints and requirements of specific niches;
53
— In other cases, e.g., 3(f) (protect the availability of essential functions, including the resilience
against and mitigation of denial of service attacks), the focus of the identified documents is more
on infrastructural elements rather than user products or services. Even though these
infrastructures are the core for provisioning of services and for some device functionalities,
more specific standard provisions would be needed. Those are present for IoT devices, but still
at a high level;
— While requirement 3(g), which focuses on minimizing negative impacts on the availability of
services provided by other devices or networks, is specifically addressed by standards related to
the IoT domain, it raises questions about the broader applicability of these standards. In the
context of the highly interconnected nature of devices in the IoT domain, these standards have
clear relevance. However, for other domains, the specific applicability of IoT-focused
cybersecurity standards may need further evaluation. While interconnectedness is also a
characteristic of several domains nowadays, the specific requirements, regulations, and risks
might vary, necessitating a tailored approach or additional measures to ensure that
cybersecurity needs are adequately addressed.
54
5 Conclusion
Products with digital elements are evermore present in our lives. The increasing number of
cyberattacks affecting them triggers negative impacts on many different aspects of our society. As
a response the European Commission has proposed the Cyber Resilience Act, a new legislative
framework prescribing a set of cybersecurity requirements that manufacturers have to implement
in their products with digital elements.
The defined requirements should be translated into harmonised European standards which would
become the reference cybersecurity specifications to be followed by manufacturers. In view of this
standardisation activity, this report identifies the most relevant already existing cybersecurity
standards mapping them to the different requirements, describing both the level of offered
coverage and the gaps to be possibly considered in further standardisation efforts.
According to our analysis for each of the defined requirements there is already at least one
document that can be considered as an initial reference offering some coverage. However, to the
best of our knowledge, there is not a single standard capable of covering all the requirements
expressed in the proposed legislative act, even if some of the standards do partially cover all of the
requirements. The analysis offers re-assurance that a good international cybersecurity
standardisation base is already in place for serving the scope of the Cyber Resilience Act
requirements, but harmonisation is needed to ensure a homogeneous horizontal coverage, and
some gaps, as highlighted in this report, need still to be addressed.
55
References
[1] Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on
horizontal cybersecurity requirements for products with digital elements and amending
Regulation (EU) 2019/1020, COM/2022/454. https://eur-lex.europa.eu/legal-
content/EN/TXT/?uri=CELEX%3A52022PC0454
[2] SPDX: A Linux Foundation standard for sharing software components, licenses, copyrights,
and security data, providing a consistent SBOM format - SPDX Specification 2.2.
https://spdx.github.io/spdx-spec/
[3] NTIA's Software Component Transparency Initiative - a U.S. initiative working on standardizing
SBOM formats and best practices for software component transparency.
https://www.ntia.gov/SBOM
[4] CycloneDX: An SBOM specification designed for application security and supply chain
component analysis, offering a lightweight format for describing software components and
metadata - CycloneDX Specification. https://cyclonedx.org/capabilities
[5] ECSO Supply Chain management and Product Certification Composition. https://ecs-
org.eu/activities/standardisation-certification-and-supply-chain-management/
[6] IIoTSBOM is an initiative from LSEC, Flanders Make and KU Leuven COSIC from Belgium to
improve cybersecurity for devices. Inspired and with the support of the US CISA
(CyberSecurity and Infrastructure Security Agency). https://www.iiotsbom.com/
[7] The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for
publicly known information-security vulnerabilities and exposures. https://cve.mitre.org/
[8] The National Vulnerability Database (NVD) is the U.S. government repository of standards-
based vulnerability management data, enabling automation of vulnerability management,
security measurement, and compliance. https://www.nist.gov/itl/products-and-
services/national-vulnerability-database-nvd
[9] The Vulnerability Reporting and Data eXchange Special Interest Group (VRDX SIG) of the
Forum of Incident Response and Security Teams (FIRST) focuses on improving vulnerability
management processes and standards. https://www.first.org/global/sigs/vrdx
[10]NIST SP 800-61 Revision 2 - Computer Security Incident Handling Guide.
https://www.researchgate.net/publication/320851514_NIST_Special_Publication_800-
61_Revision_2_Computer_Security_Incident_Handling_Guide
[11]The CSIRT (Computer Security Incident Response Team) Network is a collaborative platform
where members can cooperate, exchange information, and build trust. The network's
members, composed of CSIRTs appointed by EU Member States and CERT-EU ('CSIRTs
Network members'), work together to improve the handling of cross-border incidents and
discuss how to respond in a coordinated manner to specific incidents.
https://www.enisa.europa.eu/topics/incident-response/csirts-in-europe/csirts-network
[12]The PSIRT (Product Security Incident Response Team) Services Framework is a document
developed by the FIRST (Forum of Incident Response and Security Teams) community,
detailing potential services that CSIRTs (Computer Security Incident Response Teams) and
PSIRTs may provide. https://www.first.org/resources/guides/first-psirt-services-framework-
v1.0.pdf
[13]NIST SP 800-53: This standard provides a catalog of security and privacy controls for all U.S.
federal information systems except those related to national security. It aims to protect
individuals' privacy and organizational operations from a diverse set of threats.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
[14]NIST SP 800-63B: This is a guideline for digital identity services. It offers technical
requirements for each of three levels of assurance in the areas of identity proofing,
56
authentication, and federation.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf
[15]OWASP SSDLC: The Open Web Application Security Project (OWASP) Secure Software
Development Life Cycle Project is a guide to security in the software development life cycle. It
provides a core framework for integrating security concepts and best practices into a software
development process. https://owasp.org/www-project-secure-software-development-
lifecycle/
[16]The patch management approach outlined in the EU Common Criteria is for certified ICT
products and aims to ensure the security of the products through proper vulnerability
handling and patch deployment. The process allows for different patch levels based on the
severity and urgency of vulnerabilities, and it involves the collaboration of various
stakeholders in the certification process. Annex 15:
https://www.enisa.europa.eu/publications/cybersecurity-certification-eucc-candidate-
scheme-v1-1.1
57
List of abbreviations and definitions
58
LSEC Leaders in Security - A European information security cluster
PSIRT Product Security Incident Response Team - A team responsible for handling
security incidents and vulnerabilities in products
SBOM Software Bill of Materials - A document that lists the components used in a
software product
SPDX Software Package Data Exchange - A Linux Foundation standard for sharing
software component information
VRDX SIG Vulnerability Reporting and Data eXchange Special Interest Group - A group
within FIRST focused on vulnerability reporting and data exchange
59
List of figures
Figure 1 Overall requirements mapping and analysis process .............................................................. 3
Figure 2 Generic product life-cycle ............................................................................................................. 4
60
List of Tables
Table 1: Mapping of security requirement No. 1 ..............................................................................................................................7
Table 2: Mapping of security requirement No. 2 ..............................................................................................................................9
Table 3: Mapping of security requirement No. 3a ....................................................................................................................... 11
Table 4: Mapping of security requirement No. 3b ....................................................................................................................... 14
Table 5: Mapping of security requirement No. 3c ........................................................................................................................ 17
Table 6: Mapping of security requirement No. 3d ....................................................................................................................... 19
Table 7: Mapping of security requirement No. 3e ....................................................................................................................... 21
Table 8: Mapping of security requirement No. 3f......................................................................................................................... 24
Table 9: Mapping of security requirement No. 3g ....................................................................................................................... 26
Table 10: Mapping of security requirement No. 3h .................................................................................................................... 28
Table 11: Mapping of security requirement No. 3i ...................................................................................................................... 31
Table 12: Mapping of security requirement No. 3j ...................................................................................................................... 34
Table 13: Mapping of security requirement No. 3k .................................................................................................................... 35
Table 14: Mapping of vulnerability handling requirement No. 1.................................................................................... 37
Table 15: Mapping of vulnerability handling requirement No. 2 .................................................................................... 39
Table 16: Mapping of vulnerability handling requirement No. 3 .................................................................................... 41
Table 17: Mapping of vulnerability handling requirement No. 4 .................................................................................... 43
Table 18: Mapping of vulnerability handling requirement No. 5 .................................................................................... 44
Table 19: Mapping of vulnerability handling requirement No. 6 .................................................................................... 46
Table 20: Mapping of vulnerability handling requirement No. 7 .................................................................................... 48
Table 21: Mapping of vulnerability handling requirement No. 8 .................................................................................... 50
Table 22: Overall list of the identified standards with their respective mapping towards the
security requirements ........................................................................................................................................................................................... 52
Table 23: Overall list of the identified standards with their respective mapping towards the
vulnerability handling requirements ........................................................................................................................................................ 53
61
Annexes
Annex 1. High level pre-screening of standardisation activities with potential relevance for
the CRA requirements
As preparatory activity of the present study, with the aim to offer a robust mapping of the CRA
requirements against the relevant cybersecurity standardisation activities offered by European
and international standardisation body, several outputs produced by their committees have been
surveyed. This pre-analysis has represented the ground on which to build the detailed mapping of
standards against the CRA requirements.
In the screening activity already published standards have been obviously considered, but ongoing
standardisation efforts, technical specifications, technical reports and guidelines have been also
taken into consideration. The analysis of each of them has been based solely on freely available
information, like overviews, summaries, abstracts, tables of content and where possible the full
text. For each identified document a tentative coarse mapping against the CRA requirements has
been sketched, so as to measure the potential relevance of each of them in the actual mapping.
In the table below we summarise the number of committees and documents we went through for
the pre-screening of the present study, so as to give an insight about the amplitude of the analysis.
Committees/Working Surveyed
groups Standards/Documents
62
GETTING IN TOUCH WITH THE EU
In person
All over the European Union there are hundreds of Europe Direct centres. You can find the address of the centre nearest you online
(european-union.europa.eu/contact-eu/meet-us_en).
On the phone or in writing
Europe Direct is a service that answers your questions about the European Union. You can contact this service:
by freephone: 00 800 6 7 8 9 10 11 (certain operators may charge for these calls),
at the following standard number: +32 22999696,
via the following form: european-union.europa.eu/contact-eu/write-us_en.