Cyber Resilience Act (CRA):
Cybersecurity for connected products
Login
The iCS - VPN is a remote access service for simple and secure networking of sites, systems or mobile devices via a VPN network.
The iRM enables rollouts of device firmware, configurations, security certificates and applications including logging.
Here you get access to our Partner Portal – become a part of our network now!
With the Cyber Resilience Act (CRA), binding cybersecurity requirements for ‘products with digital elements’ will come into force across the EU from December 2027. The new requirements are designed to ensure cybersecurity throughout the entire product lifecycle and to promote the spread of secure technologies, protect consumers and strengthen trust in digital products. INSYS icom supports companies in the early and sustainable implementation of regulatory requirements.
Page navigation:
Definition CRA
Target group
Requirements
Whitepaper
Our offer
Security & Compliance
FAQ
With the Cyber Resilience Act (CRA), the European Union is creating its first horizontally applicable security regulation for digital products. The aim is to establish a uniform minimum level of cybersecurity throughout the internal market. Almost all networked products are affected, from industrial routers to IoT components. In future, manufacturers will be obliged to meet comprehensive requirements for secure product development, vulnerability management and the provision of security updates. Importers and distributors will also be included in the regulatory responsibility.
The Cyber Resilience Act (CRA) expands the existing CE marking, which was previously focused primarily on functional safety, to include mandatory cybersecurity requirements. In future, products will not only be assessed for mechanical or electrical risks, but also for whether they are adequately protected against cyber attacks.
The regulation applies to all networked products with digital elements. This includes both hardware with network functions, such as industrial routers, and pure software products. The aim of the CRA is to increase the cybersecurity of hardware and software solutions, create greater transparency regarding implemented security mechanisms, and make manufacturers more accountable for continuous vulnerability management.
The requirements of the Cyber Resilience Act affect a broad group of players throughout the life cycle of digital products. In particular, the following target groups must adapt to the new cybersecurity requirements:
Relevant sectors: critical infrastructures, industrial communication technology, remote control technology, utilities, public institutions, and mechanical and plant engineering
Cyber-secure solutions and a CRA-compliant product portfolio for your requirements.
The Cyber Resilience Act requires manufacturers to ensure a minimum level of cybersecurity for all connected products with digital elements. The implementation of these requirements must be clearly documented and demonstrated. Specifically, this means:
Connected products must be designed to be cyber secure from the outset, e.g. through encrypted firmware.
Secure default settings such as automatic security updates or the avoidance of default passwords are mandatory.
Manufacturers must prove that their product meets all CRA requirements, for example through harmonised standards or equivalent internal procedures with corresponding auditability.
Identified vulnerabilities must be reported, documented and remedied throughout the entire product life cycle.
An SBOM (‘ingredients list’ of all software components) must be created during the development phase. Publication is not required.
Security updates must be provided throughout the entire support period.
The regulation came into force in December 2024 and must be implemented by 11 December 2027. New products placed on the market must meet all requirements by this date.
Due to the complexity of the requirements, early action is necessary. Companies in critical infrastructures and industrial applications should already be aligning their product strategy, security architecture and maintenance processes with the requirements of the Cyber Resilience Act in order to avoid subsequent conversion costs, delivery delays and regulatory risks.
CRA comes into force
CAB* can assess compliance with CRA requirements
Mandatory reporting of vulnerabilities and incidents
Effective date of CRA requirements
*CAB = conformity assessment bodies
Failure to comply with the requirements of the Cyber Resilience Act can lead to serious consequences:
» Secure introduction of VPN-based remote maintenance: How INSYS icom supports machine manufacturers with the Cyber Resilience Act «
CRA-compliant router architectures with secure firmware.
Automated security updates with audit-proof logging via icom Router Management.
Central documentation of all configuration changes and accesses.
VPN service with strong authentication and encrypted data transmission.
Application of security-related IEC 62443-4-1 processes in software development and maintenance.
Support for vulnerability management through systematic CVE monitoring.
INSYS icom solutions offer a technically secure product architecture and automated processes for updating, logging and verification. This creates clear advantages in terms of auditability, operational reliability and regulatory compliance in the European single market.
Here you will find relevant evidence and documents regarding CRA compliance, certified development processes and IT security measures at INSYS icom.
The CRA affects almost all digital products with a direct or indirect network connection. These include networked industrial components, software products, IoT devices and communications hardware. The decisive factor is that the product contains digital elements and can communicate with other systems or networks in some form.
INSYS icom offers secure device architectures, automated update management and audit-proof documentation of technical security functions. This provides companies with a solid foundation for meeting CRA requirements during ongoing operations.
Although the CRA is primarily aimed at manufacturers, operators of critical infrastructure are obliged to use only compliant devices. They must also ensure that available security updates and patches are installed promptly in order to comply with operational safety and legal requirements.
Yes, standalone software that is directly or indirectly network-compatible is also covered by the regulation.
The CRA requires manufacturers to continuously identify, assess and remedy vulnerabilities. In addition, security-related vulnerabilities must be reported to central EU platforms. Vulnerability management thus becomes a central component of the security process throughout the entire product lifecycle.
The groundbreaking EU regulation aims to improve cybersecurity for a wide range of connected devices and eliminate vulnerabilities in the increasingly digitised and connected industrial landscape. In this context, the Cyber Resilience Act requires manufacturers to consider cybersecurity requirements as early as the development phase and to comply with them throughout the entire product life cycle. INSYS icom provides proof of this with, among other things, certification according to the international standard IEC 62443-4-1.
We have summarised further measures and, above all, opportunities in connection with the cyber security standard in our white paper ‘Secure introduction of VPN-based remote maintenance: How INSYS icom supports machine manufacturers with the Cyber Resilience Act’.
NIS 2
The NIS 2 Directive (Network and Information Security) sets out binding cybersecurity requirements for critical infrastructures.
Radio Equipment Directive (RED)
The extended RED Directive sets out binding cybersecurity requirements for internet-connected radio equipment such as routers and IoT devices.
Centralised management for updates, configurations and documentation