<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CRA Requirements - Regulus</title>
	<atom:link href="https://goregulus.com/category/cra-requirements/feed/" rel="self" type="application/rss+xml" />
	<link>https://goregulus.com/category/cra-requirements/</link>
	<description>Regulus provides compliance tools for EU cybersecurity regulations, helping manufacturers, IoT vendors and digital product teams meet Cyber Resilience Act requirements.</description>
	<lastBuildDate>Sun, 21 Dec 2025 11:55:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goregulus.com/wp-content/uploads/2026/01/cropped-favicon-32x32.png</url>
	<title>CRA Requirements - Regulus</title>
	<link>https://goregulus.com/category/cra-requirements/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CRA Secure Development Lifecycle (SDL): Practical Guide for Manufacturers</title>
		<link>https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Mon, 15 Dec 2025 11:27:17 +0000</pubDate>
				<category><![CDATA[CRA Requirements]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1209</guid>

					<description><![CDATA[<p>A practical guide to the CRA secure development lifecycle. Learn how SDL activities, controls and documentation support Cyber Resilience Act compliance across the product lifecycle.</p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/">CRA Secure Development Lifecycle (SDL): Practical Guide for Manufacturers</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A <strong>CRA secure development lifecycle</strong> is one of the most effective ways to operationalise Cyber Resilience Act requirements. The CRA expects manufacturers of products with digital elements to design, develop, test and maintain their products in line with security-by-design and security-by-default principles. Without a structured secure development lifecycle (SDL), it is difficult to show that your products systematically meet those expectations.</p>



<p>This guide explains how to build a <strong>CRA secure development lifecycle</strong> that fits your organisation and product portfolio. It covers SDL phases, concrete security activities, documentation requirements and how SDL links to CRA obligations such as risk assessment, vulnerability handling, updates, logging and technical documentation.</p>



<p>For broader context on Cyber Resilience Act obligations, you may want to review our articles on <a href="https://goregulus.com/cra-basics/cra-scope/">CRA requirements, scope and how to prepare</a>, <a href="https://goregulus.com/cra-basics/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA risk assessment</a> and <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">CRA technical documentation</a>.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-secure-development-lifecycle-overview.jpg" alt="Overview diagram of the CRA secure development lifecycle for products with digital elements" class="wp-image-1211" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-secure-development-lifecycle-overview.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-secure-development-lifecycle-overview-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">A CRA secure development lifecycle connects design, implementation, testing and maintenance to Cyber Resilience Act security requirements.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. Why the CRA Secure Development Lifecycle Matters</h2>



<p>The Cyber Resilience Act does not use the term “SDL” formally, but its core ideas are embedded in the essential cybersecurity requirements and lifecycle obligations. A <strong>CRA secure development lifecycle</strong> matters because it:</p>



<ul class="wp-block-list">
<li>Translates high-level CRA security requirements into repeatable engineering activities.</li>



<li>Reduces the risk of introducing avoidable vulnerabilities during development.</li>



<li>Provides evidence that security-by-design and security-by-default are applied in practice.</li>



<li>Supports vulnerability handling, updates and post-market monitoring across the product lifecycle.</li>
</ul>



<p>Without an SDL, security improvements tend to be reactive, ad hoc and difficult to document in the CRA technical file. With a lightweight but structured <strong>CRA secure development lifecycle</strong>, security becomes an integral part of how products with digital elements are built and maintained.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. What the CRA Expects from Secure Development</h2>



<p>The Cyber Resilience Act expects manufacturers to ensure that products with digital elements:</p>



<ul class="wp-block-list">
<li>Are designed, developed and produced in accordance with essential cybersecurity requirements.</li>



<li>Implement security-by-design and security-by-default principles.</li>



<li>Support secure configuration, secure updates and secure communication.</li>



<li>Remain secure throughout their expected lifecycle, with appropriate vulnerability handling.</li>
</ul>



<p>These expectations are not satisfied by a single technical control or penetration test. Instead, they require an underlying <strong>CRA secure development lifecycle</strong> that connects requirements, design, implementation, testing and maintenance in a coherent way.</p>



<p>To build this lifecycle, you should align it with your CRA risk assessment, your vulnerability handling processes and your <a href="https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/" target="_blank" rel="noreferrer noopener">CRA logging and monitoring</a> approach.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. Core Phases of a CRA Secure Development Lifecycle</h2>



<p>A <strong>CRA secure development lifecycle</strong> can be implemented in various ways, but most organisations follow a set of recurring phases. Whether you use agile, waterfall or hybrid models, you can map these phases to your existing process.</p>



<h3 class="wp-block-heading">3.1 Requirements and planning</h3>



<p>In the requirements phase, your SDL should ensure that:</p>



<ul class="wp-block-list">
<li>Product requirements explicitly include security and CRA-related objectives.</li>



<li>Non-functional requirements cover security, privacy and resilience.</li>



<li>Regulatory requirements, including CRA and other EU acts, are identified for the product.</li>



<li>Assumptions about the operating environment, threats and dependencies are documented.</li>
</ul>



<p>This is where you connect your <strong>CRA secure development lifecycle</strong> to your product classification and requirement mapping work.</p>



<h3 class="wp-block-heading">3.2 Architecture and design</h3>



<p>In the design phase, CRA expectations around security-by-design become concrete:</p>



<ul class="wp-block-list">
<li>Architectural diagrams show components, interfaces and trust boundaries.</li>



<li>Security controls are selected to mitigate assessed risks.</li>



<li>Security-by-default decisions are documented (e.g. default disabled services, minimum privileges).</li>



<li>Threat modelling is performed for critical components and data flows.</li>
</ul>



<p>Design reviews should explicitly verify that CRA security requirements are addressed by the proposed architecture.</p>



<h3 class="wp-block-heading">3.3 Implementation and secure coding</h3>



<p>During implementation, the <strong>CRA secure development lifecycle</strong> focuses on secure coding and dependency hygiene:</p>



<ul class="wp-block-list">
<li>Developers follow secure coding guidelines relevant to the languages and platforms used.</li>



<li>Static application security testing (SAST) or linters are integrated into the build pipeline where feasible.</li>



<li>Dependencies are managed carefully, feeding into your <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/" target="_blank" rel="noreferrer noopener">CRA SBOM</a>.</li>



<li>Sensitive information such as secrets, keys or credentials is handled via secure mechanisms, not hard-coded.</li>
</ul>



<h3 class="wp-block-heading">3.4 Verification, validation and security testing</h3>



<p>Testing under a CRA secure development lifecycle goes beyond functional checks:</p>



<ul class="wp-block-list">
<li>Unit and integration tests include security-relevant behaviours (e.g. access control, error handling).</li>



<li>Security testing methods, such as SAST, DAST (dynamic testing) or fuzzing, are applied where appropriate.</li>



<li>Abuse cases and negative scenarios are tested, not only normal user flows.</li>



<li>Findings are triaged, tracked and fixed, with evidence stored for the technical file.</li>
</ul>



<h3 class="wp-block-heading">3.5 Release and deployment</h3>



<p>Before release, CRA SDL activities should include:</p>



<ul class="wp-block-list">
<li>Security sign-off or a final review of high and critical findings.</li>



<li>Verification that security configuration defaults are correct in production builds.</li>



<li>Packaging of release artifacts in a way that supports secure update mechanisms.</li>



<li>Documentation updates, including user-facing security information and internal technical documentation.</li>
</ul>



<h3 class="wp-block-heading">3.6 Maintenance, updates and post-market monitoring</h3>



<p>After release, the <strong>CRA secure development lifecycle</strong> connects to vulnerability handling, monitoring and updates:</p>



<ul class="wp-block-list">
<li>Field feedback, vulnerability reports and incident data feed back into the SDL.</li>



<li>Security updates follow a documented process with regression and security testing.</li>



<li>Configuration of logging and monitoring is periodically reviewed and improved.</li>



<li>Lessons learned are incorporated into future design and coding practices.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Mapping CRA Requirements to SDL Activities</h2>



<p>To be useful for CRA compliance, your SDL should directly support Cyber Resilience Act requirements. A practical way to approach this is to map requirements to activities and artifacts.</p>



<h3 class="wp-block-heading">4.1 Risk assessment and design decisions</h3>



<p>Your CRA risk assessment should be an input to SDL activities:</p>



<ul class="wp-block-list">
<li>Identified threats and vulnerabilities drive architectural choices.</li>



<li>High-risk areas receive additional security testing and scrutiny.</li>



<li>Risk acceptance decisions are documented and visible in SDL reviews.</li>
</ul>



<p>This mapping shows that SDL is not isolated from your risk analysis but actively implements its results.</p>



<h3 class="wp-block-heading">4.2 Security-by-default and configuration management</h3>



<p>CRA expects secure defaults at deployment. SDL contributes by:</p>



<ul class="wp-block-list">
<li>Documenting default configurations and their rationale.</li>



<li>Ensuring that insecure options are either unavailable or clearly documented with warnings.</li>



<li>Including configuration validation in test suites.</li>
</ul>



<h3 class="wp-block-heading">4.3 Logging, monitoring and evidence generation</h3>



<p>SDL should ensure that logging and monitoring are considered from the start:</p>



<ul class="wp-block-list">
<li>Security-relevant events are identified in design and implemented as part of development.</li>



<li>Log formats and fields are standardised for later analysis.</li>



<li>Tests verify that critical events are logged as expected.</li>
</ul>



<p>This supports your <a href="https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/" target="_blank" rel="noreferrer noopener">CRA logging and monitoring</a> approach and the evidence required in the technical file.</p>



<h3 class="wp-block-heading">4.4 Vulnerability handling and update mechanisms</h3>



<p>A <strong>CRA secure development lifecycle</strong> also defines how code changes, updates and patches are integrated:</p>



<ul class="wp-block-list">
<li>Bug and vulnerability tracking systems are aligned with your CRA vulnerability handling process.</li>



<li>Update mechanisms are designed for secure delivery and validation from the beginning.</li>



<li>Release notes and documentation capture security-relevant changes.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Practical Controls in a CRA Secure Development Lifecycle</h2>



<p>Beyond phases and mappings, the SDL becomes real through specific controls and practices. Below is a non-exhaustive list of practical measures that support a <strong>CRA secure development lifecycle</strong>.</p>



<h3 class="wp-block-heading">5.1 Secure coding guidelines and training</h3>



<ul class="wp-block-list">
<li>Adopt secure coding standards relevant to your technologies (for example, CERT, MISRA, OWASP).</li>



<li>Provide periodic training on secure coding and CRA-related security expectations.</li>



<li>Maintain quick-reference materials for common pitfalls in your stack.</li>
</ul>



<h3 class="wp-block-heading">5.2 Code review with security focus</h3>



<ul class="wp-block-list">
<li>Mandate peer review for changes in security-sensitive components.</li>



<li>Use review checklists that include access control, error handling, logging and data validation.</li>



<li>Ensure reviewers have the necessary context about CRA and product-specific risks.</li>
</ul>



<h3 class="wp-block-heading">5.3 Automated security testing</h3>



<ul class="wp-block-list">
<li>Integrate SAST tools into CI pipelines where appropriate.</li>



<li>Use DAST or integration-level security tests for exposed interfaces and APIs.</li>



<li>For critical components, consider fuzz testing to uncover edge-case failures.</li>
</ul>



<h3 class="wp-block-heading">5.4 Dependency and SBOM management</h3>



<ul class="wp-block-list">
<li>Use a package and dependency management strategy that avoids uncontrolled libraries.</li>



<li>Generate and maintain an SBOM as part of your build process.</li>



<li>Monitor public vulnerability feeds and advisories relevant to your SBOM components.</li>
</ul>



<h3 class="wp-block-heading">5.5 Secure build and release</h3>



<ul class="wp-block-list">
<li>Protect build pipelines against tampering (access control, isolation, integrity checks).</li>



<li>Use reproducible or deterministic builds where feasible for critical products.</li>



<li>Sign release artifacts and updates to support secure distribution.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Documenting the CRA Secure Development Lifecycle</h2>



<p>From a CRA perspective, it is not enough to run a secure development lifecycle; you must be able to show how it works. Documentation of the <strong>CRA secure development lifecycle</strong> should include:</p>



<ul class="wp-block-list">
<li>High-level description of the SDL process and phases.</li>



<li>Roles and responsibilities for security-related activities.</li>



<li>Templates or examples of threat models, risk assessments and review checklists.</li>



<li>Policies for code review, testing and release approval.</li>



<li>Links between SDL artifacts and CRA technical documentation sections.</li>
</ul>



<p>This documentation becomes part of your CRA technical file and can be referenced in conformity assessments and audits.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Adapting CRA SDL to Different Product Types</h2>



<p>Not all products with digital elements are the same. A good <strong>CRA secure development lifecycle</strong> is tailored to your product category and constraints, while keeping core security principles intact.</p>



<h3 class="wp-block-heading">7.1 IoT and consumer devices</h3>



<ul class="wp-block-list">
<li>Focus on secure onboarding, pairing and remote update mechanisms.</li>



<li>Address constrained hardware in logging, encryption and update design.</li>



<li>Consider usability when designing secure defaults for non-technical users.</li>
</ul>



<h3 class="wp-block-heading">7.2 Industrial and OT systems</h3>



<ul class="wp-block-list">
<li>Account for safety implications in risk assessment and SDL decisions.</li>



<li>Address long product lifecycles and legacy integration constraints.</li>



<li>Align SDL practices with existing industrial security standards where relevant.</li>
</ul>



<h3 class="wp-block-heading">7.3 Software-heavy and hybrid products</h3>



<ul class="wp-block-list">
<li>Integrate SDL with existing DevOps or DevSecOps practices.</li>



<li>Pay special attention to cloud connectivity, APIs and data flows.</li>



<li>Ensure that distributed components (clients, agents, services) are all covered by the SDL.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Common Mistakes in CRA Secure Development Lifecycles</h2>



<p>When organisations start formalising a <strong>CRA secure development lifecycle</strong>, they often encounter similar pitfalls.</p>



<h3 class="wp-block-heading">8.1 Treating SDL as a document, not a process</h3>



<p>Writing an SDL policy is easy; changing how development is actually done is harder. CRA compliance depends on the process being followed in practice, not only on having a documented procedure.</p>



<h3 class="wp-block-heading">8.2 Overloading teams with heavyweight processes</h3>



<p>An SDL that is too heavy can slow development to a crawl and generate resistance. A practical CRA SDL focuses on a small number of high-impact security activities that fit the team’s way of working.</p>



<h3 class="wp-block-heading">8.3 Ignoring feedback from post-market incidents</h3>



<p>If lessons from incidents, customer feedback or penetration tests are not fed back into the SDL, the same issues will recur. CRA expects lifecycle security, which includes continuous learning.</p>



<h3 class="wp-block-heading">8.4 SDL disconnected from suppliers and components</h3>



<p>Many products rely on third-party software, libraries and hardware modules. A CRA secure development lifecycle must include mechanisms to evaluate, integrate and monitor these components, not just your own code.</p>



<h3 class="wp-block-heading">8.5 No link between SDL and technical documentation</h3>



<p>If SDL outputs and CRA documentation are maintained in silos, you will struggle to build a coherent technical file. Aligning templates, identifiers and structure from the start reduces friction later.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus Helps with CRA Secure Development Lifecycle</h2>



<p>Regulus is focused on helping manufacturers, IoT vendors and embedded system teams implement the practical building blocks of Cyber Resilience Act compliance, including a <strong>CRA secure development lifecycle</strong>. Instead of relying solely on static documents, our goal is to provide:</p>



<ul class="wp-block-list">
<li>Guided mappings from CRA requirements to SDL activities across phases.</li>



<li>Templates for risk assessment, threat modelling, review checklists and test evidence.</li>



<li>Structure for integrating SBOM, logging and vulnerability handling into your SDL.</li>



<li>Support for aligning SDL documentation with your CRA technical file and Declaration of Conformity.</li>
</ul>



<p>To move forward:</p>



<ol class="wp-block-list">
<li>Download the <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to identify gaps in your SDL and documentation.</li>



<li>Explore our CRA documentation and requirements articles in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access program</a> to get early access to CRA workflows for documentation and development practices.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/">CRA Secure Development Lifecycle (SDL): Practical Guide for Manufacturers</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Logging and Monitoring Requirements: Complete Guide</title>
		<link>https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 10:46:52 +0000</pubDate>
				<category><![CDATA[CRA Requirements]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1198</guid>

					<description><![CDATA[<p>CRA logging and monitoring requirements help you detect incidents, investigate root causes and prove security controls over time. Learn what to log, how to protect and retain logs, and how to document telemetry for compliance.</p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/">CRA Logging and Monitoring Requirements: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>CRA logging and monitoring</strong> is one of the most practical aspects of Cyber Resilience Act compliance. Even if your product has strong security controls, you cannot demonstrate or maintain that security over time without structured logging, event monitoring and security-relevant telemetry. For manufacturers of products with digital elements, logging and monitoring are central to detecting incidents, supporting investigations and proving compliance.</p>



<p>This guide explains how to design CRA logging and monitoring for your product: what to log, how to protect logs, how long to retain them, how to implement monitoring in constrained IoT and embedded environments, and how logging connects to vulnerability handling, incident response and your CRA technical documentation.</p>



<p>If you are building your overall CRA documentation, you may also want to review our guides on <a href="https://goregulus.com/cra-basics/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA risk assessment</a>, <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/" target="_blank" rel="noreferrer noopener">CRA vulnerability handling requirements</a> and <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/" target="_blank" rel="noreferrer noopener">CRA technical file structure</a>.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-overview.jpg" alt="High level diagram of CRA logging and monitoring requirements for products with digital elements" class="wp-image-1201" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-overview.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-overview-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Under the Cyber Resilience Act, CRA logging and monitoring requirements link product events, detection and incident response.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. Why CRA Logging and Monitoring Matter</h2>



<p>The Cyber Resilience Act expects products with digital elements to support appropriate logging and monitoring of security-relevant events. This serves several purposes:</p>



<ul class="wp-block-list">
<li><strong>Detection</strong>: identify attacks, misuse and abnormal behaviour before they escalate.</li>



<li><strong>Investigation</strong>: reconstruct what happened after an incident using reliable audit trails.</li>



<li><strong>Evidence</strong>: demonstrate that security controls operate as intended in real deployments.</li>



<li><strong>Feedback</strong>: feed real-world data back into your CRA risk assessment and hardening efforts.</li>
</ul>



<p>Without structured <strong>CRA logging and monitoring</strong>, you risk being unable to detect incidents that must be reported, unable to understand their root cause, and unable to prove that your product behaves in line with your technical documentation and security claims.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Principles for CRA Logging and Monitoring</h2>



<p>Before defining specific events and fields, it helps to anchor logging and monitoring design on a small set of principles that align with Cyber Resilience Act expectations.</p>



<h3 class="wp-block-heading">2.1 Security-relevant, not everything</h3>



<p>CRA does not require logging every possible event. Instead, you should identify <strong>security-relevant events</strong> based on your risk assessment: authentication, authorisation, configuration changes, security control status, update failures and so on. Log what is necessary to detect and investigate security issues, not every minor detail.</p>



<h3 class="wp-block-heading">2.2 Privacy-aware and data-minimising</h3>



<p>Logs should not become a source of unnecessary personal data exposure. Under the CRA and broader EU law, you must balance security visibility with data minimisation, pseudo­nymisation or anonymisation where feasible. Avoid including full credentials, sensitive payload data or unnecessary identifiers in logs.</p>



<h3 class="wp-block-heading">2.3 Integrity and tamper resistance</h3>



<p>For <strong>CRA logging and monitoring</strong> to be meaningful, logs must be trustworthy. You should protect logs against tampering and unauthorised deletion, for example by:</p>



<ul class="wp-block-list">
<li>Restricting access to log storage</li>



<li>Using append-only or write-once mechanisms where possible</li>



<li>Applying cryptographic integrity checks or signatures for critical logs</li>
</ul>



<h3 class="wp-block-heading">2.4 Lifecycle-oriented</h3>



<p>Logging and monitoring must cover the entire product lifecycle: boot and installation, normal operation, updates, configuration changes and decommissioning. CRA expects lifecycle security, and your logs should reflect that lifecycle.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. What to Log Under CRA Logging and Monitoring Requirements</h2>



<p>The specific events to log depend on your product, but most CRA-compliant logging strategies include at least the following categories.</p>



<h3 class="wp-block-heading">3.1 Authentication and access control events</h3>



<p>These are central to CRA logging and monitoring because they show who accessed what, when and how:</p>



<ul class="wp-block-list">
<li>Successful and failed login attempts (user, admin, API keys, device credentials)</li>



<li>Multi-factor authentication challenges and failures</li>



<li>Account lockouts, password resets and credential changes</li>



<li>Privilege changes (e.g. user granted or revoked administrator role)</li>
</ul>



<h3 class="wp-block-heading">3.2 Configuration and security setting changes</h3>



<p>Changes that affect security posture or behaviour should always be logged:</p>



<ul class="wp-block-list">
<li>Enabling or disabling security features (firewalls, encryption, logging itself)</li>



<li>Changes to access control lists, roles or permissions</li>



<li>Modification of network endpoints, APIs or integration settings</li>



<li>Changes in update policy or patch channels</li>
</ul>



<h3 class="wp-block-heading">3.3 Software, firmware and configuration updates</h3>



<p>Because the Cyber Resilience Act emphasises secure updates, you should log:</p>



<ul class="wp-block-list">
<li>Attempts to download and apply updates (including failures)</li>



<li>Successful installation of firmware or software updates</li>



<li>Verification of update signatures or integrity checks</li>



<li>Rollback events or reversion to previous versions</li>
</ul>



<p>These logs are crucial when demonstrating that you applied patches in a timely manner and that your update mechanisms worked as documented.</p>



<h3 class="wp-block-heading">3.4 Security control status and anomalies</h3>



<p>Key security controls in the product should generate logs when:</p>



<ul class="wp-block-list">
<li>They are enabled, disabled or misconfigured</li>



<li>They detect unusual or suspicious behaviour (e.g. rate limits triggered, brute-force attempts)</li>



<li>They fail or degrade (for example, logging pipeline is full or offline)</li>
</ul>



<h3 class="wp-block-heading">3.5 Application- and domain-specific events</h3>



<p>Depending on your product category, you may need to log additional domain-specific events, for example:</p>



<ul class="wp-block-list">
<li>For industrial devices: safety overrides, emergency stops, unexpected state transitions</li>



<li>For IoT: pairing/unpairing events, device resets, remote commands received</li>



<li>For security products: detection of malware, blocked connections, quarantine actions</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Log Content: Fields and Structure</h2>



<p>Effective <strong>CRA logging and monitoring</strong> depends not only on which events you log but also on how you structure log entries. A minimum set of fields typically includes:</p>



<ul class="wp-block-list">
<li><strong>Timestamp</strong> with timezone</li>



<li><strong>Event type</strong> (e.g. auth_success, auth_failure, config_change, update_start, update_success)</li>



<li><strong>Actor</strong> (user ID, device ID, process ID, API client)</li>



<li><strong>Origin</strong> (IP address, hostname, interface)</li>



<li><strong>Target</strong> (resource modified or accessed)</li>



<li><strong>Outcome</strong> (success, failure, partial)</li>



<li><strong>Diagnostic data</strong> (codes, reason messages, error identifiers)</li>
</ul>



<p>Using a consistent, machine-readable format (such as JSON) greatly simplifies downstream analysis and integration into SIEM or log management platforms.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Log Retention, Protection and Access Control</h2>



<p>Once you generate logs, you must retain and protect them appropriately to support Cyber Resilience Act compliance.</p>



<h3 class="wp-block-heading">5.1 Retention period for CRA logs</h3>



<p>The CRA does not define a universal retention period, but you should select periods that:</p>



<ul class="wp-block-list">
<li>Support detection and investigation of security incidents over a reasonable timeframe</li>



<li>Align with your vulnerability handling and incident reporting obligations</li>



<li>Respect data protection and storage limitation principles</li>
</ul>



<p>Many organisations adopt retention policies in the range of several months to a few years for security logs, depending on risk and regulatory expectations in their sector.</p>



<h3 class="wp-block-heading">5.2 Protecting log integrity</h3>



<p>From a CRA perspective, logs must be reliable as evidence. Protection techniques can include:</p>



<ul class="wp-block-list">
<li>Storing logs in separate, hardened infrastructure</li>



<li>Using append-only storage or write-once media for high-value audit logs</li>



<li>Applying cryptographic signatures or hash chains to detect tampering</li>



<li>Replicating logs to a central server external to the device or product</li>
</ul>



<h3 class="wp-block-heading">5.3 Controlling access to logs</h3>



<p>Access to raw and aggregated logs should be restricted to authorised personnel and tools. Good practices include:</p>



<ul class="wp-block-list">
<li>Role-based access control for log platforms</li>



<li>Separation of duties between administrators and auditors</li>



<li>Logging access to logs themselves for auditability</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Monitoring, Alerting and Integration with Incident Response</h2>



<p>Logging alone is not enough. <strong>CRA logging and monitoring</strong> also implies that you actively monitor and act on log data.</p>



<h3 class="wp-block-heading">6.1 Baseline monitoring</h3>



<p>Baseline monitoring includes dashboards and alerts for:</p>



<ul class="wp-block-list">
<li>Authentication failures above normal thresholds</li>



<li>Unusual patterns of configuration changes</li>



<li>Update failures across a fleet of devices</li>



<li>Repeated triggering of security controls (e.g. rate limits or WAF blocks)</li>
</ul>



<h3 class="wp-block-heading">6.2 Integration with incident response processes</h3>



<p>Logs and monitoring must feed into your vulnerability handling and incident response processes. When an incident is suspected:</p>



<ul class="wp-block-list">
<li>Monitoring should trigger an alert and open an investigation record</li>



<li>Investigators should have access to correlated logs from relevant components</li>



<li>Response actions (blocking accounts, isolating devices, applying patches) should themselves be logged</li>
</ul>



<p>For a deeper view of incident-related processes, see our guide on <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/" target="_blank" rel="noreferrer noopener">CRA vulnerability handling requirements</a>.</p>



<h3 class="wp-block-heading">6.3 Fleet and cloud-side monitoring for IoT and embedded products</h3>



<p>For IoT and embedded devices, local logging may be limited due to storage and power constraints. In these cases, CRA logging and monitoring typically involves:</p>



<ul class="wp-block-list">
<li>Lightweight local logs for critical events</li>



<li>Periodic upload or streaming of key events to a backend</li>



<li>Aggregation, correlation and alerting in a central platform</li>
</ul>



<p>The CRA does not prescribe specific architectures, but expects that your overall design supports effective detection and response across the lifecycle of the product.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-pipeline.jpg" alt="Pipeline diagram for CRA logging and monitoring from devices to central security platform" class="wp-image-1203" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-pipeline.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-logging-and-monitoring-pipeline-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">A typical CRA logging and monitoring pipeline aggregates security-relevant events from devices into a central platform for analysis and response.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Documenting CRA Logging and Monitoring in the Technical File</h2>



<p>From a documentation perspective, your CRA technical file should describe your logging and monitoring approach clearly enough that auditors and authorities can understand it.</p>



<p>Typical elements in the technical file include:</p>



<ul class="wp-block-list">
<li>Overview of logging architecture (on-device, edge, cloud, SIEM)</li>



<li>List of main event categories logged (auth, config, updates, security controls)</li>



<li>Retention and protection measures for logs</li>



<li>How monitoring is performed and how alerts are integrated into incident response</li>



<li>How log data contributes to post-market monitoring and risk reassessment</li>
</ul>



<p>For structuring this documentation, you can reuse the structure suggested in our <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/" target="_blank" rel="noreferrer noopener">CRA technical file structure guide</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Common Pitfalls in CRA Logging and Monitoring</h2>



<p>When implementing CRA logging and monitoring requirements, manufacturers often encounter similar pitfalls. Being aware of them helps you design a more robust approach.</p>



<h3 class="wp-block-heading">8.1 Logging too little</h3>



<p>Under-logging may save storage and bandwidth but leaves you blind when incidents occur. If you cannot reconstruct what happened, you weaken both your security posture and your CRA compliance position.</p>



<h3 class="wp-block-heading">8.2 Logging too much, without structure</h3>



<p>On the other hand, logging everything without structure can overwhelm your monitoring tools and teams. Focus on security-relevant events, and standardise fields and formats to keep logs usable.</p>



<h3 class="wp-block-heading">8.3 Storing logs only on the device</h3>



<p>If all logs are stored locally and can be wiped by an attacker or by a device reset, they are of limited value. Wherever possible, forward at least summary logs to a central location under your control.</p>



<h3 class="wp-block-heading">8.4 Ignoring privacy considerations</h3>



<p>Logs that contain excessive personal data or sensitive payloads may create GDPR and privacy risks. Align CRA logging and monitoring with data protection principles and minimise what you store.</p>



<h3 class="wp-block-heading">8.5 Monitoring that is not actionable</h3>



<p>Dashboards and metrics are useful, but CRA expects that security events lead to action when needed. Alerts must be tuned, assigned and integrated into real incident response workflows.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus Helps with CRA Logging and Monitoring</h2>



<p>Regulus is building tools to help manufacturers, IoT vendors and embedded system teams operationalise Cyber Resilience Act compliance, including <strong>CRA logging and monitoring</strong> requirements. Instead of dealing with scattered documents and ad-hoc log designs, our goal is to provide:</p>



<ul class="wp-block-list">
<li>Guided mappings from CRA security requirements to concrete logging and monitoring needs</li>



<li>Templates for logging and monitoring sections in your CRA technical file</li>



<li>Checklists to validate that key event categories and lifecycle phases are covered</li>



<li>Support for aligning logging with vulnerability handling, update management and post-market monitoring</li>
</ul>



<p>To move forward:</p>



<ol class="wp-block-list">
<li>Download the <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to assess your current logging and monitoring gaps.</li>



<li>Review our CRA documentation and requirements guides in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access program</a> to get priority access to CRA compliance tooling.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/">CRA Logging and Monitoring Requirements: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA SBOM Requirements: Complete Guide for Manufacturers, IoT Vendors and Software Teams</title>
		<link>https://goregulus.com/cra-requirements/cra-sbom-requirements/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 13:05:24 +0000</pubDate>
				<category><![CDATA[CRA Requirements]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1044</guid>

					<description><![CDATA[<p>CRA SBOM requirements make component transparency a compliance obligation. Learn what your SBOM should include, which formats work (SPDX/CycloneDX), and how SBOMs support vulnerability handling before 2027.</p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/">CRA SBOM Requirements: Complete Guide for Manufacturers, IoT Vendors and Software Teams</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Software Bill of Materials (SBOM) is becoming a central requirement for global cybersecurity compliance frameworks, and the Cyber Resilience Act (CRA) is no exception. Under the CRA, manufacturers of products with digital elements must maintain a complete, accurate and regularly updated SBOM as part of their cybersecurity documentation. This guide provides the most comprehensive explanation to date of the <strong>CRA SBOM requirements</strong>, how they differ from U.S. SBOM initiatives, and what manufacturers must implement to achieve compliance before 2027.</p>



<p>For context, an SBOM is a structured inventory of all software components within a product, including dependencies, libraries, open-source packages, firmware modules and third-party code. SBOMs play a critical role in vulnerability management, supply-chain security and regulatory transparency. Similar initiatives have already been adopted by the U.S. Department of Commerce (<a href="https://www.ntia.gov" target="_blank" rel="noreferrer noopener">NTIA</a>), NIST (<a href="https://www.nist.gov" target="_blank" rel="noreferrer noopener">NIST</a>), and CISA (<a href="https://www.cisa.gov/sbom" target="_blank" rel="noreferrer noopener">CISA SBOM Program</a>), meaning CRA SBOM obligations follow an international trend toward greater software transparency.</p>



<p>This guide explains everything you need to know to comply with SBOM obligations under the Cyber Resilience Act.</p>



<h2 class="wp-block-heading">What Are SBOM Requirements Under the Cyber Resilience Act?</h2>



<p>The <strong>CRA SBOM requirements</strong> aim to ensure transparency and traceability of every software component included in a digital product. The CRA explicitly requires manufacturers to maintain a comprehensive set of technical documentation, including an inventory of software components, third-party libraries and dependencies. While the CRA does not mandate a specific SBOM format, the structure aligns closely with international SBOM standards such as SPDX, CycloneDX and SWID.</p>



<p>Under the Cyber Resilience Act, an SBOM must help regulators and customers understand:</p>



<ul class="wp-block-list">
<li>What software components are included in a product</li>



<li>Which components are open-source or third-party</li>



<li>Known vulnerabilities associated with each component</li>



<li>Licensing requirements of included components</li>



<li>Update history and versioning</li>



<li>Supplier dependency chains</li>
</ul>



<p>In short, the SBOM becomes the backbone of CRA vulnerability handling, documentation, and post-market surveillance requirements.</p>



<h2 class="wp-block-heading">Why SBOMs Are Critical Under the CRA</h2>



<p>Several CRA obligations depend directly on maintaining an up-to-date SBOM. For example:</p>



<ul class="wp-block-list">
<li><strong>Annex I Section 2</strong> requires manufacturers to identify, assess and remediate vulnerabilities.</li>



<li><strong>Annex II Technical Documentation</strong> requires providing information about product architecture, components and dependencies.</li>



<li><strong>Post-market surveillance</strong> obligations rely on awareness of component-level vulnerabilities.</li>



<li><strong>Supply-chain security</strong> requires understanding which third-party elements may introduce risk.</li>
</ul>



<p>This means manufacturers cannot comply with the Cyber Resilience Act without a functioning SBOM practice, updated throughout the lifecycle of the product.</p>



<h2 class="wp-block-heading">CRA SBOM Requirements in Detail</h2>



<p>Below is the most detailed breakdown of <strong>CRA SBOM requirements</strong> currently available, based on the final text of the regulation and authoritative interpretations from ENISA and EU cybersecurity experts.</p>



<h3 class="wp-block-heading">1. A Complete Inventory of Software Components</h3>



<p>The SBOM must list every software element included in a product, including:</p>



<ul class="wp-block-list">
<li>Proprietary code</li>



<li>Open-source libraries</li>



<li>Firmware modules</li>



<li>Third-party binaries</li>



<li>Dynamic or runtime-loaded modules</li>



<li>Build-time dependencies</li>
</ul>



<p>The CRA does not allow manufacturers to exclude components because they “seem low risk.” If it is in the product, it must be documented.</p>



<h3 class="wp-block-heading">2. Versioning and Update Tracking</h3>



<p>Manufacturers must maintain historical and current versions for each component to support CRA vulnerability handling and update obligations. This requirement is aligned with the NIST SP 800-218 framework.</p>



<h3 class="wp-block-heading">3. Supplier and Licensing Metadata</h3>



<p>An SBOM under the CRA must document:</p>



<ul class="wp-block-list">
<li>Component origin and supplier</li>



<li>Licensing information (for open source)</li>



<li>Security contact information when available</li>
</ul>



<p>This supports supply-chain verification and license compliance—two areas regulators consider critical.</p>



<h3 class="wp-block-heading">4. Link to Known Vulnerabilities (EPSS, CVE, NVD)</h3>



<p>The CRA requires manufacturers to identify vulnerabilities affecting their product. An SBOM is the tool that enables automatic correlation between included components and vulnerability databases such as:</p>



<ul class="wp-block-list">
<li><a href="https://www.cve.org" target="_blank" rel="noreferrer noopener">CVE List</a></li>



<li><a href="https://nvd.nist.gov" target="_blank" rel="noreferrer noopener">NVD (National Vulnerability Database)</a></li>



<li><a href="https://www.first.org/epss/" target="_blank" rel="noreferrer noopener">EPSS (Exploit Prediction Scoring System)</a></li>
</ul>



<p>Without an SBOM, CRA-compliant vulnerability management is impossible.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="800" height="510" src="https://goregulus.com/wp-content/uploads/2025/12/firmware-SBOM-example.jpg" alt="Firmware SBOM example showing embedded components relevant for CRA compliance." class="wp-image-1046" srcset="https://goregulus.com/wp-content/uploads/2025/12/firmware-SBOM-example.jpg 800w, https://goregulus.com/wp-content/uploads/2025/12/firmware-SBOM-example-300x191.jpg 300w, https://goregulus.com/wp-content/uploads/2025/12/firmware-SBOM-example-768x490.jpg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption class="wp-element-caption">Firmware-driven products have specific SBOM obligations under the CRA.</figcaption></figure>



<h3 class="wp-block-heading">5. Lifecycle Updates (Not a One-Off SBOM)</h3>



<p>The CRA SBOM requirements clearly state that documentation must be updated throughout the product lifecycle, especially after:</p>



<ul class="wp-block-list">
<li>Firmware or software updates</li>



<li>Component upgrades or replacements</li>



<li>Third-party library patching</li>



<li>Security incident remediation</li>
</ul>



<p>This requirement aligns with CISA’s position that SBOMs must reflect “software as built” and “software as deployed.”</p>



<h3 class="wp-block-heading">6. Format Requirements: SPDX, CycloneDX or SWID</h3>



<p>The CRA does not mandate a specific SBOM format. However, European regulators strongly recommend using standardized, machine-readable formats. The three dominant standards are:</p>



<ul class="wp-block-list">
<li><strong>SPDX</strong> – Supported by the Linux Foundation</li>



<li><strong>CycloneDX</strong> – Widely used in IoT and embedded products; supported by OWASP</li>



<li><strong>SWID tags</strong> – NIST-backed, used for enterprise environments</li>
</ul>



<p>Most manufacturers choose <strong>CycloneDX</strong> because it maps cleanly to embedded systems and firmware.</p>



<h3 class="wp-block-heading">7. SBOM Distribution Requirements (On Request)</h3>



<p>Under the CRA, manufacturers must provide an SBOM:</p>



<ul class="wp-block-list">
<li>To authorities upon request</li>



<li>To conformity assessment bodies</li>



<li>To customers when needed for security purposes</li>
</ul>



<p>This mirrors U.S. practices where SBOMs are increasingly required by enterprise customers for procurement processes.</p>



<h2 class="wp-block-heading">How SBOMs Support CRA Vulnerability Handling Requirements</h2>



<p>SBOMs are directly tied to <strong>Annex I Section 2</strong> of the CRA, which defines vulnerability handling rules. An SBOM enables:</p>



<ul class="wp-block-list">
<li>Automatic detection of vulnerable dependencies</li>



<li>Impact assessment of new CVEs</li>



<li>Faster patch prioritization</li>



<li>Evidence for CRA documentation and audits</li>
</ul>



<p>According to ENISA, 72% of IoT vulnerabilities originate in third-party components. SBOMs offer the transparency required to address this problem.</p>



<p>SBOMs serve as the foundation for CRA vulnerability management and post-market surveillance.</p>



<h2 class="wp-block-heading">SBOM Requirements for Embedded Systems Under the CRA</h2>



<p>Embedded and firmware-driven products are among the most impacted by CRA SBOM requirements. These manufacturers must document:</p>



<ul class="wp-block-list">
<li>Bootloader versions</li>



<li>Firmware modules and microcontroller firmware</li>



<li>Real-time operating systems (RTOS)</li>



<li>Chipset drivers</li>



<li>Security modules and cryptographic libraries</li>
</ul>



<p>CRA assessors often scrutinize firmware SBOM completeness because firmware vulnerabilities pose higher systemic risk.</p>



<h2 class="wp-block-heading">Common Mistakes Manufacturers Make with CRA SBOM Requirements</h2>



<ul class="wp-block-list">
<li>Creating a single SBOM snapshot instead of continuous updates</li>



<li>Excluding “internal” or proprietary modules</li>



<li>Failing to track transitive dependencies</li>



<li>Using unstructured lists instead of machine-readable SBOM formats</li>



<li>Not linking SBOM updates with release management</li>
</ul>



<p>A non-compliant SBOM can jeopardize the entire CRA conformity assessment.</p>



<h2 class="wp-block-heading">Recommended Tools for Generating SBOMs</h2>



<p>Although the CRA does not mandate specific tools, popular options include:</p>



<ul class="wp-block-list">
<li><a href="https://www.cyclonedx.org/" target="_blank" rel="noreferrer noopener">CycloneDX tooling</a></li>



<li><a href="https://github.com/anchore/syft" target="_blank" rel="noreferrer noopener">Anchore Syft</a></li>



<li><a href="https://github.com/tern-tools/tern" target="_blank" rel="noreferrer noopener">Tern (for container SBOMs)</a></li>



<li><a href="https://spdx.dev/tools/" target="_blank" rel="noreferrer noopener">SPDX tools</a></li>
</ul>



<p>Manufacturers should select tools that support continuous integration and automated build pipelines.</p>



<p>SBOMs connect directly to CRA documentation, classification and conformity requirements.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>SBOMs are not optional under the Cyber Resilience Act—they are a foundational requirement that enables vulnerability management, regulatory documentation, supply-chain visibility and post-market cybersecurity controls. Manufacturers should begin implementing SBOM processes in 2025 to ensure full CRA compliance by 2027.</p>



<p>To continue preparing for CRA conformity, explore additional Regulus resources:</p>



<ul class="wp-block-list">
<li><a href="https://goregulus.com/resources/cra-checklist/">CRA Readiness Checklist</a></li>



<li><a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/">CRA Applicability Guide</a></li>
</ul>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/">CRA SBOM Requirements: Complete Guide for Manufacturers, IoT Vendors and Software Teams</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Update &#038; Patch Management Requirements: Complete Guide for Manufacturers and Software Teams</title>
		<link>https://goregulus.com/cra-requirements/cra-update-requirements/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 08:57:33 +0000</pubDate>
				<category><![CDATA[CRA Requirements]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=537</guid>

					<description><![CDATA[<p>CRA update and patch management requirements make secure updates and lifecycle support mandatory. Learn what the CRA expects for signed delivery, validation, rollback prevention, user communication and Annex II/VII evidence.</p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-update-requirements/">CRA Update &#038; Patch Management Requirements: Complete Guide for Manufacturers and Software Teams</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Resilience Act (CRA) establishes strict and detailed <strong>update and patch management requirements</strong> for all Products with Digital Elements (PDEs). These obligations ensure that products remain secure throughout their lifecycle, even after they are placed on the EU market.</p>



<p>This guide explains the complete set of update requirements introduced by the CRA, including secure delivery, lifecycle support, validation, rollback prevention, user communication and documentation duties under Annex II and Annex VII.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. Why Update &amp; Patch Management Matters Under the CRA</h2>



<p>Historically, many IoT devices, embedded systems and software products received minimal or inconsistent security updates. The CRA addresses this gap by requiring manufacturers to:</p>



<ul class="wp-block-list">
<li><strong>Deliver security updates throughout the product’s support period</strong></li>



<li><strong>Ensure updates are secure, authenticated and verified</strong></li>



<li><strong>Maintain an update policy and lifecycle security plan</strong></li>



<li><strong>Document update procedures and evidence</strong> for authorities</li>
</ul>



<p>Poor update practices are one of the main causes of long-term insecurity in digital products. The CRA makes update management a legal obligation.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Legal Basis for Update Requirements in the CRA</h2>



<p>Update obligations appear in three main sections of the regulation:</p>



<h3 class="wp-block-heading">2.1 Annex I – Essential Cybersecurity Requirements</h3>



<p>Annex I mandates that:</p>



<ul class="wp-block-list">
<li>Updates must be delivered securely</li>



<li>Update mechanisms must prevent unauthorized access</li>



<li>Update validation must avoid introducing new vulnerabilities</li>



<li>Rollback to insecure versions must be prevented</li>
</ul>



<h3 class="wp-block-heading">2.2 Annex II – Technical Documentation</h3>



<p>Manufacturers must document:</p>



<ul class="wp-block-list">
<li>Update architecture</li>



<li>Validation procedures</li>



<li>Cryptographic protections</li>



<li>Testing evidence for updates</li>
</ul>



<h3 class="wp-block-heading">2.3 Annex VII – Post-Market Monitoring</h3>



<p>Manufacturers must maintain:</p>



<ul class="wp-block-list">
<li>Update history</li>



<li>Patching timelines</li>



<li>Verification logs</li>



<li>Remediation evidence</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. CRA Update &amp; Patch Management Requirements (Full Breakdown)</h2>



<h3 class="wp-block-heading">3.1 Updates Must Be Delivered Securely</h3>



<p>Manufacturers must implement secure update delivery mechanisms that ensure:</p>



<ul class="wp-block-list">
<li><strong>Authenticity</strong> (updates are signed by the manufacturer)</li>



<li><strong>Integrity</strong> (updates cannot be tampered with)</li>



<li><strong>Confidentiality</strong> where relevant</li>
</ul>



<p>Unsigned or unverified updates constitute a direct CRA violation.</p>



<h3 class="wp-block-heading">3.2 Updates Must Be Validated Before Deployment</h3>



<p>Manufacturers must:</p>



<ul class="wp-block-list">
<li>Test updates for security regressions</li>



<li>Validate compatibility with the product</li>



<li>Document testing results</li>
</ul>



<p>Annex II requires explicit evidence of update validation.</p>



<h3 class="wp-block-heading">3.3 Rollback Prevention</h3>



<p>Manufacturers must ensure:</p>



<ul class="wp-block-list">
<li>Devices cannot revert to insecure firmware</li>



<li>Attackers cannot install outdated or vulnerable versions</li>
</ul>



<p>This requires version control, signing enforcement and secure boot integration.</p>



<h3 class="wp-block-heading">3.4 Update Transparency for Users</h3>



<p>Users must be informed of:</p>



<ul class="wp-block-list">
<li>Available security updates</li>



<li>The need to apply updates when manual action is required</li>



<li>Critical vulnerabilities addressed by updates</li>
</ul>



<p>In many cases, automatic updates are strongly recommended.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Lifecycle Support Requirements</h2>



<p>One of the most misunderstood CRA obligations is lifecycle support. Manufacturers must:</p>



<ul class="wp-block-list">
<li><strong>Provide security updates for the full support period</strong></li>



<li><strong>Define how long the product will receive updates</strong></li>



<li><strong>Communicate this period to users</strong></li>
</ul>



<p>Support periods must be “reasonable”, meaning aligned with product category and risk.</p>



<h3 class="wp-block-heading">4.1 Examples of Support Periods</h3>



<ul class="wp-block-list">
<li>Consumer IoT: typically 3–5 years</li>



<li>Industrial controllers: 7–12 years</li>



<li>Developer tools: until obsolete or replaced</li>



<li>Automotive-adjacent PDEs: aligned with vehicle lifecycle</li>
</ul>



<p>Under-supporting products is a risk for market surveillance action.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Secure Update Architecture (Recommended)</h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://goregulus.com/wp-content/uploads/2025/11/cra-secure-update-mechanism-1024x683.png" alt="Secure, authenticated, and validated updates are mandatory under Annex I." class="wp-image-540" srcset="https://goregulus.com/wp-content/uploads/2025/11/cra-secure-update-mechanism-1024x683.png 1024w, https://goregulus.com/wp-content/uploads/2025/11/cra-secure-update-mechanism-300x200.png 300w, https://goregulus.com/wp-content/uploads/2025/11/cra-secure-update-mechanism-768x512.png 768w, https://goregulus.com/wp-content/uploads/2025/11/cra-secure-update-mechanism.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Diagram of secure update mechanism required under CRA Annex I.</figcaption></figure>



<p>A secure update architecture typically includes:</p>



<ul class="wp-block-list">
<li>Cryptographically signed firmware/software</li>



<li>Secure boot enforcing authenticity</li>



<li>Encrypted update channels</li>



<li>Fallback protection</li>



<li>Atomic installation mechanisms</li>
</ul>



<p>These are essential to prevent attackers from exploiting update mechanisms.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Update Lifecycle Workflow</h2>



<ol class="wp-block-list">
<li>Identify vulnerability requiring a patch</li>



<li>Develop update or mitigation</li>



<li>Validate update for regressions</li>



<li>Cryptographically sign update</li>



<li>Deliver update securely to users/devices</li>



<li>Verify installation success</li>



<li>Document validation and deployment</li>



<li>Monitor post-update security</li>
</ol>



<p>This workflow is required for both Default Class and Critical Class products.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Relationship Between Updates and Vulnerability Handling</h2>



<p>Update management is directly linked to vulnerability handling:</p>



<ul class="wp-block-list">
<li>Remediation relies on updates</li>



<li>Incident reporting may trigger updates</li>



<li>Annex VII documentation connects updates to vulnerabilities</li>
</ul>



<p>Failure to provide timely updates can breach multiple CRA obligations simultaneously.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Documentation Requirements for Updates (Annex II &amp; VII)</h2>



<p>Manufacturers must keep:</p>



<ul class="wp-block-list">
<li>Update testing evidence</li>



<li>Security validation logs</li>



<li>Signing procedures</li>



<li>Version history</li>



<li>Remediation timelines</li>
</ul>



<p>Authorities may request this documentation at any time.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. Common Compliance Mistakes</h2>



<ul class="wp-block-list">
<li>No signed updates</li>



<li>No rollback protection</li>



<li>Incomplete update history</li>



<li>Insufficient testing logs</li>



<li>No clear support-period definition</li>



<li>Failure to notify users of required updates</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">10. How Regulus Helps Manufacturers</h2>



<p>Regulus automates CRA update and patch management compliance with:</p>



<ul class="wp-block-list">
<li>Update policy templates</li>



<li>Automated Annex I requirements mapping</li>



<li>Version tracking and evidence logs</li>



<li>Secure update architecture guidance</li>



<li>Lifecycle support recommendations</li>
</ul>



<p>Start here: <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/"><strong>CRA Applicability Checker</strong></a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Update and patch management is one of the most critical CRA obligations. Manufacturers must implement secure update mechanisms, maintain rigorous documentation, define lifecycle support periods and validate updates before release.</p>



<p>For templates, checklists and guidance, explore: <a href="https://goregulus.com/resources/">Cyber Resilience Act Resources</a></p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-update-requirements/">CRA Update &#038; Patch Management Requirements: Complete Guide for Manufacturers and Software Teams</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Vulnerability Handling Requirements (Annex I – Section 2): Complete Guide for Manufacturers and IoT Vendors</title>
		<link>https://goregulus.com/cra-requirements/cra-vulnerability-handling/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Tue, 25 Nov 2025 19:59:41 +0000</pubDate>
				<category><![CDATA[CRA Requirements]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=530</guid>

					<description><![CDATA[<p>CRA vulnerability handling requirements (Annex I, Section 2) define how you receive, triage, fix and disclose vulnerabilities. This guide converts the legal text into a practical workflow, records and timelines.</p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/">CRA Vulnerability Handling Requirements (Annex I – Section 2): Complete Guide for Manufacturers and IoT Vendors</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Resilience Act (CRA) introduces stringent <strong>vulnerability handling</strong> obligations for all Products with Digital Elements (PDEs). Under Annex I Section 2, manufacturers must implement continuous processes for identifying, assessing, mitigating and reporting vulnerabilities throughout the entire lifecycle of their product.</p>



<p>This guide provides a detailed technical interpretation of every vulnerability handling requirement under the CRA, including reporting timelines, remediation expectations and documentation duties under Annex VII. If your product includes software, firmware or connectivity, these obligations apply to you.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What Vulnerability Handling Means Under the CRA</h2>



<p>In the context of the Cyber Resilience Act, vulnerability handling refers to a structured, documented and continuous set of activities that ensure a product remains secure throughout its supported lifetime. These activities must include:</p>



<ul class="wp-block-list">
<li><strong>Continuous vulnerability identification</strong> (internal + external sources)</li>



<li><strong>Assessment and prioritization</strong> based on risk and exploitability</li>



<li><strong>Mitigation and remediation</strong> within a reasonable timeframe</li>



<li><strong>Secure deployment of patches</strong> and updates</li>



<li><strong>Communication of vulnerabilities</strong> to users when necessary</li>



<li><strong>Mandatory reporting</strong> of actively exploited vulnerabilities</li>



<li><strong>Record-keeping</strong> under Annex VII</li>
</ul>



<p>This is more than a “best practice”: it is a <strong>legal obligation</strong> that applies to all manufacturers under the CRA.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Legal Basis: Where Vulnerability Handling Appears in the CRA</h2>



<p>The CRA integrates vulnerability handling across several sections:</p>



<h3 class="wp-block-heading">2.1 Annex I – Essential Cybersecurity Requirements</h3>



<p>Section 2 mandates:</p>



<ul class="wp-block-list">
<li>Processes for handling vulnerabilities</li>



<li>Mechanisms for secure update delivery</li>



<li>Protection against exploitation</li>



<li>Communication obligations toward users</li>
</ul>



<h3 class="wp-block-heading">2.2 Articles 15 &amp; 16 – Reporting Obligations</h3>



<p>Manufacturers must report:</p>



<ul class="wp-block-list">
<li><strong>Actively exploited vulnerabilities</strong></li>



<li><strong>Significant cybersecurity incidents</strong></li>
</ul>



<p>Reports must follow strict timelines.</p>



<h3 class="wp-block-heading">2.3 Annex VII – Post-Market Monitoring Documentation</h3>



<p>Annex VII requires manufacturers to maintain:</p>



<ul class="wp-block-list">
<li>A vulnerability register</li>



<li>Remediation evidence</li>



<li>Incident reports</li>



<li>Update history and validation logs</li>
</ul>



<p>This documentation must be provided to authorities upon request.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. CRA Vulnerability Handling Requirements (Annex I Section 2)</h2>



<p>Below is a breakdown of each obligation in Annex I Section 2.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://goregulus.com/wp-content/uploads/2025/11/cra-vulnerability-register-annex-vii-1024x683.jpg" alt="Example of a vulnerability register required under CRA Annex VII." class="wp-image-535" srcset="https://goregulus.com/wp-content/uploads/2025/11/cra-vulnerability-register-annex-vii-1024x683.jpg 1024w, https://goregulus.com/wp-content/uploads/2025/11/cra-vulnerability-register-annex-vii-300x200.jpg 300w, https://goregulus.com/wp-content/uploads/2025/11/cra-vulnerability-register-annex-vii-768x512.jpg 768w, https://goregulus.com/wp-content/uploads/2025/11/cra-vulnerability-register-annex-vii.jpg 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Annex VII requires manufacturers to maintain a complete vulnerability register.</figcaption></figure>



<h3 class="wp-block-heading">3.1 Continuous Vulnerability Identification</h3>



<p>Manufacturers must continuously monitor:</p>



<ul class="wp-block-list">
<li>Internal testing and QA findings</li>



<li>User-reported vulnerabilities</li>



<li>Threat intelligence feeds</li>



<li>Open-source vulnerability disclosures (for SBOM components)</li>



<li>Supplier and third-party advisories</li>
</ul>



<p>This implies the need for a formal intake process and a designated security contact point.</p>



<h3 class="wp-block-heading">3.2 Assessment and Prioritization</h3>



<p>Every identified vulnerability must be evaluated based on:</p>



<ul class="wp-block-list">
<li><strong>Severity</strong> (CVSS or equivalent)</li>



<li><strong>Exploitability</strong> (public exploit, active exploitation)</li>



<li><strong>Impact</strong> (confidentiality, integrity, availability)</li>



<li><strong>Exposure</strong> (network vs local)</li>
</ul>



<p>The CRA does not mandate CVSS specifically, but requires a <strong>structured and repeatable assessment methodology</strong>.</p>



<h3 class="wp-block-heading">3.3 Remediation and Mitigation</h3>



<p>Manufacturers must:</p>



<ul class="wp-block-list">
<li>Address vulnerabilities within a “reasonable timeframe”</li>



<li>Apply temporary mitigations when necessary</li>



<li>Document remediation decisions</li>
</ul>



<p>Critical vulnerabilities, or those with active exploitation, require accelerated handling.</p>



<h3 class="wp-block-heading">3.4 Deployment of Security Updates</h3>



<p>Under CRA, updates must be:</p>



<ul class="wp-block-list">
<li><strong>Delivered securely</strong> (signed, authenticated)</li>



<li><strong>Installed reliably</strong></li>



<li><strong>Validated</strong> to avoid introducing new vulnerabilities</li>
</ul>



<p>Manufacturers must also maintain a version history and a record of validation.</p>



<h3 class="wp-block-heading">3.5 User Notification Requirements</h3>



<p>In certain scenarios, manufacturers must notify users:</p>



<ul class="wp-block-list">
<li>When no patch is available for a known high-risk vulnerability</li>



<li>When user action is required to mitigate impact</li>



<li>When security updates include important fixes</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Reporting Obligations: Vulnerabilities &amp; Incidents</h2>



<p>The CRA requires manufacturers to report:</p>



<h3 class="wp-block-heading">4.1 Actively Exploited Vulnerabilities</h3>



<p>If a vulnerability is being exploited in the wild, the manufacturer must notify:</p>



<ul class="wp-block-list">
<li><strong>ENISA</strong></li>



<li><strong>Relevant CSIRTs</strong></li>
</ul>



<p>Reports must be submitted <strong>without undue delay</strong> (interpreted as 24 hours in most regulatory guidance).</p>



<h3 class="wp-block-heading">4.2 Significant Cybersecurity Incidents</h3>



<p>Manufacturers must report:</p>



<ul class="wp-block-list">
<li>Exploitation causing substantial service disruption</li>



<li>Widespread compromise of devices</li>



<li>Incidents affecting critical infrastructure</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Post-Market Monitoring Obligations (Annex VII)</h2>



<p>Annex VII requires ongoing documentation of:</p>



<ul class="wp-block-list">
<li>A vulnerability register</li>



<li>Assessment and prioritization records</li>



<li>Mitigation steps taken</li>



<li>Update verification logs</li>



<li>Incident reports and timelines</li>
</ul>



<p>Manufacturers must keep documentation for the entire support period.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Vulnerability Handling Workflow (Recommended)</h2>



<ol class="wp-block-list">
<li>Receive vulnerability report</li>



<li>Validate and acknowledge</li>



<li>Assess severity and risk</li>



<li>Define mitigation or remediation plan</li>



<li>Develop and test the patch</li>



<li>Deploy securely to devices/users</li>



<li>Document all actions</li>



<li>Report exploited vulnerabilities</li>
</ol>



<p>This workflow ensures full alignment with Annex I and Annex VII.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Relationship with SBOM and Supply Chain Security</h2>



<p>Vulnerabilities in third-party libraries and open-source components (SBOM items) are fully the responsibility of the manufacturer. You must:</p>



<ul class="wp-block-list">
<li>Monitor SBOM components for new CVEs</li>



<li>Update libraries when fixes become available</li>



<li>Document remediation</li>
</ul>



<p>Neglecting SBOM monitoring is a direct violation of CRA obligations.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Common Compliance Mistakes to Avoid</h2>



<ul class="wp-block-list">
<li>No formal intake process for vulnerability reports</li>



<li>Missing or incomplete vulnerability register</li>



<li>No evidence of update validation</li>



<li>Failure to monitor SBOM components</li>



<li>Not documenting mitigations</li>



<li>No post-market monitoring plan</li>



<li>Not reporting exploited vulnerabilities</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus Helps</h2>



<p>Regulus automates vulnerability handling compliance with:</p>



<ul class="wp-block-list">
<li>Centralized vulnerability register</li>



<li>Automatic SBOM monitoring</li>



<li>Annex I &amp; Annex VII requirements mapping</li>



<li>Evidence tracking for security updates</li>



<li>Conformity risk scoring</li>
</ul>



<p>Try the <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/">CRA Applicability Checker</a> to determine requirements for your product.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Vulnerability handling is one of the most operationally complex aspects of CRA compliance. Manufacturers must adopt continuous monitoring, structured remediation processes, secure update mechanisms and strong documentation practices before the 2027 deadline.</p>



<p>For templates and workflows, explore: <a href="https://goregulus.com/resources/">Cyber Resilience Act Resources</a></p>
<p>La entrada <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/">CRA Vulnerability Handling Requirements (Annex I – Section 2): Complete Guide for Manufacturers and IoT Vendors</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
