CRA Survival Bootcamp for Your Embedded System

Product Summary

How Can You Comply with the CRA with Reasonable Effort?

When it comes to compliance with the EU Cyber Resilience Act (CRA), you – a machine or device manufacturer – ponder one question.

How can you comply with the Cyber Resilience Act with reasonable effort so that you can keep selling your products after 11 December 2027 and avoid hefty penalties?

The crucial words are "with minimal effort". You don't have the time and money for turning your embedded systems into Fort Knox. You rightly feel that this is unnecessary anyway. You just want to survive the CRA penalty date (11 December 2027) unscathed.

Your top priority is to get a rough idea how much effort it would take to make your embedded systems CRA-compliant. You must answer the upgradability question first.

Note: My post Surviving the EU Cyber Resilience Act provides a deeper discussion how to minimise your effort for complying with the CRA.

The Upgradability Question

Can you upgrade your embedded system to a current version, free it from exploitable vulnerabilities and keep it that way - with reasonable effort?

Your legacy embedded system inevitably contains known exploitable vulnerabilities with unacceptably high risks and violate the requirement of having no known exploitable vulnerabilities. It most likely contains actively exploited vulnerabilities. You won't be allowed to sell your product in the EU after the penalty date. Hence, you must be able to upgrade your system to a current version without known exploitable vulnerabilities. If the effort is prohibitively high, you can stop here.

Step 1 - Risk Assessment

If your answer to the upgradability question is yes, you perform a risk assessment of the essential product requirements with the following goal.

Identify a small set of security measures that is just enough to satisfy the essential product requirements (Annex I Part I).

The risk assessment is by far the most important instrument for fulfilling the CRA. Together with the intended purpose, the risk assessment helps you narrow down the set of security measures. Done well, it saves you time and money during the implementation. In some rare cases, the costs for implementing the security measures might exceed their value, especially if your machines weren't built with security in mind. Then, your machines are ready for retirement before the penalty date.

If your machines are upgradable and you can implement the security measures with reasonable effort, you start with the implementation work from the highest risk downwards. In parallel, you tackle the second most important problem for CRA compliance: vulnerability handling.

Step 2 - Vulnerability Handling

Reduce the hundreds of irrelevant vulnerabilities in your product quickly and reliably to the very few relevant ones and put them through risk assessment (Annex I Part II)

You must check all software components of your product for exploitable vulnerabilities. If you find any, you put them through the risk assessment from Step 1. You decide whether to mitigate, accept, avoid or transfer the risk. Choosing the right vulnerability management tool is paramount to separate the wheat from the chaff.

Step 3 - Technical Documentation

The rest of CRA compliance is tedious "paperwork". As you have diligently documented the risk assessment and the vulnerability handling process, you have already completed large parts of the technical documentation.

Complete the technical documentation with the intended purpose, support period, vulnerability disclosure policy, user information and other necessary information (Annex VII).

You don't need fancy and expensive tools to compile the technical documentation. You can write the documentation in markdown format and store it in a repository. This makes it easy to update the documentation regularly during the support period and to pull out any old version for the market surveillance authority, if ever needed.

For default products, you can do all three steps on your own in a so-called self-assessment (Annex VIII). You don't have to involve any notified body or authority. You draw up the EU Declaration of Conformity (Annex V) yourself and affix the CE marking to your product yourself.

For important and critical products, the usual assessment procedure will be to comply with the harmonised vertical standards developed by ETSI, to get the assessment checked by a notified body and to presume conformity (Article 27). Alternative procedures exist for important products - even a self-assessment with a full quality assurance system.

Product Description

👥
With my help, you will perform the risk assessment and define the vulnerability handling process for your embedded system.

As the manufacturer, you must perform a conformity assessment for your whole product, which may contain 1, 2, 5, 10, 20 and more embedded systems. For example, harvesters contain 25+ ECUs, metal-sheet bending machines one HMI and one PLC, and X-ray fluorescence analysers a single SoM for HMI and controller.

If your product is made up of multiple embedded systems, we select one developed by you. The selected system is typically the one with the HMI or with the connection to cloud services. It should be a good stand-in for the whole product like the driver terminal for a harvester (see Overview: Risk Assessment of the Essential Product Requirements). We subject the selected system to the conformity assessment. Once you know how to assess the selected system, you can complete the assessment for your entire product on your own.

Before we dive into the CRA assessment, we must answer the upgradability question for your system. Unfortunately, a positive answer largely depends on the vendor providing your Linux system. This is typically the SoC, SoM, SBC, ECU or terminal manufacturer - chip vendor, for short. Pondering the following questions will help you decide whether you should stop selling the harvester before 11 December 2027 or not.

If you conclude that your system is not worth upgrading, you'll have to retire it before 11 December 2027. Otherwise, you'll work through the three steps for conformity assessment - risk assessmentvulnerability handling and technical documentation - with me as a teacher and facilitator. The following questions will guide you.

At this point, we have gathered significant parts of the Technical Documentation: the risk assessment of the essential product requirements (Step 1) and the definition of the vulnerability handling process (Step 2). Additionally, you have a plan how to mitigate the violations of the essential product requirements. You can feed the user stories for the necessary security measures into your normal development process.

Similarly, you have a plan how to implement the vulnerability handling process. Adding the remaining information like the intended purpose, the user information or the list of harmonised standards applied is mostly paperwork. You can complete the technical documentation (Step 3) on your own.

Delivery and Price Guidance

I'll deliver the CRA Survival Bootcamp over three weeks. We will have full-day sessions - 9:00 - 12:30 and 13:30 - 17:00 - every Tuesday, Wednesday and Thursday. The first week can be onsite at your premises. The other two weeks will be online. The agenda looks roughly like this.

For each topic, I'll explain the requirements of the CRA first. Then, I'll guide you through preparing significant parts of the risk assessment, upgrade path and vulnerability handling process - for your embedded system. You will have a clear idea what to do and how to do it so that you can complete the remaining tasks without my help.

The procedure above describes the delivery for a typical default product. Here is the price guidance for such a product.

Here is how you book a CRA Survival Bootcamp.

Note: We can adapt the delivery procedure to your specific product.

Questions & Answers

Which CRA product classes are the target for the bootcamp?

Default products. Most embedded systems including agricultural, construction and industrial machines are default products. Nevertheless, default products are neglected by the law and standard makers. A horizontal harmonised standard explaining how to comply with the essential product requirements will become available far too late on 30 October 2027 - six weeks before the CRA applies fully.

Vertical harmonised standards like for important and critical products (due on 30 August 2026) are not feasible for the hundreds of different default products. Vertical standards provide long lists of security criteria that important and critical products must satisfy to achieve conformity. The good news is: Manufacturers of default products get away with much shorter lists of criteria that they can define and assess themselves - within the vague bounds of the CRA. I'll help you identify a minimum set of security measures for your product in the bootcamp.

Who is the target audience?

The members of your security team who will perform the CRA conformity assessment. The security team includes technical people like security engineers, senior software engineers and architects and business people like CTOs, VPs and product owners/managers. 

Evaluating the risks and deciding what to do about them are business decisions. The business people must play an active role in performing the risk assessment (Step 1) and answering the upgradability question. It's their neck on the block, when your company must pay penalties or damages. The technical people assist in the risk assessment by identifying the riskssuggesting mitigation options and documenting the risk assessmentIdentifying the few relevant vulnerabilities and completing the technical documentation is their domain as well.

Who does the "actual" work in the bootcamp?

You! My role is that of a teacher and facilitator. The goal of the bootcamp is that you can perform the CRA compliance of your system self-dependently.

What about an onsite bootcamp?

I can do week 1 of the bootcamp onsite at your premises, if the traveling time to your site is reasonable. We will agree on this before we sign the contract. Weeks 2 and 3 are online.

Can you cancel a bootcamp?

No, you can't. Once you have signed the contract for a bootcamp, you can't cancel it. Neither can I. However, we can postpone the bootcamp in mutual agreement.

What are the payment terms?

Once you have signed the contract for the CRA Survival Bootcamp, you will receive two invoices, each for 50% of the fee. The first invoice is due within a week. The second invoice is due one week before the start of the bootcamp. You will pay the full travel costs, if we do the first week of the bootcamp onsite at your premises.