<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Nicolas PONTOIS, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/nicolas-pontois/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 23 Jul 2025 11:48:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Nicolas PONTOIS, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>​​Radio Equipment Directive: A first step toward securing European connected products​</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/radio-equipment-directive-a-first-step-toward-securing-european-connected-products/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/radio-equipment-directive-a-first-step-toward-securing-european-connected-products/#respond</comments>
		
		<dc:creator><![CDATA[Nicolas PONTOIS]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 07:14:19 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26758</guid>

					<description><![CDATA[<p>The internet of Things (IoT) is a rapidly growing sector, with increasing adoption across a wide range of domains. From production plants (industry 4.0) to homes (smart home systems) and even the devices we wear (such as smartphones and smartwatches),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/radio-equipment-directive-a-first-step-toward-securing-european-connected-products/">​​Radio Equipment Directive: A first step toward securing European connected products​</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p aria-level="4"><b><span data-contrast="none">The internet of Things (IoT)</span></b><span data-contrast="none"> is a rapidly growing sector, with increasing adoption across a wide range of domains. From production plants (industry 4.0) to homes (smart home systems) and even the devices we wear (such as smartphones and smartwatches), connected objects are becoming omnipresent in our daily lives.</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:120}"> </span></p>
<p><span data-contrast="auto">The Radio Equipment Directive (RED) establishes a European framework for </span><b><span data-contrast="auto">regulating all equipment that communicates via radio waves. </span></b><span data-contrast="auto">This includes any device using technologies such as Wi-Fi, Bluetooth, LoRaWAN, or cellular networks like 4G and 5G.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">In this context, </span><b><span data-contrast="auto">August 1</span></b><b><span data-contrast="auto">st</span></b><b><span data-contrast="auto"> 2025, marks a key milestone:</span></b><span data-contrast="auto"> from that date onward, the RED’s cybersecurity requirements will become mandatory! Economic operators (including manufacturers, importers and distributors) who fail to comply with these obligations may face sanctions ranging from the withdrawal of their products from the EU market to significant administrative fines, depending on the applicable legislation in each member state.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">This article aims to break down the directive and highlight the key takeaways. If you are behind in your compliance efforts, you will also find guidance here on how to get started!</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">RED explained: What you need to know</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:540,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559991&quot;:539}"> </span></h1>
<p><b><span data-contrast="auto">Adopted in June 2014,</span></b><span data-contrast="auto"> the RED (2014/53/EU) aims to standardize the marketing of radio equipment within the EU. Its primary objective is to ensure that devices that transmit or receive radio waves (such as smartphones and Wi-Fi routers) comply with health, safety, electromagnetic compatibility, and efficient use of the radio spectrum requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, </span><b><span data-contrast="auto">it was not until 2022 that cybersecurity was integrated into the RED</span></b><span data-contrast="auto">, nearly eight years after its creation. The introduction of delegated act 2022/30 marked a new phase by adding specific requirements aimed at enhancing the resilience of radio equipment against digital threats.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-26798 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo1-1.png" alt="" width="635" height="307" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo1-1.png 1141w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo1-1-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo1-1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo1-1-768x372.png 768w" sizes="(max-width: 635px) 100vw, 635px" /></p>
<h1>Scope of application of RED </h1>
<h2><span data-contrast="none">Definition of radio equipment</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">According to Article 2.11 of the RED, radio equipment is defined as:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">“An electrical or electronic product that intentionally emits and/or receives radio waves for the purpose of radio communication and/or radio navigation”</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Specifically, this includes any device that uses wireless communication protocols such as Wi-Fi, Bluetooth, Zigbee, LTE, 5G, NFC, or LoRa to transmit or receive data via the radio spectrum.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">These technologies form the basis of many everyday devices, particularly in the fields of home automation and the Internet of Things (IoT). The RED directive therefore covers a very wide range of products.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Sectors excluded from the scope</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">The RED directive does not apply to all radio equipment. Some categories are explicitly excluded from its scope, particularly for reasons of sovereignty, specific regulatory frameworks, or usage contexts.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">Sectors subject to their own regulations:</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Marine equipment:</span></b><span data-contrast="auto"> excluded are devices already covered by the Marine Equipment Directive (MED)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Aeronautical equipment:</span></b><span data-contrast="auto"> excluded are devices already regulated under the Common Rules in the Field of Civil Aviation (CRFCA)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Automotive equipment:</span></b><span data-contrast="auto"> excluded are devices already subject to the New General Safety Regulation (GSR </span><span data-contrast="auto">II</span><span data-contrast="auto">)</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Defense and public security:</span></b><span data-contrast="auto"> devices used by national authorities within the scope of national defense or any public security activity</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><strong>Equipment for non-commercial purposes: </strong></p>
<ul>
<li><b><span data-contrast="auto">Customized research equipment (R&amp;D): </span></b><span data-contrast="auto">tailored for experimental purposes, not intended for commercial use</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Amateur radio equipment:</span></b><span data-contrast="auto"> when not commercially available but built and used by amateurs in a non-commercial setting</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><img decoding="async" class="size-full wp-image-26780 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo2.png" alt="" width="1416" height="502" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo2.png 1416w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo2-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo2-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo2-768x272.png 768w" sizes="(max-width: 1416px) 100vw, 1416px" /></p>
<h1><span data-contrast="none">Economic operators subject to the directive and their responsibilities</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:540,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559991&quot;:539}"> </span></h1>
<p><span data-contrast="auto">The RED directive does not concern only manufacturers of radio equipment. It applies to the entire supply chain, from design to market placement. Each economic operator plays a key role in ensuring product compliance, safety and reliability. To this end, RED defines separate requirements for three main categories of actors: manufacturers, importers and distributors.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">It is important to emphasize that the same company may fulfil several of these roles at once, and that this may vary for the same company from one product range to another.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Manufacturers</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">The manufacturer is on the front line. They are the ones who design, produce or brand an eligible product. They are therefore responsible for most of the actions required to bring products into compliance with RED. They must:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Ensure that the product complies with the essential requirements of the RED</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Ensure that the product remains compliant in the event of modifications</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">When appropriate given the risks, carry out sample testing, keep a test record and keep distributors informed of the test history</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Carry out or have carried out a conformity assessment</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Provide an EU declaration of conformity</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Affix the CE marking</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Prepare the technical documentation and user instructions and retain them for 10 years</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Withdraw or even recall a product from the market in case of non-compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Communicate with the authorities in the event of non-compliance or upon request</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h2><span data-contrast="none">Importers</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">When a product is manufactured outside the EU, the importer is responsible for transporting it from its country of origin to the EU. The importer becomes responsible for its compliance when it enters the European market. The importer must:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">When appropriate given the risks, perform sample testing, maintain a record of the tests and inform distributors of the test history</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Ensure that product storage and transport conditions do not compromise compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Verify that the manufacturer has used an approved certification method</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Check for the presence of the CE marking</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Ensure that the technical documentation, declaration of conformity and user instructions are compliant, and retain a copy for 10 years</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Withdraw or recall a product from the market in case of non-compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Communicate with the manufacturer and relevant authorities in case of identified non-compliance or upon request</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h2><span data-contrast="none">Distributors</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">The distributors is the operator who makes the product available on the market to the customer or end user. They have a duty of care regarding the work carried out upstream by the manufacturer and importer. They must:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Ensure that storage and transport conditions do not compromise product compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Verify the presence of the CE marking and the availability of an EU declaration of conformity</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Ensure that the technical documentation and user instructions are compliant</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Withdraw or recall a product from the market in case of non-compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Communicate with the manufacturer, importer and competent authorities in case of identified non-compliance or upon request</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><img decoding="async" class="size-full wp-image-26778 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo3.png" alt="" width="1447" height="465" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo3.png 1447w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo3-437x140.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo3-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo3-768x247.png 768w" sizes="(max-width: 1447px) 100vw, 1447px" /></p>
<h1><span data-contrast="none">Key cybersecurity requirements under RED</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:540,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559991&quot;:539}"> </span></h1>
<p><span data-contrast="auto">In 2022, RED introduced 4 essential cybersecurity requirements. These requirements are subject to eligibility criteria based on the characteristics of the product and are therefore not applicable to all devices. Rather than prescribing a fixed list of security measures to implement, the requirements represent broader security concepts to be integrated into product design.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Network security</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><b><span data-contrast="auto">Eligibility criteria:</span></b><span data-contrast="auto"> Applies to all devices connected to the Internet, either directly or indirectly. These measures are designed to prevent such devices from compromising network stability or performance.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">Cyber requirements:</span></b><span data-contrast="auto"> On the one hand, equipment must be designed to use the radio spectrum efficiently, without causing harmful interference. This ensures seamless coexistence between different devices without interference or disruption. On the other hand, they must not be capable of degrading, disrupting or hijacking network operations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Protection of personal data</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><b><span data-contrast="auto">Eligibility criteria:</span></b><span data-contrast="auto"> Applies only to equipment that processes personal data. It aims to ensure user privacy.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">Cyber requirements:</span></b><span data-contrast="auto"> Devices must incorporate data protection mechanisms such as encryption to prevent unauthorized access. This involves securing information not only in transit but also during storage.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Protection against fraudulent use</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><b><span data-contrast="auto">Eligibility criteria:</span></b><span data-contrast="auto"> Specifically applies to equipment involved in money transfers, such as payment terminals or certain smartphones. This aims to limit the risk of fraud via this equipment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">Cyber requirements:</span></b><span data-contrast="auto"> The regulation requires the integration of anti-fraud features, without prescribing a single solution. Among the possible approaches, multi-factor authentication (MFA) can be an effective measure, adding an extra layer of security during transactions. However, other mechanisms may also be considered depending on the context of use and the level of risk identified.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Software authenticity</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><b><span data-contrast="auto">Eligibility criteria:</span></b><span data-contrast="auto"> Applies to all equipment. The goal is to prevent the installation or execution of unauthorized software on a given device.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">Cyber requirements: </span></b><span data-contrast="auto">Implement features that verify the software and hardware combination prior to any installation. This may include secure boot, signature/certificate verification, hash checking or any other method ensuring authenticity.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-26772 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo4.png" alt="" width="1486" height="534" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo4.png 1486w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo4-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo4-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/red_vo4-768x276.png 768w" sizes="auto, (max-width: 1486px) 100vw, 1486px" /></p>
<h1><span data-contrast="none">Steps to ensure compliance with RED</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:540,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559991&quot;:539}"> </span></h1>
<h2><span data-contrast="none">Methods for ensuring compliance</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">Compliance with RED directive can quickly become a complex exercise, particularly when it comes to identifying the applicable cybersecurity requirements. To this end, CENELEC published RED related harmonized standard </span><b><span data-contrast="auto">EN 18031</span></b><span data-contrast="auto"> in early 2025. This standard clarifies the requirements and provides an official framework for RED compliance.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, it is important to emphasize that the use of EN 18031 is not mandatory. Certifying a product as compliant with EN 18031 is only one of the ways to achieve conformity with RED. </span><b><span data-contrast="auto">A decision tree </span></b><span data-contrast="auto">provided by RED allows for determining (depending on the product), which conformity assessment method is permitted. One of these methods is </span><b><span data-contrast="auto">self-assessment</span></b><span data-contrast="auto">, meaning a self-evaluation of compliance with the essential requirements, provided that the technical measures implemented and the associated justifications are thoroughly documented.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span class="TextRun SCXW186372115 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW186372115 BCX0">However, these tools (EN 18031 and decision trees), although </span><span class="NormalTextRun SCXW186372115 BCX0">very </span><span class="NormalTextRun SCXW186372115 BCX0">useful</span> <span class="NormalTextRun SCXW186372115 BCX0">remain complex to implement due to a margin for interpretation</span><span class="NormalTextRun SCXW186372115 BCX0"> left on some aspects</span><span class="NormalTextRun SCXW186372115 BCX0">.</span></span></p>
<h2><span data-contrast="none">Standard procedure for manufacturers</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:539,&quot;335559738&quot;:240,&quot;335559739&quot;:120,&quot;335559991&quot;:850}"> </span></h2>
<p><span data-contrast="auto">Based on Wavestone’s experience in cybersecurity compliance projects related to regulations and more specifically regulations targeting products, we offer a framework structured around 10 key steps:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li><b><span data-contrast="auto">Inventory:</span></b><span data-contrast="auto"> Conduct an inventory of radio equipment marketed in the EU that does not fall under excluded sectors</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Requirements</span></b><span data-contrast="auto">: Apply product specific eligibility criteria to identify the applicable essential requirements </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Strategy:</span></b><span data-contrast="auto"> Use the decision tree to identify possible certification methods and validate the chosen strategy for each product based on risk</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Framework:</span></b><span data-contrast="auto"> Specify (EN 18031) or interpret (legal text) the applicable framework by translating it into concrete, auditable security control points</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Gaps:</span></b><span data-contrast="auto"> Compare the current state of products and processes against the control points of the chosen framework to develop a remediation plan</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Remediation:</span></b><span data-contrast="auto"> Implement the remediation plan at both the product and cross-functional levels to ensure long-term compliance</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Documentation:</span></b><span data-contrast="auto"> Document and justify the decisions made and actions taken with respect to RED and/or EN 18031 requirements</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Instructions:</span></b><span data-contrast="auto"> Document best usage practices and safety instructions to ensure operation in compliance with the requirements</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Self-assessment / Third-party certification:</span></b><span data-contrast="auto"> Conduct a self-assessment or an audit via a certification body depending on the chosen strategy</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Communication:</span></b><span data-contrast="auto"> Affix the CE marking and liaise with authorities and other involved economic operators</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<h1><span data-contrast="none">Positioning of RED within the cybersecurity regulatory framework for connected products</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:540,&quot;335559738&quot;:240,&quot;335559739&quot;:360,&quot;335559991&quot;:539}"> </span></h1>
<p><span data-contrast="auto">The RED directive and the Cyber Resilience Act (CRA) clearly operate within a shared regulatory domain. For readers not yet familiar with the CRA a detailed analysis is available </span><a href="https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/"><span data-contrast="none">here</span></a><span data-contrast="auto">. The scope of application of the RED is included in the CRA and the essential requirements of the CRA go beyond what is established by the RED. In this sense, compliance with the CRA implies compliance with the RED. As the CRA is set to become fully applicable in December 2027, there are ongoing discussions at the European level regarding the possibility that RED’s cybersecurity requirements may only remain in force until that date, with the CRA subsequently taking over. While such a transition would indeed be coherent, no official communication has been issued to that effect as of today.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Nevertheless, achieving compliance with the RED as of now enables companies to effectively prepare for the implementation of the CRA. Both regulatory frameworks are based on similar compliance approaches and the harmonised standards for the CRA are currently being drafted by CENELEC, the same body that developed EN 18031, the harmonised standard under the RED. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><b><span data-contrast="auto">While RED compliance will become mandatory as of August 2025, it should also be viewed as a strategic opportunity to prepare for the CRA and future European regulatory requirements concerning product cybersecurity.</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/radio-equipment-directive-a-first-step-toward-securing-european-connected-products/">​​Radio Equipment Directive: A first step toward securing European connected products​</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/radio-equipment-directive-a-first-step-toward-securing-european-connected-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Detection probes for OT : The keys to a successful deployment</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/#respond</comments>
		
		<dc:creator><![CDATA[Nicolas PONTOIS]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 08:39:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24270</guid>

					<description><![CDATA[<p>Enterprise demand for detection probes has been rising in recent years, particularly in the industrial sector. This can be for many reasons: regulatory or contractual constraints, need for incident detection capabilities on the industrial network, desire for greater visibility on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/">Detection probes for OT : The keys to a successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Enterprise demand for detection probes has been rising in recent years, particularly in the industrial sector. This can be for many reasons: regulatory or contractual constraints, need for incident detection capabilities on the industrial network, desire for greater visibility on industrial assets …  <br />So, let’s answer the question: <strong>Should you embark on the OT probes journey? And if so, how could you achieve a successful probes service roll-out?  </strong></p>
<h1>OT Probes: A tool for monitoring industrial networks </h1>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24238 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png" alt="" width="1309" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737.png 1309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-437x83.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-092737-768x146.png 768w" sizes="auto, (max-width: 1309px) 100vw, 1309px" /></p>
<p style="text-align: center;"><i>Figure 1: Listening to the network to assess and detect</i> </p>
<p>A detection probe is a piece of equipment, virtual or physical, connected to the information system (IS) in order to map and monitor it. It consists of sensors distributed across the network to collect data. And typically, a central console to aggregate, correlate and analyse this data. Probes for industrial environments &#8211; which we will refer to simply as OT probes here &#8211; are characterized by their passive, non-invasive listening on the network, and their understanding of industrial protocols and behaviour. Many players are present on the market, you can find our market overview here: <a href="https://www.riskinsight-wavestone.com/en/2021/03/detection-probes-in-industrial-environments-our-vision-of-the-market/">https://www.riskinsight-wavestone.com/2021/03/les-sondes-de-detection-en-milieu-industriel-notre-vision-du-marche/</a>  </p>
<p>All their probe solutions work on the same principle: network traffic is collected using flow duplication (SPAN, ERSPAN …) or physical duplicator like taps, etc. Packets are inspected in real time to provide several types of data: flow inventory and mapping, asset and vulnerability management, and finally anomaly and incident detection. </p>
<p>This variety of possible use cases of these data and the types of users involved (operational and business team, cybersecurity team, etc.) is what makes OT probes so popular.  </p>
<p>However, procuring and deploying these solutions are costly. The organisation must have a clear understanding of their needs, a view of potential users and the exact added value required before embarking on such a project. </p>
<h1>Let’s take two very different examples </h1>
<p>Imagine two companies are considering deploying OT probes on their industrial sites.  </p>
<h2>1st Company: WavePetro </h2>
<p>WavePetro is a company with a large sensitive site, which has a good level of cybersecurity maturity, as well as a segmented architecture. The company wants to deploy OT probes to be compliant with regulations and to improve its detection capabilities. </p>
<p>Considering its architecture and detection requirements, numerous listening points will be needed on the site. WavePetro can rely on its local teams for expertise and site knowledge to support this complexity. </p>
<h2>2nd Company: RenewStone </h2>
<p>RenewStone has numerous scattered and unmanned small sites with different cybersecurity maturity levels. The sites are connected to central Group infrastructure. <br />The company wants to deploy OT probes to gain visibility on its sites using inventory and vulnerability management features.  </p>
<p>With this configuration, RenewStone needs to standardize a turnkey OT probe roll-out and run service with as little local complexity as possible.  </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24236 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004.png" alt="" width="1219" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004.png 1219w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094004-768x380.png 768w" sizes="auto, (max-width: 1219px) 100vw, 1219px" /></p>
<p style="text-align: center;"><i>Figure 2: 2 companies, 2 reasons to deploy OT probes, 2 implementation plans</i> </p>
<h1>What is required for a successful roll-out? </h1>
<p>Although these two companies have different drivers and maturities, they will go through the same 5 key stages, albeit with different approaches.  </p>
<h2>1.Perform a Proof of Concept </h2>
<p>Let’s start with the first step: the proof of concept. The objective for both companies is to test the feasibility and challenge the value this tool brings to the organisation. </p>
<p>While WavePetro have to validate feasibility on a reduced perimeter in the factory, RenewStone has to validate OT probe added value validation on few different sites. </p>
<p>The PoC is key in identifying what can be valuable for both companies. To get the most of it, it is important to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1">Adapt vendors selection to your needs: The market is quite diversified between pure players, those specializing in industry or extending their IT solutions …  <br /><i>Do I want strong detection capabilities? Do I want a managed service? Do I want a unified solution for IT and OT?</i>  </li>
<li>Select the PoC scope: Identify a representative scope with resources to test on so that results can be reproduced at scale.  </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">Draft a target architecture before the PoC: This allows to test an architecture that will be representative of what would be deployed at scale, in order to validate the tests carried out. </li>
</ul>
<p>PoC is an essential step to ensure that the tool provides value to your company, but also to be able to convince businesses to deploy especially when not constrained by regulations. </p>
<h2>2.Build the associated operating model  </h2>
<p>Even from the early stages, before rollouts, it is important to remember that the end goal of the probes deployment will be to get value from its operation. To be able to do so, it is essential to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">Define an operating model for handling alerts, managing the inventory and managing the probes themselves. While WavePetro can have an operating model heavily relying on local knowledge and expertise, RenewStone must build a central operation model to include group teams such as SOC, OT security, network, infrastructure and so on. </li>
<li>Decide whether to call on a third party or manage your probes in-house: Few vendors also propose managed service, so you would need to create your own model, which could also rely – wholly or partly &#8211; on externalization. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">Create a RACI: Considering the different use cases and the number of players involved in using or maintaining probes, a RACI is key to ensuring that all stakeholders are involved. </li>
</ul>
<p>This stage must be addressed upstream to facilitate the next steps. </p>
<h2>3.Prepare the roll-out  </h2>
<p>Once the first step has demonstrated the added value of a probe and their operating model has been defined, let’s prepare for the roll-out. You need to define the final target: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">Where you will deploy: Especially if you have many diverse sites, like RenewStone, you need to be precise on, and prioritize, the scope: It will not be possible to deploy all sites at the same time. </li>
<li>When you will deploy: Work on budget estimates, even if not accurate, as soon as possible so that sites are able to plan a roll-out on the following year. Probes are an expensive solution, not only in terms of hardware and licensing, but also in terms of the resources required to deploy and operate them. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">How you will deploy: In any case, you need to work on a standard architecture blueprint. But especially if you have many sites to deploy or very limited local resources, you should work on building a packaged service offer to deploy.  </li>
</ul>
<p>This preparation part is key to avoid wasting time with deployments and guarantee their success. </p>
<h2>4.Deploy ! </h2>
<p>Let&#8217;s start deploying… The motto is the same for both companies: Start small and grow.  <br />The difference lies in the scale:  </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">Gradually roll out across the site for WavePetro: It will take some time to be able to listen everywhere effectively. Focus on the expected data to prioritize where to place the probe at first and where to listen to the network. </li>
<li>Learn and improve from one roll-out to the next for RenewStone: Rollouts are centralized and more standardized, so teams will learn and improve from one roll-out to the next. There should be a first ring of roll-out that is comprised of representative sites to test and improve the deployment model on.  </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1">Include change management: in all cases, the deployment of a new tool must absolutely include awareness-raising and training if probes are to find their users. </li>
</ul>
<p>Deploying OT probes can be a long and tedious process, but do not get discouraged, because there is still one big step left! </p>
<h2>5.Fine-tune OT probe console </h2>
<p>A probe roll-out is not a “1-and-done” kind of project. This is a tool for continuous improvement and needs to learn to deliver value. You should therefore dedicate time to: </p>
<ul>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1">Fine-tune OT Probes dashboard: Take time to improve the detection model (whitelist some behaviors, prioritize sensitive assets …), the automatic asset inventory and mapping (enrich inventory, import data, tag VLANs …), and so on. This fine-tuning needs to be done by someone with site-specific knowledge.  </li>
<li>Integrate with other technologies: You can integrate OT probes consoles with your other solutions and tools such as the SIEM, firewalls or CMDBs to make the most of the data collected by the probes. </li>
<li data-leveltext="-" data-font="Calibri" data-listid="3" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="14" data-aria-level="1">Try adding features: once you have gained some maturity over the solution, you can go even further with the features available like performing active queries to enrich the inventory and go even further with the features available. </li>
</ul>
<p>Fine-tuning enables the solution to reduce the amount of data it retrieves, so that it can focus on security data and alerts that will bring value to your company and its security level. </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24234 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056.png" alt="" width="1279" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056.png 1279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-375x191.png 375w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094056-768x392.png 768w" sizes="auto, (max-width: 1279px) 100vw, 1279px" /></p>
<p style="text-align: center;"><i>Figure 3: Takeaways from 5 key steps towards an OT probes service</i> </p>
<h1>Conclusion </h1>
<p>These 2 examples have taught us a lot about OT probes, and the many challenges involved in deploying and using them. If tomorrow, I were facing a customer wondering what to do with this OT Probe project on his roadmap, I would pick out 3 main elements: </p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-24248 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216.png" alt="" width="1088" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216.png 1088w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-437x189.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/Capture-decran-2024-10-16-094216-768x332.png 768w" sizes="auto, (max-width: 1088px) 100vw, 1088px" /></p>
<p style="text-align: center;"><i>Figure 4: The 3 keys to a successful probe project</i> </p>
<h2>Before deploying: Is it worth it ? </h2>
<p>Without clearly identified use cases and defined objectives, you may end up with probes providing unused or no real added value information. OT probes are expensive, both financially and in terms of time. You need to make sure they are worth it, and then gives you the means to fully exploit them. </p>
<p>To do this, take the time to evaluate the quality and value of the information provided by the OT probes with your different teams (cybersecurity, operations, business&#8230;). </p>
<h2>Start small and grow </h2>
<p>Don’t be afraid to start small and grow progressively, whether that is in the number of monitored sites, assets or use cases. </p>
<p>The long-term operation of OT probes is complex and builds over deployments. Take the time to take care of the solution adoption: if you want teams to use the solution, train them and demonstrate OT probes value! </p>
<h2>Rely on continuous improvement </h2>
<p>As for any robust cybersecurity process, continuous improvement should be at its core. Cyber threats are constantly evolving, from attacker techniques to OT exposure due to process digitalization. </p>
<p>In parallel OT Probes can provide a wide of capabilities from incident detection to cartography, vulnerability management and even more yet to be released by editors. </p>
<p>Focus first on capabilities that reduce your OT risks, progressively improving the services as it gains maturity! </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/">Detection probes for OT : The keys to a successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/detection-probes-for-ot-the-keys-to-a-successful-deployment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/#respond</comments>
		
		<dc:creator><![CDATA[Nicolas PONTOIS]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 12:20:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23850</guid>

					<description><![CDATA[<p>The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/">Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">The <strong>Cyber Resilience Act (CRA)</strong> represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount.</span> <span data-contrast="auto">The CRA thus represents a </span><b><span data-contrast="auto">steep change in the security of products </span></b><span data-contrast="auto">as the first regulation of this kind worldwide. Wavestone, as a key player in cybersecurity consultancy, is particularly invested in this regulation due to its involvement in the exploratory studies that shaped the CRA.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">In a few words, if you either manufacture, import or resell a product with digital elements, you will surely be affected by the CRA, and need to ensure compliance. This article is intended to shed light on: What does this regulation entail? Who is affected? How can compliance be achieved?</span></b><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h1><b><span data-contrast="auto">What is the cyber resilience act and what does it entail?  </span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">To understand the necessity of the Cyber Resilience Act, it&#8217;s crucial to consider the broader context of cybersecurity in Europe. The CRA is an ambitious regulation designed to </span><b><span data-contrast="auto">ensure the security of EU citizens</span></b><span data-contrast="auto"> by addressing the currently observed low levels of cybersecurity in products with digital elements through a European Union policy intervention. In response, comprehensive studies focusing on the cybersecurity of digital products were conducted, leading to the proposal of legislation defining the obligations for the whole products supply chain actors, from manufacturers to distributors.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Wavestone&#8217;s involvement in this process underscores its commitment to enhancing cybersecurity standards. We participated in an </span><b><span data-contrast="auto">in-depth exploratory study commissioned by the EU</span></b><span data-contrast="auto">, engaging with a broad spectrum of stakeholders involved to varying degrees in the products ecosystem, including national authorities, EU bodies, hardware and software manufacturers, trade associations, consumer organizations, researchers, academia, and cybersecurity professionals. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Through Wavestone’s position as a global, and particularly European leader in the field of cybersecurity, several interviews, focus groups and workshops were conducted.  Valuable insights were gathered from a wide range of different interlocutors, providing a comprehensive view that takes into account the perspectives of all stakeholders and allowed the foundation for the development of the CRA.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Definition and Scope</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The Cyber Resilience Act is a legislative proposal </span><b><span data-contrast="auto">defining the obligations of manufacturers, importers, and distributors of products containing digital elements marketed in the EU</span></b><span data-contrast="auto">, all of which must bear the CE mark across all sectors. As defined in the regulation, this includes “</span><i><span data-contrast="auto">any software or hardware product and its remote data processing solutions, encompassing components that can be marketed separately</span></i><span data-contrast="auto">”. The regulation&#8217;s aim is not only to secure standalone products but also to ensure the security of data transmission chains and central infrastructures through the application of this standard.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">To this notion of product is added a notion of criticality, therefore the CRA differentiates two types of products: </span><b><span data-contrast="auto">products with digital elements</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">critical products with digital elements</span></b><span data-contrast="auto">. As detailed below in “Checklist for CRA compliance”, it will affect how compliance can be achieved.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">A few examples of products with digital elements include consumer products, smarts cities and non-essential software. Critical products with digital elements include for example industrial control systems and firewalls. The detailed list of concerned products can be found in the regulation’s annexes.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img loading="lazy" decoding="async" class=" wp-image-23883 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800.png" alt="" width="674" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800.png 1254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-317x191.png 317w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-768x463.png 768w" sizes="auto, (max-width: 674px) 100vw, 674px" /></span><span data-contrast="auto">However, as is detailed below in “A complex ecosystem”, the </span><b><span data-contrast="auto">CRA does not apply universally</span></b><span data-contrast="auto">; products in some specific sectors do not have to comply to the requirements</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Stakeholders and Responsibilities</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The CRA impacts the entire lifecycle of digital products, from development by </span><b><span data-contrast="auto">manufacturers</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">importers</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">distributers</span></b><span data-contrast="auto"> to the final </span><b><span data-contrast="auto">consumer</span></b><span data-contrast="auto">, but also the vulnerability management from conception to the product end-life, through a share responsibility.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img loading="lazy" decoding="async" class=" wp-image-23885 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733.png" alt="" width="550" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733.png 1214w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-768x475.png 768w" sizes="auto, (max-width: 550px) 100vw, 550px" /><br /></span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Essential Requirements</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">As said earlier, the CRA’s objective is to allow a sufficient level of cybersecurity in products with digital elements. To do so, it introduces essential requirements built on three pillars:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Product Security:</span></b><span data-contrast="auto"> Ensuring products are designed, developed, and manufactured to meet appropriate cybersecurity levels and are free from known exploitable vulnerabilities.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">User Documentation:</span></b><span data-contrast="auto"> Providing documentation to ensure safe use from commissioning to end of life.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Vulnerability Management:</span></b><span data-contrast="auto"> Identifying and documenting vulnerabilities, conducting regular security tests, and implementing a vulnerability disclosure policy.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">In the event of </span><b><span data-contrast="auto">non-compliance with the essential requirements</span></b><span data-contrast="auto">, sanctions may be applied on any of the three stakeholders. Like GDPR, each Member State shall determine the </span><b><span data-contrast="auto">penalties applicable</span></b><span data-contrast="auto"> to infringements of this Regulation. Penalties are based on the company&#8217;s annual turnover and the severity of the infraction, with fines reaching up to 15 million euros or 2.5% of the total worldwide annual turnover for significant breaches. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h1 aria-level="2"><b><span data-contrast="auto">How to achieve compliance with the CRA?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h1>
<h2 aria-level="3"><b><span data-contrast="auto">Timeline of the CRA</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The CRA has been a long-term project, with almost </span><b><span data-contrast="auto">10 years</span></b><span data-contrast="auto"> from identification of the need to application, reflecting the complexity of establishing comprehensive cybersecurity regulations:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img loading="lazy" decoding="async" class=" wp-image-23905 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854.png" alt="" width="751" height="362" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854.png 1261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-396x191.png 396w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-768x370.png 768w" sizes="auto, (max-width: 751px) 100vw, 751px" /><br /></span></p>
<p><span data-contrast="auto">Businesses have until the 2026 to achieve compliance, with interim obligations. Similar requirements can be found in other regulations, such as NIS2, but contrary to other regulations, the CRA does not need a national transposition. The CRA was passed by the European Parliament in March 2024, and it is awaiting a vote by the European Council to become a law.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">A complex ecosystem</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">One of the major concerns raised during the preparation of the Cyber Resilience Act was how to navigate the multitude of existing regulations and </span><b><span data-contrast="auto">achieve regulatory harmony</span></b><span data-contrast="auto">, particularly in sectors where safety, privacy, and cybersecurity standards intersect. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The CRA aims to foster interoperability by aligning with the general product safety framework, the Cyber Security Act&#8217;s requirements for ICT products, processes, and services, and the CE marking standards for European compliance.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">To streamline compliance, the CRA includes</span><b><span data-contrast="auto"> presumptions of conformity</span></b> <b><span data-contrast="auto">with existing regulations</span></b><span data-contrast="auto"> such as the RED Directive, the AI Act, and certain sector-specific rules. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">However, the </span><b><span data-contrast="auto">CRA does not apply universally</span></b><span data-contrast="auto">; some sectors, such as medical, aviation, and automotive, are already governed by established regulations and are thus exempt from the CRA&#8217;s provisions.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-23881 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818.png" alt="" width="1410" height="677" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818.png 1410w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-398x191.png 398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-768x369.png 768w" sizes="auto, (max-width: 1410px) 100vw, 1410px" /></p>
<h2><b><span data-contrast="auto">Checklist for CRA compliance</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">Compliance with the CRA involves a thorough understanding of the regulation&#8217;s core text and two annexes, which detail: the list of concerned products, essential requirements, the obligations for manufacturers, importers, and distributors and national competent authorities and sanctions. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The certification process varies based on product criticality:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">For non-critical products</span></b><span data-contrast="auto"> : a self-assessment is necessary</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">For critical products</span></b><span data-contrast="auto"> </span><span data-contrast="auto"> : third-party assessment is necessary, meaning the product compliance to the CRA will be assessed by a certified entity. At the time of writing this article, the exact certification schemes have yet to be specified but in France, the CESTI certification is in discussion. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p><b><span data-contrast="auto">Five main checkpoints</span></b><span data-contrast="auto"> are to be considered to achieve compliance: </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-23853 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243.png" alt="" width="1298" height="376" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243.png 1298w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-768x222.png 768w" sizes="auto, (max-width: 1298px) 100vw, 1298px" /></p>
<ol>
<li><b><span data-contrast="auto">Legislative Gap Analysis:</span></b><span data-contrast="auto"> Identify discrepancies between current practices and the requirements of the CRA by reviewing existing cybersecurity policies, processes, and controls to pinpoint areas needing improvement.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="25" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Product Security Assessment:</span></b><span data-contrast="auto"> Conduct thorough assessments to ensure product identification and security. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">User Instructions Update:</span></b><span data-contrast="auto"> Provide clear and comprehensive user documentation by ensuring that all products are accompanied by documentation in adequation with the regulation standards.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="25" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Vulnerability Management:</span></b><span data-contrast="auto"> Set up a process for identifying and sharing vulnerabilities.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Internal Organization Review:</span></b><span data-contrast="auto"> Implement a permanent procedure to ensure compliance, covering the above-mentioned key points and enforce a watch on product or legislation changes that may imply new gaps to remediate</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}">.</span></li>
</ol>
<p><span data-contrast="auto">In conclusion, the Cyber Resilience Act represents a comprehensive framework to enhance the cybersecurity of digital products within the EU. Compliance with this legislation requires thorough preparation.</span> <span data-contrast="auto">For businesses, adhering to the CRA is not just a legal obligation but also an </span><b><span data-contrast="auto">opportunity to enhance their standing in a market</span></b><span data-contrast="auto"> increasingly aware of cybersecurity issues. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/">Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
