{"id":23850,"date":"2024-09-11T13:20:22","date_gmt":"2024-09-11T12:20:22","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=23850"},"modified":"2024-09-13T10:20:48","modified_gmt":"2024-09-13T09:20:48","slug":"cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/","title":{"rendered":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem"},"content":{"rendered":"\n<p><span data-contrast=\"auto\">The <strong>Cyber Resilience Act (CRA)<\/strong> represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount.<\/span> <span data-contrast=\"auto\">The CRA thus represents a <\/span><b><span data-contrast=\"auto\">steep change in the security of products <\/span><\/b><span data-contrast=\"auto\">as the first regulation of this kind worldwide. Wavestone, as a key player in cybersecurity consultancy, is particularly invested in this regulation due to its involvement in the exploratory studies that shaped the CRA.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">In a few words, if you either manufacture, import or resell a product with digital elements, you will surely be affected by the CRA, and need to ensure compliance. This article is intended to shed light on: What does this regulation entail? Who is affected? How can compliance be achieved?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h1><b><span data-contrast=\"auto\">What is the cyber resilience act and what does it entail?\u00a0\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<p><span data-contrast=\"auto\">To understand the necessity of the Cyber Resilience Act, it&#8217;s crucial to consider the broader context of cybersecurity in Europe. The CRA is an ambitious regulation designed to <\/span><b><span data-contrast=\"auto\">ensure the security of EU citizens<\/span><\/b><span data-contrast=\"auto\"> by addressing the currently observed low levels of cybersecurity in products with digital elements through a European Union policy intervention. In response, comprehensive studies focusing on the cybersecurity of digital products were conducted, leading to the proposal of legislation defining the obligations for the whole products supply chain actors, from manufacturers to distributors.<\/span><span data-contrast=\"auto\">\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Wavestone&#8217;s involvement in this process underscores its commitment to enhancing cybersecurity standards. We participated in an <\/span><b><span data-contrast=\"auto\">in-depth exploratory study commissioned by the EU<\/span><\/b><span data-contrast=\"auto\">, engaging with a broad spectrum of stakeholders involved to varying degrees in the products ecosystem, including national authorities, EU bodies, hardware and software manufacturers, trade associations, consumer organizations, researchers, academia, and cybersecurity professionals.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Through Wavestone\u2019s position as a global, and particularly European leader in the field of cybersecurity, several interviews, focus groups and workshops were conducted.\u00a0 Valuable insights were gathered from a wide range of different interlocutors, providing a comprehensive view that takes into account the perspectives of all stakeholders and allowed the foundation for the development of the CRA.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Definition and Scope<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The Cyber Resilience Act is a legislative proposal <\/span><b><span data-contrast=\"auto\">defining the obligations of manufacturers, importers, and distributors of products containing digital elements marketed in the EU<\/span><\/b><span data-contrast=\"auto\">, all of which must bear the CE mark across all sectors. As defined in the regulation, this includes \u201c<\/span><i><span data-contrast=\"auto\">any software or hardware product and its remote data processing solutions, encompassing components that can be marketed separately<\/span><\/i><span data-contrast=\"auto\">\u201d. The regulation&#8217;s aim is not only to secure standalone products but also to ensure the security of data transmission chains and central infrastructures through the application of this standard.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To this notion of product is added a notion of criticality, therefore the CRA differentiates two types of products: <\/span><b><span data-contrast=\"auto\">products with digital elements<\/span><\/b><span data-contrast=\"auto\"> and <\/span><b><span data-contrast=\"auto\">critical products with digital elements<\/span><\/b><span data-contrast=\"auto\">. As detailed below in \u201cChecklist for CRA compliance\u201d, it will affect how compliance can be achieved.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A few examples of products with digital elements include consumer products, smarts cities and non-essential software. Critical products with digital elements include for example industrial control systems and firewalls. The detailed list of concerned products can be found in the regulation\u2019s annexes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\"> <img loading=\"lazy\" decoding=\"async\" class=\" wp-image-23883 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143800.png\" alt=\"\" width=\"674\" height=\"406\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143800.png 1254w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143800-317x191.png 317w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143800-65x39.png 65w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143800-768x463.png 768w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/span><span data-contrast=\"auto\">However, as is detailed below in \u201cA complex ecosystem\u201d, the <\/span><b><span data-contrast=\"auto\">CRA does not apply universally<\/span><\/b><span data-contrast=\"auto\">; products in some specific sectors do not have to comply to the requirements<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Stakeholders and Responsibilities<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The CRA impacts the entire lifecycle of digital products, from development by <\/span><b><span data-contrast=\"auto\">manufacturers<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">importers<\/span><\/b><span data-contrast=\"auto\">, <\/span><b><span data-contrast=\"auto\">distributers<\/span><\/b><span data-contrast=\"auto\"> to the final <\/span><b><span data-contrast=\"auto\">consumer<\/span><\/b><span data-contrast=\"auto\">, but also the vulnerability management from conception to the product end-life, through a share responsibility.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\"> <img loading=\"lazy\" decoding=\"async\" class=\" wp-image-23885 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143733.png\" alt=\"\" width=\"550\" height=\"340\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143733.png 1214w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143733-309x191.png 309w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143733-63x39.png 63w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143733-768x475.png 768w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><br \/><\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Essential Requirements<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">As said earlier, the CRA\u2019s objective is to allow a sufficient level of cybersecurity in products with digital elements. To do so, it introduces essential requirements built on three pillars:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Product Security:<\/span><\/b><span data-contrast=\"auto\"> Ensuring products are designed, developed, and manufactured to meet appropriate cybersecurity levels and are free from known exploitable vulnerabilities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">User Documentation:<\/span><\/b><span data-contrast=\"auto\"> Providing documentation to ensure safe use from commissioning to end of life.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Vulnerability Management:<\/span><\/b><span data-contrast=\"auto\"> Identifying and documenting vulnerabilities, conducting regular security tests, and implementing a vulnerability disclosure policy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">In the event of <\/span><b><span data-contrast=\"auto\">non-compliance with the essential requirements<\/span><\/b><span data-contrast=\"auto\">, sanctions may be applied on any of the three stakeholders. Like GDPR, each Member State shall determine the <\/span><b><span data-contrast=\"auto\">penalties applicable<\/span><\/b><span data-contrast=\"auto\"> to infringements of this Regulation. Penalties are based on the company&#8217;s annual turnover and the severity of the infraction, with fines reaching up to 15 million euros or 2.5% of the total worldwide annual turnover for significant breaches.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h1 aria-level=\"2\"><b><span data-contrast=\"auto\">How to achieve compliance with the CRA?<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h1>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">Timeline of the CRA<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The CRA has been a long-term project, with almost <\/span><b><span data-contrast=\"auto\">10 years<\/span><\/b><span data-contrast=\"auto\"> from identification of the need to application, reflecting the complexity of establishing comprehensive cybersecurity regulations:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\"> <img loading=\"lazy\" decoding=\"async\" class=\" wp-image-23905 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-13-111854.png\" alt=\"\" width=\"751\" height=\"362\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-13-111854.png 1261w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-13-111854-396x191.png 396w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-13-111854-71x34.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-13-111854-768x370.png 768w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><br \/><\/span><\/p>\n<p><span data-contrast=\"auto\">Businesses have until the 2026 to achieve compliance, with interim obligations. Similar requirements can be found in other regulations, such as NIS2, but contrary to other regulations, the CRA does not need a national transposition. The CRA was passed by the European Parliament in March 2024, and it is awaiting a vote by the European Council to become a law.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"3\"><b><span data-contrast=\"auto\">A complex ecosystem<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">One of the major concerns raised during the preparation of the Cyber Resilience Act was how to navigate the multitude of existing regulations and <\/span><b><span data-contrast=\"auto\">achieve regulatory harmony<\/span><\/b><span data-contrast=\"auto\">, particularly in sectors where safety, privacy, and cybersecurity standards intersect.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The CRA aims to foster interoperability by aligning with the general product safety framework, the Cyber Security Act&#8217;s requirements for ICT products, processes, and services, and the CE marking standards for European compliance.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To streamline compliance, the CRA includes<\/span><b><span data-contrast=\"auto\"> presumptions of conformity<\/span><\/b> <b><span data-contrast=\"auto\">with existing regulations<\/span><\/b><span data-contrast=\"auto\"> such as the RED Directive, the AI Act, and certain sector-specific rules.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, the <\/span><b><span data-contrast=\"auto\">CRA does not apply universally<\/span><\/b><span data-contrast=\"auto\">; some sectors, such as medical, aviation, and automotive, are already governed by established regulations and are thus exempt from the CRA&#8217;s provisions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-23881 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143818.png\" alt=\"\" width=\"1410\" height=\"677\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143818.png 1410w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143818-398x191.png 398w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143818-71x34.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-143818-768x369.png 768w\" sizes=\"auto, (max-width: 1410px) 100vw, 1410px\" \/><\/p>\n<h2><b><span data-contrast=\"auto\">Checklist for CRA compliance<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Compliance with the CRA involves a thorough understanding of the regulation&#8217;s core text and two annexes, which detail: the list of concerned products, essential requirements, the obligations for manufacturers, importers, and distributors and national competent authorities and sanctions.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The certification process varies based on product criticality:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">For non-critical products<\/span><\/b><span data-contrast=\"auto\"> : a self-assessment is necessary<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">For critical products<\/span><\/b><span data-contrast=\"auto\">\u202f<\/span><span data-contrast=\"auto\"> : third-party assessment is necessary, meaning the product compliance to the CRA will be assessed by a certified entity. At the time of writing this article, the exact certification schemes have yet to be specified but in France, the CESTI certification is in discussion.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">Five main checkpoints<\/span><\/b><span data-contrast=\"auto\"> are to be considered to achieve compliance: <\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-23853 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-140243.png\" alt=\"\" width=\"1298\" height=\"376\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-140243.png 1298w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-140243-437x127.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-140243-71x21.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/Capture-decran-2024-09-11-140243-768x222.png 768w\" sizes=\"auto, (max-width: 1298px) 100vw, 1298px\" \/><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Legislative Gap Analysis:<\/span><\/b><span data-contrast=\"auto\"> Identify discrepancies between current practices and the requirements of the CRA by reviewing existing cybersecurity policies, processes, and controls to pinpoint areas needing improvement.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"25\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Product Security Assessment:<\/span><\/b><span data-contrast=\"auto\"> Conduct thorough assessments to ensure product identification and security.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">User Instructions Update:<\/span><\/b><span data-contrast=\"auto\"> Provide clear and comprehensive user documentation by ensuring that all products are accompanied by documentation in adequation with the regulation standards.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"25\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Vulnerability Management:<\/span><\/b><span data-contrast=\"auto\"> Set up a process for identifying and sharing vulnerabilities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Internal Organization Review:<\/span><\/b><span data-contrast=\"auto\"> Implement a permanent procedure to ensure compliance, covering the above-mentioned key points and enforce a watch on product or legislation changes that may imply new gaps to remediate<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">In conclusion, the Cyber Resilience Act represents a comprehensive framework to enhance the cybersecurity of digital products within the EU. Compliance with this legislation requires thorough preparation.<\/span> <span data-contrast=\"auto\">For businesses, adhering to the CRA is not just a legal obligation but also an <\/span><b><span data-contrast=\"auto\">opportunity to enhance their standing in a market<\/span><\/b><span data-contrast=\"auto\"> increasingly aware of cybersecurity issues.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The&#8230;<\/p>\n","protected":false},"author":1465,"featured_media":23871,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3977,3274],"tags":[],"coauthors":[4257,4357,4499],"class_list":["post-23850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-focus","category-manufacturing-industry-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-11T12:20:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T09:20:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Chopineau, Mohammed Ayoub Kara-Ali, Nicolas PONTOIS\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Chopineau, Mohammed Ayoub Kara-Ali, Nicolas PONTOIS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\"},\"author\":{\"name\":\"Paul Chopineau\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9\"},\"headline\":\"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem\",\"datePublished\":\"2024-09-11T12:20:22+00:00\",\"dateModified\":\"2024-09-13T09:20:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\"},\"wordCount\":1254,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg\",\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Focus\",\"Manufacturing &amp; Industry 4.0\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\",\"name\":\"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg\",\"datePublished\":\"2024-09-11T12:20:22+00:00\",\"dateModified\":\"2024-09-13T09:20:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9\",\"name\":\"Paul Chopineau\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/paul-chopineau\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight","og_description":"The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/","og_site_name":"RiskInsight","article_published_time":"2024-09-11T12:20:22+00:00","article_modified_time":"2024-09-13T09:20:48+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Paul Chopineau, Mohammed Ayoub Kara-Ali, Nicolas PONTOIS","twitter_misc":{"Written by":"Paul Chopineau, Mohammed Ayoub Kara-Ali, Nicolas PONTOIS","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/"},"author":{"name":"Paul Chopineau","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9"},"headline":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem","datePublished":"2024-09-11T12:20:22+00:00","dateModified":"2024-09-13T09:20:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/"},"wordCount":1254,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg","articleSection":["Cybersecurity &amp; Digital Trust","Focus","Manufacturing &amp; Industry 4.0"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/","name":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg","datePublished":"2024-09-11T12:20:22+00:00","dateModified":"2024-09-13T09:20:48+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/09\/guillaume-perigois-0NRkVddA2fw-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/09\/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/887e1d082b909842e7979bdd33e0fdb9","name":"Paul Chopineau","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/paul-chopineau\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/23850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1465"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=23850"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/23850\/revisions"}],"predecessor-version":[{"id":23908,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/23850\/revisions\/23908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/23871"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=23850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=23850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=23850"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=23850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}