CRA: Security development checklist

The Cyber Resilience Act (CRA) requires device makers to integrate security from the conception phase of their product as any product launched on the market should not have any known exploitable vulnerability.

“On the basis of the cybersecurity risk assessment and where applicable, products with digital elements shall be made available on the market without known exploitable vulnerabilities.” (annex I, section 1)
logo European Commission cyber resilience act EU
European Parliament

Integrating security from the conception phase - Security development checklist

Security must be integrated from the very conception phase of products containing digital elements.

This includes:

Furthermore, equipment manufacturers must protect products essential functions’ availability, mitigate their negative impacts on other devices or networks, limit attack surfaces, reduce incident consequences through appropriate mechanisms, and provide security-related information through activity monitoring and update notifications. That’s why security assessments are also required by the Cyber Resilience Act.

Read our article about secure by design development for Linux-based systems

Cyber Resilience Act Security development checklist

Download the CRA checklist

Cyber Resilience Act CRA checklist

With the upcoming Cyber Resilience Act, European device manufacturers must prepare to meet a series of technical and organizational requirements. Harmonized standards designed to guide compliance are expected to be published by October 2026, with mandatory compliance
required by the end of 2027.

Here’s a secure development checklist to help you efficiently anticipate and address these requirements.

Existing solutions to streamline security developments

Solutions like Welma Yocto Linux can significantly expedite your development process for embedded Linux systems by pre-integrating essential security requirements for the Cyber Resilience Act

These include features such as: 

Additionally, Welma Yocto Linux supports long-term maintenance through vulnerability monitoring and integration into CI pipelines, ensuring your system remains secure by design throughout its lifecycle.

You can also seek assistance from professional services firms, such as Witekio, for specialized security development needs.

Discover more from The Embedded Kit

Subscribe now to keep reading and get access to the full archive.

Continue reading