Cyber Resilience Act: 4 essential requirements for vulnerability management

Equipment manufacturers are required by the Cyber Resilience Act (CRA) to diligently manage and address the security vulnerabilities in their products. Here is a quick overview of these requirements.

Why vulnerability monitoring matters under the Cyber Resilience Act?

According to the European Commission, cyberattacks targeting hardware and software products cost the global economy several trillion euros each year.

One major contributing factor is the lack of timely security updates for products already on the market.

To tackle this issue and better protect users, the Cyber Resilience Act introduces specific requirements focused on product vulnerabilities – those weaknesses that hackers can exploit to disrupt how a device functions. 

Now, let’s take a closer look at the four vulnerability management requirements introduced by this regulation.

1. Generating a Software Bill of Materials (SBOM)

“Manufacturers of products with digital elements shall identify and document vulnerabilities and components contained in products with digital elements, including by drawing up a software bill of materials in a commonly used and machine-readable format covering at the very least the top-level dependencies of the products.” (Annex I, section 2)
logo European Commission cyber resilience act EU
European Parliament
Cyber Resilience Act

Manufacturers are urged by the European Parliament to meticulously list and document the components present in their embedded devices.

Having this comprehensive software inventory, called Software Bill of Materials (SBOM) will facilitate the identification, analysis and patching of their products vulnerabilities

If you’re using The Yocto Project in your system, here is a quick guide on how to generate your SBOM with Yocto

2. Monitoring and patching products security vulnerabilities

Device makers are required by the Cyber Resilience Act to diligently manage and address security vulnerabilities in their products. This involves systematically identifying and documenting vulnerabilities and software components, promptly managing and correcting identified vulnerabilities through security updates, and subjecting products to regular and effective security tests and assessments.

3. Communicating vulnerabilities information among stakeholders

The third Cyber Resilience Act vulnerability management requirements is for equipment manufacturers to publicly disclose information about corrected vulnerabilities, including their severity and potential consequences, to ensure users are informed and able to take appropriate actions.

A coordinated vulnerability disclosure policy must be established, along with mechanisms for facilitating the sharing of vulnerability information among stakeholders.

4. Applying regular security updates

Secure distribution mechanisms for updates are crucial to swiftly address exploitable vulnerabilities, ensuring that patches and security updates are disseminated promptly and accompanied by clear instructions for users.

SCA tools to meet these vulnerability management requirements

Numerous Software Composition Analysis tools, such as CVE Scan, are available to help generate component lists like HSBOM (Hardware Bill of Materials) and SBOM (Software Bill of Materials). These tools also assist in regularly identifying and monitoring vulnerabilities within your embedded system when integrated to your CI pipelines.

When selecting a tool, it’s crucial to consider:

  • the accuracy of the results to minimize the time spent on maintenance activities
  • and data ownership, as this tool will contain information on all the vulnerabilities of your system…

Discover more from The Embedded Kit

Subscribe now to keep reading and get access to the full archive.

Continue reading