Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) No 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act)
Made by
European Parliament, EU Council
Made under
Treaty on the Functioning of the European Union, and in particular Article 114 thereof
The Cyber Resilience Act (CRA) is an EU regulation for improving cybersecurity and cyber resilience in the EU through common cybersecurity standards for products with digital elements in the EU, such as required incident reports and automatic security updates.[1] Products with digital elements mainly are hardware and software whose "intended and foreseeable use includes direct or indirect data connection to a device or network".[2]
After its proposal on 15 September 2022 by the European Commission, multiple open source organizations criticized CRA for creating a "chilling effect on open source software development".[3] The European Commission reached political agreement on the CRA on 1 December 2023, after a series of amendments.[4] The revised bill introduced the "open source steward", a new economic concept, and received relief from many open source organizations due to its exception for open-source software,[5] while Debian criticized its effect on small businesses and redistributors.[6] The CRA agreement received formal approval by the European Parliament in March 2024.[7] It was adopted by the Council on 10 October 2024.[8]
Purposes and motivations
The background, purposes and motivations for the proposed policy include:[9]
Ensuring that digital products in the supply chain are secure is important for businesses,[2] and cybersecurity often is a "full company risk issue".[14]
Potential impacts of hacking include "severe disruption of economic and social activities across the internal market, undermining security or even becoming life-threatening".[15]
Secure by default principles would impose a duty of care for the lifecycle of products, instead of e.g. relying on consumers and volunteers to establish a basic level of security.[2][16] The new rules would "rebalance responsibility towards manufacturers".[15]
The rapid spread of digital technologies means rogue states or non-state groups could more easily disrupt critical infrastructures such as public administration and hospitals.[17]
According to The Washington Post, the CRA could make the EU a leader on cybersecurity and "change the rules of the game globally".[16]
Implementation and mechanisms
This section needs to be updated. The reason given is: Copyedit and remove "will" for things that have happened. Also add the newer amendment that only applies this to commercial distribution. Please help update this article to reflect recent events or newly available information.(February 2024)
The policy requires software that are "reasonably expected" to have automatic updates should roll out security updates automatically by default while allowing users to opt out.[18] When feasible, security updates should be separated from feature updates.[19]: Annex I.II(2) Companies need to conduct cyber risk assessments before a product is put on the market and retain its data inventory and documentation throughout the 10 years[20] after being put on market or its support period, whichever is longer.[19] Companies would have to notify EU cybersecurity agency ENISA of any incidents within 24 hours of becoming aware of them, and take measures to resolve them.[13] Products carrying the CE marking would "meet a minimum level of cybersecurity checks".[10]
About 90% of products with digital elements fall under a default category, for which manufacturers will self-assess security, write an EU declaration of conformity, and provide technical documentation.[21] The rest are either "important" or "critical". Security-important products are categorized into two classes of risks.[22] Products assessed as 'critical' will need to undergo external audits.[18][16]
Once the law has passed, manufacturers would have two years to adapt to the new requirements and one year to implement vulnerability and incident reporting. Failure to comply could result in fines of up to €15 million or 2.5 percent of the offender's total worldwide annual turnover for the preceding financial year.[15][12][13] Fines do not apply to non-commercial open-source developers.[19]: 64(10)
Euractiv has reported on novel drafts or draft-changes that includes changes like the "removal of time obligations for products' lifetime and limiting the scope of reporting to significant incidents".[23][18] The first compromise amendment will be discussed on 22 May 2023 until which groups reportedly could submit written comments. Euractiv has provided a summary overview of the proposed changes.[24]
The main political groups in the European Parliament are expected to agree on the Cyber Resilience Act at a meeting on 5 July 2023. Lawmakers will discuss open source considerations, support periods, reporting obligations, and the implementation timeline. The committee vote is scheduled for 19 July 2023.[25][26]
The Spanish presidency of the EU Council has released a revised draft that simplifies the regulatory requirements for connected devices. It would reduce the number of product categories that must comply with specific regulations, mandate reporting of cybersecurity incidents to national CSIRTs, and include provisions for determining product lifetime and easing administrative burdens for small companies. The law also clarifies that spare parts with digital elements supplied by the original manufacturer are exempt from the new requirements.[27][26]
The Council text further stipulates that prior to seeking compulsory certification, the European Union executives must undertake an impact assessment to evaluate both the supply and demand aspects of the internal market, as well as the member states' capacity and preparedness for implementing the proposed schemes.[28][26]
On June 25, 2024, the Czech National Office for Cyber and Information Security (NÚKIB) announced steps to implement the Cyber Resilience Act (CRA), including a regulation expected in autumn 2024, with enforcement starting in late 2027 after a three-year transition. This regulation will require manufacturers of digital products to enhance cybersecurity throughout the product lifecycle. NÚKIB will also hold consultations with manufacturers of significant and critical products from June 25 to July 17, 2024, to develop technical specifications and gather feedback.[29]
Reception
Initially, the proposed act was heavily criticized by open-source advocates.[30]
Although Mozilla "welcome[s] and support[s] the overarching goals of the CRA", it also criticised the proposal for unclear references to "commercial activity" that could include many open source projects (a viewpoint Ilkka Turunen of Computer Weekly repeated[34]), misalignment with other EU rules, and requirements for the disclosure of unmitigated vulnerabilities.[35]
Steven J. Vaughan-Nichols of The Register argued the CRA's "underlying assumption is that you can just add security to software" while "[m]any open source developers have neither the revenue nor resources to secure their programs to a government standard".[30]
CCIA Europe warned that "the resulting red tape from the approval process could hamper the roll-out of new technologies and services in Europe".[13]
Amendments were released on 1 December 2023, as part of political agreement between co-legislators,[37] to the acclaim of many open-source advocates.[5] As Mike Milinkovich, executive director of the Eclipse foundation,[38] wrote:[37]
The revised legislation has vastly improved its exclusion of open source projects, communities, foundations, and their development and package distribution platforms. It also creates a new form of economic actor, the “open source steward,” which acknowledges the role played by foundations and platforms in the open source ecosystem. This is the first time this has appeared in a regulation, and it will be interesting to see how this evolves.
— Mike Milinkovich, "Good News on the Cyber Resilience Act"
The OSI noted Debian's statement that many small businesses and solo developers would have trouble navigating the act when redistributing open source software[6] remained unaddressed.[5] Apache reviewed the changes positively while worrying about applicability of the CRA on potentially critical open-source components and stressing the importance of collaboration with international standards bodies to ease certification of software.[39]