EU CRA explained's Avatar

EU CRA explained

@cyberresilienceact.bsky.social

Digital product cybersecurity EU requirements explained

38 Followers  |  34 Following  |  133 Posts  |  Joined: 25.04.2025  |  2.2313

Latest posts by cyberresilienceact.bsky.social on Bluesky

Gateways: Can be considered "products with digital elements" or components of "digital infrastructure".

Network servers: May be covered under NIS2 if offered as a critical service (e.g., in utility or smart city settings).

21.05.2025 16:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

The LoRaWAN gateway and network server (e.g. ChirpStack, Actility) are also covered by EU CRA.

21.05.2025 16:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

But what about the LoRaWan Gateway or Network Server?

21.05.2025 16:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

For example: A LoRaWAN temperature sensor that transmits data via a LoRa gateway to a cloud dashboard is "a product with digital elements" under EU CRA.

21.05.2025 16:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

From EU CRA-2-1: "This Regulation applies to products with digital elements made available on the market, the intended purpose or reasonably foreseeable use of which includes a direct or indirect logical or physical data connection to a device or network."

21.05.2025 16:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Under Article 2, paragraph 1 of the EU CRA, such devices are considered products with digital elements, even if they do not directly connect to the internet, and communicate only through gateways (as is common in LoRaWAN networks)

21.05.2025 16:44 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Yes, LoRaWAN End-Nodes โ€” devices such as sensors, actuators, or embedded controllers that use LoRaWAN to transmit or receive data โ€” are subject to the EU Cyber Resilience Act (EU CRA) if they meet the definition of a โ€œproduct with digital elementsโ€

21.05.2025 16:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

How EU CRA affects LoRaWan End-Nodes? The ones that are beyond gateway. Are they subject to EU-CRA?

21.05.2025 16:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 7    ๐Ÿ“Œ 0
EUR-Lex - 32003H0361 - EN - EUR-LexLog inEnglish

Definitions under Recommendation 2003/361/EC:
* Micro enterprise: <10 employees & โ‰ค โ‚ฌ2M turnover/balance sheet
* Small enterprise: <50 employees & โ‰ค โ‚ฌ10M turnover/balance sheet
* Medium enterprise: <250 employees & โ‰ค โ‚ฌ50M turnover or โ‰ค โ‚ฌ43M balance sheet

Source: eur-lex.europa.eu/legal-conten...

14.05.2025 10:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

In other words. Recommendation 2003/361/EC is a European Commission recommendation that defines the categories of micro, small, and medium-sized enterprises (SMEs).

14.05.2025 10:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

โ€˜microenterprisesโ€™, โ€˜small enterprisesโ€™ and โ€˜medium-sized enterprisesโ€™ mean, respectively, microenterprises, small
enterprises and medium-sized enterprises as defined in the Annex to Recommendation 2003/361/EC;

14.05.2025 10:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

What is the "Recommendation 2003/361/EC" mentioned in the EU CRA?

It is defined in paragraph 19 of Article 3 "Definitions" of CHAPTER I "GENERAL PROVISIONS"

14.05.2025 10:55 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 0

We can expect here that "the same specifications" must be available as a proper documentation by the company who provide and distribute the spare parts.

14.05.2025 10:51 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

The EU CRA does not apply to spare parts that are made available on the market to replace identical components
in products with digital elements and that are manufactured according to the same specifications as the components that
they are intended to replace.

14.05.2025 10:49 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

In this case, a heat pump makers are a device manufacturer offering a cloud-enabled service (sometimes called productized SaaS), not a dedicated SaaS provider like Microsoft or Salesforce. But their SaaS component still falls under CRA requirements for cybersecurity and secure development practices.

14.05.2025 10:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Here's the breakdown:

14.05.2025 10:32 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

An example: If a heat pump manufacturer offers an Azure-based cloud application for users to remotely monitor or adjust heating, they are not strictly a SaaS company in the traditional sense โ€” but they are offering a SaaS component as part of their connected product ecosystem.

14.05.2025 10:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

But what does the EU CRA says about cloud services provided by a device manufacturer?

14.05.2025 10:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Directive (EU) 2022/2555 (NIS2) does apply to cloud computing services, regardless of whether they operate under IaaS, PaaS, or SaaS models.

While NIS2 focuses on service providers, the EU CRA complements it by regulating the security of digital products used in those services.

14.05.2025 10:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image 14.05.2025 10:13 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

While NIS2 focuses on the operational security of essential and important entities, the EU CRA targets the cybersecurity of products with digital elements (hardware & software). But they overlap.

14.05.2025 10:12 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Key Points: Cloud providers are critical digital infrastructure. They must implement risk management measures, conduct incident reporting, and coordinate with national authorities. The requirements apply to IaaS, PaaS, and SaaS models. Applies also to non-EU cloud provider services within the EU.

14.05.2025 08:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

According to Annex I, Section 8 of the Directive: "Providers of cloud computing services, data center services, and content delivery network services" are considered essential entities under NIS2 โ€” meaning they are subject to the directive's strictest cybersecurity requirements.

14.05.2025 08:44 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Does NIS2 Apply to Cloud Computing Services? Yes. NIS2 explicitly applies to providers of cloud computing services.

14.05.2025 08:44 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
NISD 2 Tracker The Network and Information Systems Directive (NISD) was adopted by Member States of the European Union on 9 May 2018.

As a side note, NIS2 must be transposed into national law of EU governments by October 17, 2024. So far, the progress has been lacking, unfortunately: www.twobirds.com/en/trending-...

14.05.2025 08:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Directive (EU) 2022/2555 is the Network and Information Security Directive (NIS2), which came into force on January 16, 2023. It replaces the original NIS Directive (2016) and introduces stronger cybersecurity requirements for a broader range of sectors โ€” including cloud computing services.

14.05.2025 08:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

In EU CRA, "cloud" in mentioned only in paragraph 12. "Cloud solutions constitute remote data processing solutions within the meaning of this Regulation only if they meet
the definition laid down in this Regulation. ..." In the same paragraph, the "Directive (EU) 2022/2555" is mentioned. What is it?

14.05.2025 08:33 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 12    ๐Ÿ“Œ 0
Preview
Businesses Should Take a Lifecycle Approach to Device Security HP's Alex Holland sets out how organizations can secure devices from procurement to end-of-life

Businesses Should Take a Lifecycle Approach to Device Security - Infosecurity Magazine www.infosecurity-magazine.com/opinions/bus...

11.05.2025 10:04 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

To conclude. XSS is primarily a browser-based threat, but any device with a web interface is at risk. IoT, industrial, and consumer devices often expose web UIs that may be poorly secured. Device manufacturers should follow secure coding practices: input validation, output escaping, CSP headers, etc

09.05.2025 13:02 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Devices only accessed through CLI or secure APIs (e.g., over SSH or MQTT) typically aren't vulnerable to XSS (but may have other vulnerabilities like command injection).

09.05.2025 12:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

@cyberresilienceact is following 20 prominent accounts