
4.3 Security Engineering
In order for future products to meet the requirements
of CRA, manufacturers and organisations involved in
the development of ICT products are obliged to in-
clude IT security as early as possible (security by de-
sign) and to maintain this protection over the entire
product lifespan (security life cycle). It is necessary
to define, establish and assess processes of product
development, including the supply chains, such that
they are compliant to the upcoming regulation. This
means first becoming aware of the risks a product
must be able to deal with and how the necessary se-
curity mechanisms should be designed. Formally, a
TARA is required that serves as the basis for the de-
velopment of a risk-based security concept, which, at
the same time, helps avoiding to over-engineer pro-
tection efforts.
There are numerous approaches to carry out re-
quired threat analysis and risk assessment, e.g. in-
cluded in EN ISO/IEC 62443, (Common Criteria Or-
ganisation, 2017), etc.). There is no agreed method
exists for industry or in science, only good practice.
Anyhow, it is agreed that the basic scheme follows
the scheme:
Risk ←− T hreats × Probability × Impact
The assessment of risks is based on the quality of
the threats for (mostly technology induced) attacks,
the probability that such threats are expected to come
and the expected impact of the attack. To date, such
TARA are carried out by experts, however, over time
and for given technologies catalogues of threat my be
agreed in industry sectors and maintained to follow
latest vulnerabilities and identified security flaws, as
proposed (Sommer et al., 2019) for the automotive
domain to support ISO/SAE 21434.
In order for the security concept to be maintained,
it is necessary to be able to update the product or to be
able to carry out future updates of used components.
This will not necessarily be always successful, espe-
cially for legacy products, as examples for an early
product end of life indicate. If security support can no
longer be provided and updates cannot be made avail-
able, then decision may be required for such products
to exit the market
4
.
The product classes discussed in Section 3.4 help
to guide the design of the security concept. Priori-
tising proven norms and standards not only enhances
4
In another industry, an automaker production of a vehi-
cle type is discontinued because cybersecurity requirements
can no longer be fulfilled: https://de.wikipedia.org/wiki/Po
rsche Macan or https://www.motor1.com/news/706105/por
sche-continuing-gas-macan-sales/ accessed 2024-03-10
product security but also simplifies self-declarations,
especially for critical product classes, helping to keep
certification costs low. This illustrates how important
it is harmonised European standards exists and that
they are used in products. On the other hand, Class I
and below do not require harmonised European stan-
dards and can build on standards that are state of the
art. This is very important for legacy products that
were built but the standards used never fall into the
group of harmonised European standards.
All such design and standards application deci-
sions have to be documented well, as it will be needed
in case of dispute with market survey agencies. The
use of tools for managing product artefacts will help
to meet documentation requirements and presents an
opportunity to streamline processes for automation,
as seen in parts with the SBOM. Specifically when
components in the supply chain of a product will be
compromised, the product owner is expected to react
swiftly and mitigate or eliminate security flaws.
The reporting obligations encompassed in the
CRA and that will become early on affecting as
mentioned above, will certainly require organisations,
vendors and importers adopt their business processes.
Practising reporting processes and vulnerability han-
dling within given timelines, aligning such reporting
decision processes with also the GDPR obligations in-
dicates some preparation demand and efforts.
4.4 Education and Training
The coming application of the CRA creates demand
and impetus for education and training of future
IT specialists, specifically in IT security and data
protection. The wide-ranging application influences
within companies product development, processes,
and methods. This includes methods for conduct-
ing TARA and using these as basis for defining secu-
rity concepts that achieve a specified protection level
with well-defined remaining risks. Structuring secu-
rity engineering as part of the development process to
encompass predefined security requirements will be
crucial, also to adopt to new technologies in the Post
Quantum era. It is not the new technology that defines
the challenge, but its application and the migration to
new technologies.
Being cognisant of duties and obligations arising
from vulnerability handling, and understanding liabil-
ities and legal regulations, will play a essential role
in shaping the future of digitisation. In essence, the
CRA not only mandates compliance but also cataly-
ses a holistic transformation in the approach to cy-
bersecurity, promoting innovation, efficiency, and re-
silience for products that shall go to European mar-
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
250