Requirement | Description | Chainloop Policy |
---|---|---|
cra-cybersecurity-req-1 | Products with digital elements shall be designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks. | Self-assessment |
cra-cybersecurity-req-2-a | Products with digital elements shall be made available on the market without known exploitable vulnerabilities. | Self-assessment |
cra-cybersecurity-req-2-b | Products with digital elements shall be made available on the market with a secure by default configuration, unless otherwise agreed between manufacturer and business user in relation to a tailor-made product with digital elements, including the possibility to reset the product to its original state. | Self-assessment |
cra-cybersecurity-req-2-c | Products with digital elements shall ensure that vulnerabilities can be addressed through security updates, including, where applicable, through automatic security updates that are installed within an appropriate timeframe enabled as a default setting, with a clear and easy-to-use opt-out mechanism, through the notification of available updates to users, and the option to temporarily postpone them. | Self-assessement |
cra-cybersecurity-req-2-d | Products with digital elements shall ensure protection from unauthorised access by appropriate control mechanisms, including but not limited to authentication, identity or access management systems, and report on possible unauthorised access. | Self-assessment |
cra-cybersecurity-req-2-e | Products with digital elements shall protect the confidentiality of stored, transmitted or otherwise processed data, personal or other, such as by encrypting relevant data at rest or in transit by state of the art mechanisms, and by using other technical means. | Self-assessment |
cra-cybersecurity-req-2-f | Products with digital elements shall protect the integrity of stored, transmitted or otherwise processed data, personal or other, commands, programs and configuration against any manipulation or modification not authorised by the user, and report on corruptions. | Self-assessment |
cra-cybersecurity-req-2-g | Products with digital elements shall process only data, personal or other, that are adequate, relevant and limited to what is necessary in relation to the intended purpose of the product with digital elements (data minimisation). | Self-assessment |
cra-cybersecurity-req-2-h | Products with digital elements shall protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks. | Self-assessment |
cra-cybersecurity-req-2-i | Products with digital elements shall minimise the negative impact by the products themselves or connected devices on the availability of services provided by other devices or networks. | Self-assessment |
cra-cybersecurity-req-2-j | Products with digital elements shall be designed, developed and produced to limit attack surfaces, including external interfaces. | Self-assessment |
cra-cybersecurity-req-2-k | Products with digital elements shall be designed, developed and produced to reduce the impact of an incident using appropriate exploitation mitigation mechanisms and techniques. | Self-assessment |
cra-cybersecurity-req-2-l | Products with digital elements shall provide security related information by recording and monitoring relevant internal activity, including the access to or modification of data, services or functions, with an opt-out mechanism for the user. | Self-assessment |
cra-cybersecurity-req-2-m | Products with digital elements shall provide the possibility for users to securely and easily remove on a permanent basis all data and settings and, where such data can be transferred to other products or systems, ensure that this is done in a secure manner. | Self-assessment |
Manufacturers of products with digital elements shall identify and document vulnerabilities and components contained in products with digital elements, including by drawing up a software bill of materials in a commonly used and machine-readable format covering at the very least the top-level dependencies of the products.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-1 | Identify all components included in your software: an SBOM is present and includes the generally adopted minimum elements recommended by the US National Telecommunications and Information Administration. Perform regular vulnerability scanning to detect known issues across all software components: an SCA scan is performed daily. | sbom-present (automatic), sbom-ntia (automatic), vulnerability-scan-present(periodicity:daily) (automatic) |
Manufacturers of products with digital elements shall in relation to the risks posed to products with digital elements, address and remediate vulnerabilities without delay, including by providing security updates; where technically feasible, new security updates shall be provided separately from functionality updates.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-2 | Remediate vulnerabilities based on risk: Critical vulnerabilities are fixed within 2 days. | vulnerabilities(severity:critical SLA:48h) (automatic) |
Manufacturers of products with digital elements shall apply effective and regular tests and reviews of the security of the product with digital elements.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-3 | Perform regular vulnerability scanning to detect known issues across all software components: an SCA scan is performed daily. | vulnerability-scan-present(periodicity:daily) (automatic) |
Manufacturers of products with digital elements shall once a security update has been made available, share and publicly disclose information about fixed vulnerabilities, including a description of the vulnerabilities, information allowing users to identify the product with digital elements affected, the impacts of the vulnerabilities, their severity and clear and accessible information helping users to remediate the vulnerabilities; in duly justified cases, where manufacturers consider the security risks of publication to outweigh the security benefits, they may delay making public information regarding a fixed vulnerability until after users have been given the possibility to apply the relevant patch.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-4 | Information disclosure: Publish security advisories with required information. | security-advisories-public (manual evidence), security-advisory-evidence (optional manual evidence), security-advisories-process-exists (manual evidence), security-advisories-process (manual evidence), security-advisory-details (manual evidence) |
Manufacturers of products with digital elements shall put in place and enforce a policy on coordinated vulnerability disclosure.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-5 | Maintain a coordinated vulnerability disclosure (CVD) policy, outlining how reports are handled and timelines for response. | cvd-process-exists (manual evidence), cvd-triggering-communicated (manual evidence), cvd-team-defined (manual evidence), cvd-response-guidance (manual evidence), cvd-communication-guidance (manual evidence), cvd-vendors-coordination (manual evidence), cvd-evidence (optional manual evidence), cvd-triggering-defined (manual evidence), cvd-rollout-guidance (manual evidence) |
Manufacturers of products with digital elements shall take measures to facilitate the sharing of information about potential vulnerabilities in their product with digital elements as well as in third-party components contained in that product, including by providing a contact address for the reporting of the vulnerabilities discovered in the product with digital elements.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-6 | Implement a vulnerability reporting mechanism to enable users and researchers to report issues. | reporting-mechanism-exists (manual evidence), security-contact-exists (manual evidence), security-response-team-exists (manual evidence), security-response-sla-exists (manual evidence), reporting-mechanism-public (manual evidence), security-feeds-monitoring-exists (optional manual evidence), reporting-mechanism-evidence (optional manual evidence) |
Manufacturers of products with digital elements shall provide for mechanisms to securely distribute updates for products with digital elements to ensure that vulnerabilities are fixed or mitigated in a timely manner and, where applicable for security updates, in an automatic manner.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-7 | Provide a mechanism for distribution of security updates. | update-distribution-automatic (optional manual evidence), updates-distribution-public (manual evidence), updates-distribution-evidence (optional manual evidence), updates-distribution-policy-exists (manual evidence), updates-distribution-information (manual evidence) |
Manufacturers of products with digital elements shall ensure that, where security updates are available to address identified security issues, they are disseminated without delay and, unless otherwise agreed between a manufacturer and a business user in relation to a tailor-made product with digital elements, free of charge, accompanied by advisory messages providing users with the relevant information, including on potential action to be taken.
Requirement | Description | Chainloop Policy |
---|---|---|
cra-vulnerability-handling-req-8 | Provide a mechanism for timely distribution of security updates and transparent disclosure of relevant vulnerability information to users. | updates-distribution-timeline (manual evidence), updates-distribution-free (manual evidence), disclosure-policy-exists (manual evidence), disclosure-timeline-exception (manual evidence), disclosure-policy-evidence (optional manual evidence) |